Of Social Engineers & Corporate Espionage Agents: How Prepared Are SMEs in Developing Economies?

作者: Ezer Osei Yeboah-Boateng

DOI:

关键词:

摘要: The purpose of this study is to create the awareness cyber-security threats due social engineers and corporate espionage agents, offer some mitigation measures aimed at minimizing impact insider attacks on SMEs in developing economies. Loyal trusted employees can pose enormous catastrophic cyber-risks SMEs, view their insider-ness, access privileges knowledge systems as well associated inherent vulnerabilities. Cyber-security functionaries chief-level officers were surveyed various metrics incidents. findings indicate that financial ICT oriented are mostly targeted, range from loss sensitive data, resources, market share customer investor confidence. Since most capitalize end-user vulnerabilities sense norms, effective offered human centric nature. Personal factors likely motivate become agents ought be addressed. Periodic on-spot audit carried out effectively monitor any unnecessary inappropriate escalations. Policy separation duties must enforced.

参考文章(13)
Donn B. Parker, Fighting computer crime ,(1983)
Charles P. Pfleeger, Reflections on the Insider Threat Insider Attack and Cyber Security. pp. 5- 16 ,(2008) , 10.1007/978-0-387-77322-3_2
Ezer Osei Yeboah-Boateng, Fuzzy Similarity Measures Approach in Benchmarking Taxonomies of Threats against SMEs in Developing Economies Canadian Journal on Computing in Mathematics, Natural Sciences, Engineering and Medicine. ,vol. 4, pp. 34- 44 ,(2013)
Ezer Osei Yeboah-Boateng, Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA) Institut for Elektroniske Systemer, Aalborg Universitet. ,(2013)
Paul M. Summitt, Mark Osborne, How to Cheat at Managing Information Security ,(2006)
Frank L. Greitzer, Deborah A. Frincke, Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation Insider Threats in Cyber Security. ,vol. 49, pp. 85- 113 ,(2010) , 10.1007/978-1-4419-7133-3_5
Martin Hershkowitz, The “Insider” Threat Journal of Police Crisis Negotiations. ,vol. 7, pp. 103- 111 ,(2007) , 10.1300/J173V07N01_06
Randall J. Boyle, Raymond R. Panko, Corporate Computer Security ,(2012)
John Mallery, Building a Secure Organization Computer and Information Security Handbook (Second Edition). pp. 3- 24 ,(2013) , 10.1016/B978-0-12-394397-2.00001-5