Abstract

Cybersecurity is defined as the protection of networks, data and systems in the cyberspace. It should have the ability to protect or defend an organization’s use of cyberspace from any attack, conducted via cyberspace with the intention of disrupting, disabling, destroying, or maliciously controlling a computing environment and even destroying the integrity of the data or stealing controlled information. As the rapid technological developments have provided vast opportunities and potential sources of efficiency to every organization, these new technologies have also brought unprecedented threats and could be a critical issue for every organization. In this study, Phase I delved into the different Cybersecurity frameworks and regulatory environments presented through review of related literature. One of the frameworks is the Cybersecurity Framework released in 2014 by the National Institute of Standards and Technology (NIST). Establishing an internal cyber security policies and procedures, management of cyber security risk and the alignment to international information security standards will be the highlight of the literature review of this study. The Phase II will focus on the design, and analysis of a specific cyber security dealings guided by the standard regulatory framework intended for selected State Universities in Region III in the Philippines. Facing the threat of cyber-attacks, the researchers believed that educational administrators and leaders need to implement the right solutions to protect their resources from cyber threats. All organizations need to understand these cyber threats they face. The challenge now is the establishment of imperative tasks related to preservation of confidentiality, integrity and availability of information in the Cyberspace while facilitating an essential operating function.

Highlights

  • Countries heavily rely on cyberspace for everything, and everyone is vulnerable

  • As the framework is put into practice, lessons learned will be integrated into future versions

  • The main purpose of this study is to review related literature on Cybersecurity

Read more

Summary

Introduction

Countries heavily rely on cyberspace for everything, and everyone is vulnerable. Computer code connects millions of objects to the Internet which shapes the communication between the cyber and physical world. The rapid growth of the information and communication technology networks in cyberspace according to Schjolberg and Ghernaouti-Hélie [1] has created new opportunities for criminals in perpetrating crime, and to exploit online vulnerabilities and attack countries’ critical information infrastructure. The Internet was not originally designed with security in mind, but as an open system that allows scientists, researchers, educators and anyone to send data to one another quickly. Without strong investments in Cybersecurity and cyber defenses, data systems remain open and susceptible to rudimentary and dangerous forms of exploitation and attack. Malicious actors use cyberspace to steal data and intellectual property for their own economic or political goals. An actor in one region of the globe can use cyber capabilities to strike directly at a network thousands of miles away, destroying data, disrupting businesses, or shutting off critical systems

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call