Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices

被引:0
作者
Oyelami, Julius Olusegun [1 ]
Kassim, Azleena Mohd [1 ]
机构
[1] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
关键词
Cyber security; cyber defence policy; organisation; cyber security practices;
D O I
10.14569/IJACSA.2020.0110817
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many organisations have been struggling to defend their cyberspace without a specific direction or guidelines to follow and they have described and identified cyber attack as a devastating potential on business operation in a broader perspective. Since then, researchers in cyber security have come out with numerous reports on threats and attack on organisations. This study is conducted to develop and propose a Cyber Security Defence Policies (CSDP) by harmonising and synthesizing the existing practices identified from the literature review. Observation and questionnaire were adopted to evaluate, review and collect data under ethical agreement from 10 organisations. The validation is based on the principal components for the proposed CSDP and the proposed CSDP, using SPSS as the statistical tool. The result shows that, the validation of the proposed CSDP by 20 experts reveals a standard deviation of 0.607, 0.759, 0.801, 0.754, 0.513, 0.587 and 0.510 on each of the principal components without a missing value respectively. While the correlation matrix and the reproduced correlation matrix for the proposed CSDP indicated 61% and the percentage of acceptance on the principal components for the proposed CSDP are higher than 50%. Therefore, from the outcome, it has shown that the acceptance responds towards the proposed CSDP and the result from the principal components analysis (eigenvalue analysis) are significant enough for implementation and can be adopted by organisations as a guidelines for organisation cyber security practices.
引用
收藏
页码:131 / 138
页数:8
相关论文
共 17 条
[1]  
[Anonymous], 2017, N.Y. Times
[2]  
Barrett M., 2018, P ANN
[3]  
CSIS, 2014, NET LOSS EST GLOB CO
[4]   Integrating IS Security with Knowledge Management: Are We Doing Enough To Thwart The Persistent Threat? [J].
Jennex, Murray ;
Durcikova, Alexandra .
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, :3452-3459
[5]  
Katsantonis N. Menelaos, 2019, 2019 IEEE Global Engineering Education Conference (EDUCON), P872, DOI 10.1109/EDUCON.2019.8725061
[6]   A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications [J].
Mahmud, Mufti ;
Kaiser, M. Shamim ;
Rahman, M. Mostafizur ;
Rahman, M. Arifur ;
Shabut, Antesar ;
Al-Mamun, Shamim ;
Hussain, Amir .
COGNITIVE COMPUTATION, 2018, 10 (05) :864-873
[7]  
Manky D., 2018, CYBER SECURITY THREA, P14
[8]  
Mat B., 2019, International Journal of Innovative Technology and Exploring Engineering, V8, P214
[9]  
McKune Sarah, 2015, Citizen Lab
[10]   An International Comparative Study on Cyber Security Strategy [J].
Min, Kyoung-Sik ;
Chai, Seung-Woan ;
Han, Mijeong .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02) :13-19