The Impact of Cybersecurity Practices on Cyberattack Damage: The Perspective of Small Enterprises in Saudi Arabia

被引:12
作者
Alharbi, Fawaz [1 ]
Alsulami, Majid [2 ]
AL-Solami, Abdullatif [3 ]
Al-Otaibi, Yazeed [3 ]
Al-Osimi, Meshaal [3 ]
Al-Qanor, Fahad [3 ]
Al-Otaibi, Khalid [3 ]
机构
[1] Shaqra Univ, Huraymila Coll Sci & Humanities, Comp Sci Dept, Shaqra 11961, Saudi Arabia
[2] Shaqra Univ, Community Coll Shaqra, Comp Sci Dept, Shaqra 11961, Saudi Arabia
[3] Shaqra Univ, Coll Comp & Informat Technol, Comp Sci Dept, Shaqra 11961, Saudi Arabia
关键词
cybersecurity; small enterprises; Saudi Arabia; data loss; AWARENESS;
D O I
10.3390/s21206901
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Small and medium-sized enterprises represent the majority of enterprises globally and yet have some difficulties in understanding the impact that cybersecurity threats could have on their businesses and the damage they could do to their assets. This study aims to measure the effectiveness of security practices at small-sized enterprises in Saudi Arabia in the event of a cybersecurity attack. Our paper is among the first research papers to measure the effectiveness of cybersecurity practices and the threat posed by cybersecurity breaches among small enterprises in the event of cybersecurity attacks. A total of 282 respondents participated, all of them representing small-sized enterprises in Saudi Arabia. The study applies multiple regression tests to analyze the effectiveness of 12 cybersecurity practices in three aspects: financial damage, loss of sensitive data, and restoration time, at small enterprises. The findings indicate that having an inspection team and a recovery plan may limit the financial damage caused by cybersecurity attacks on small enterprises. The results also show that cybersecurity awareness, knowledge of cybersecurity damage, and professionals' salaries were related to the loss of sensitive data. Furthermore, the results indicate that contact with cybersecurity authorities and having an inspection team have statistically significant effects on restoration time.</p>
引用
收藏
页数:14
相关论文
共 37 条
[1]   A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate [J].
Agrafiotis, Ioannis ;
Nurse, Jason R. C. ;
Goldsmith, Michael ;
Creese, Sadie ;
Upton, David .
JOURNAL OF CYBERSECURITY, 2018, 4 (01)
[2]  
Ajmi L., 2019, 2019 2 INT C COMP, P1, DOI DOI 10.1109/cais.2019.8769470
[3]   Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia [J].
Alsulami, Majid H. ;
Alharbi, Fawaz D. ;
Almutairi, Hamdan M. ;
Almutairi, Bandar S. ;
Alotaibi, Mohammed M. ;
Alanzi, Majdi E. ;
Alotaibi, Khaled G. ;
Alharthi, Sultan S. .
INFORMATION, 2021, 12 (05)
[4]  
[Anonymous], 2015, Internet Security Threat Report
[5]   Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs) [J].
Bada, Maria ;
Nurse, Jason R. C. .
INFORMATION AND COMPUTER SECURITY, 2019, 27 (03) :393-410
[6]  
Berisha G., 2015, ACAD J BUSINESS ADM, V1, P17
[7]  
Berry Christine T., 2018, International Journal of Business Continuity and Risk Management, V8, P1
[8]  
Brangetto P., 2015, Economic aspects of national cyber security strategies
[9]  
Capital Market Authority, 2019, CYB GUID CAP MARK
[10]  
Check Point Software Technologies Ltd, 2020, CYB SEC REP 2020