Open Access Open Access  Restricted Access Subscription or Fee Access

Technology and Trend Point of View Cyber Security

R. Kumudha, AR. Abirami

Abstract


In today’s business environment, disruptive technologies such as cloud computing, social computing, and next-generation mobile computing are fundamentally changing how organizations utilize information technology for sharing information and conducting commerce online. This wave of technology innovation, often driven by consumer trends which are being rapidly adopted across the enterprise, has created unparalleled levels of access and connectivity across people, information, systems and assets worldwide and has transformed today’s network-delivered society. In the Cyber Security arena, the increasing sophistication, frequency and scale of cyber-crime as a rapid result of this open and network-oriented society, coupled with the recent explosion in the use of “edge” devices and cloud-based applications, and increasing regulatory and compliance requirements, has created an urgent need for organizations to rapidly advance their security counter-measures and re-think traditional approaches. On a more global level, due to the compelling and pressing nature of the issues involved, many countries have elevated Cyber Security to a top-tier priority within their national security strategies.

To keep pace and stay ahead of escalating risk levels while at the same time efficiently managing costs, business leaders need to rethink their Cyber Security postures in the context of a broader risk management strategy and adopt a new strategic framework that addresses these numerous disruptive trends across the IT landscape. By having a logical framework for understanding Cyber Security, and the major domains it represents, enterprises can implement their Cyber strategies and develop specific plans tailored for each domain and exposure area in a holistic manner. Key focus areas should include governance, risk and compliance, users (identity assurance regardless of location or device type), data (sensitive data protection no matter where it resides), applications (application security modernization), infrastructure (securing the “borderless” enterprise including cloud computing) and assets (cyber supply chain). The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments, so by ensuring the Cyber Security strategy addresses all of these inter-related trends, business leaders can be confident of a defense-in-depth approach.

For businesses and governments alike, getting the Cyber Security posture right across all its elements will be vital for future growth, innovation and competitive advantage in order to truly exploit the business and economic opportunities provided by technologies such as cloud, mobile and social computing as well as smart computing and IT appliances. A Cyber Security-related mis-step in any of these rapidly emerging areas can lead to lost productivity and potentially serious damage to brand reputation. There is no single answer for success, but by working across public- and private sector partnerships and by advancing security measures particularly with regard to mission-critical systems, processes and applications that are connected into cyberspace, businesses will be able to work towards a future environment that is both open and secure and prosperous.

Keywords


Cyber Security, Cloud Computing

Full Text:

PDF

References


“Cyber Security Strategy of the United Kingdom”, June 2009, http://www.computerweekly.com/blogs/read-all-about- it/Cabinet%20 Office % 20 Cyber Security % 20 review% 2009. pdf

“A Strong Britaininan Age of Uncertainty: The National Security Strategy”, October 2010, http://www.cabinetoffice.gov.uk/sites/default/files/resources/national-security-strategy.pdf Ditto

Top10 Security Stories of 2010”, Information Week, December 2010, http://www.informationweek.com/news/galleries/security/management/showArticle.jhtml?articl eID=228800665&pgno=1&isPrev=

“FirstAnnualCostofCyberCrimeStudy”,PonemonInstitute,July2010, http://www.arcsight.com/collateral/whitepapers/Ponemon_Cost_of_Cyber_Crime_study_2010.pdf

“Five Countries: Costof DataBreach”, Ponemon Institute, April 2010, http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/2010%20Global%20CODB.pdf

“A Consumer Revolution in the Enterprise“, IDC, June 2010, http://www.unisys.com/unisys/ri/report/detail.jsp?id=1120000970003910071&pid=&sid=3100002 Ditto

“Securing the Cyber Supply Chain”, Information Week, November 2009, http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=2216 00499&pgno=1&queryText=&isPrev=#


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.