Skip to main content

2021 | OriginalPaper | Buchkapitel

Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator

verfasst von : Ahmed Adel, Dilshad Sarwar, Amin Hosseinian-Far

Erschienen in: Cybersecurity, Privacy and Freedom Protection in the Connected World

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Organisations are facing sophisticated and advanced persistent threats (APT) that are targeting sensitive information assets. Any form of cyber-presence can be typically attacked by adversaries, and the motives of such attacks are context dependent. Besides, users and organisations are prone to software vulnerabilities, misconfigurations, outdated systems and several other systemic deficiencies which can be leveraged to compromise enterprise assets and gain an initial foothold within an organisation network. The aim of the paper is to develop a flexible and generally comprehensive organisational strategy to defend against the massive increase in cyberattacks, in order to protect the strategic business objectives of an organisation and keep an alignment between business objectives and security. Moreover, this paper reflects on the work undertaken by multiple teams within the chosen case study organisation to enhance the cybersecurity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Mohannadi H, Awan I, Al Hamar J, Al Hamar Y, Shah M, Musa A (2018) Understanding awareness of cyber security threat among IT employees. In: Proceedings2018 IEEE 6th international conference on future internet of things and cloud workshops, W-FiCloud 2018, pp 188–192 Al-Mohannadi H, Awan I, Al Hamar J, Al Hamar Y, Shah M, Musa A (2018) Understanding awareness of cyber security threat among IT employees. In: Proceedings2018 IEEE 6th international conference on future internet of things and cloud workshops, W-FiCloud 2018, pp 188–192
2.
Zurück zum Zitat Alturki A, Gable GG, Bandara W (2013) The design science research roadmap: in progress evaluation. In: PACIS 2013 proceedings Alturki A, Gable GG, Bandara W (2013) The design science research roadmap: in progress evaluation. In: PACIS 2013 proceedings
3.
Zurück zum Zitat vila C, Chinchilla EJ, Velásquez Pérez T (2019) It governance model for state entities, as support for compliance with the information security and privacy component in the framework of the digital government policy. J Phys: Conf Ser 1409(1) vila C, Chinchilla EJ, Velásquez Pérez T (2019) It governance model for state entities, as support for compliance with the information security and privacy component in the framework of the digital government policy. J Phys: Conf Ser 1409(1)
4.
Zurück zum Zitat Bada M, Sasse A, Nurse J (2019) Cyber security awareness campaigns: why they fail to change behavior. Int Conf Cyber Secur Sustain Soc 38 Bada M, Sasse A, Nurse J (2019) Cyber security awareness campaigns: why they fail to change behavior. Int Conf Cyber Secur Sustain Soc 38
6.
Zurück zum Zitat Bisandu DB (2016) Design science research methodology in computer science and information systems. Int J Inf Technol 1–7 Bisandu DB (2016) Design science research methodology in computer science and information systems. Int J Inf Technol 1–7
7.
Zurück zum Zitat Bisandu DB, Prasad R, Liman MM (2018) Clustering news articles using efficient similarity measure and N-grams. Int J Knowl Eng Data Min 5(4):333–348CrossRef Bisandu DB, Prasad R, Liman MM (2018) Clustering news articles using efficient similarity measure and N-grams. Int J Knowl Eng Data Min 5(4):333–348CrossRef
8.
Zurück zum Zitat Crumpler W, Lewis JA (2019) The cybersecurity workforce gap. Cent Strat Int Stud (CSIS) 1–10 Crumpler W, Lewis JA (2019) The cybersecurity workforce gap. Cent Strat Int Stud (CSIS) 1–10
9.
Zurück zum Zitat Demertzis K, Tziritas N, Kikiras P, Sanchez SL, Iliadis L (2019) The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn Comput 3(1):6CrossRef Demertzis K, Tziritas N, Kikiras P, Sanchez SL, Iliadis L (2019) The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn Comput 3(1):6CrossRef
10.
Zurück zum Zitat de Bruijn H, Janssen M (2017) Building cybersecurity awareness: the need for evidence-based framing strategies. Govt Inf Q 34(1):1–7CrossRef de Bruijn H, Janssen M (2017) Building cybersecurity awareness: the need for evidence-based framing strategies. Govt Inf Q 34(1):1–7CrossRef
12.
Zurück zum Zitat Gundu T, Flowerday SV (2013) Ignorance to awareness: towards an information security awareness process. SAIEE Afr Res J 104(2):69–79CrossRef Gundu T, Flowerday SV (2013) Ignorance to awareness: towards an information security awareness process. SAIEE Afr Res J 104(2):69–79CrossRef
13.
Zurück zum Zitat Gleasurea R (2015) When is a problem a design science problem? Syst, Signs Actions 9(1):9–25 Gleasurea R (2015) When is a problem a design science problem? Syst, Signs Actions 9(1):9–25
14.
Zurück zum Zitat Hevner R, Salvator A, Jinsoo Park T, Sudha R (2004). Design science in information science Hevner R, Salvator A, Jinsoo Park T, Sudha R (2004). Design science in information science
16.
Zurück zum Zitat Jahankhani H, Al-Nemrat A, Hosseinian-Far A (2014) Cybercrime classification and characteristics. In: Cyber crime and cyber terrorism investigators handbook, pp 149–164 Jahankhani H, Al-Nemrat A, Hosseinian-Far A (2014) Cybercrime classification and characteristics. In: Cyber crime and cyber terrorism investigators handbook, pp 149–164
18.
Zurück zum Zitat Kapur R (2017) Organization and administration in adult and community Education. Int J Inf, Bus Manag 9(1):141 Kapur R (2017) Organization and administration in adult and community Education. Int J Inf, Bus Manag 9(1):141
19.
Zurück zum Zitat Limba T, , Agafonov K, Damkus M (2017) Cyber security management model for critical infrastructure. Int J Entrep Sustain Issues 4(4):559–573 Limba T, , Agafonov K, Damkus M (2017) Cyber security management model for critical infrastructure. Int J Entrep Sustain Issues 4(4):559–573
21.
Zurück zum Zitat Paul P, Bhuimali A, Aithal PS, Rajesh R (2018) Cyber security to information assurance: an overview. Int J Recent Res Sci, Eng Technol (IJRRSET) 1–9 Paul P, Bhuimali A, Aithal PS, Rajesh R (2018) Cyber security to information assurance: an overview. Int J Recent Res Sci, Eng Technol (IJRRSET) 1–9
22.
Zurück zum Zitat Peffers K, Tuunanen T, Niehaves B (2018) Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research. Eur J Inf Syst 27(2):129–139CrossRef Peffers K, Tuunanen T, Niehaves B (2018) Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research. Eur J Inf Syst 27(2):129–139CrossRef
23.
Zurück zum Zitat Rhodes RE, McEwan D, Rebar AL (2019) Theories of physical activity behaviour change: a history and synthesis of approaches. Psychol Sport Exerc 42(2019):100–109CrossRef Rhodes RE, McEwan D, Rebar AL (2019) Theories of physical activity behaviour change: a history and synthesis of approaches. Psychol Sport Exerc 42(2019):100–109CrossRef
24.
Zurück zum Zitat Safa NS, Sookhak M, Von Solms R, Furnell S, Ghani NA, Herawan T (2015) Information security conscious care behaviour formation in organisations. Comput Secur 53:65–78CrossRef Safa NS, Sookhak M, Von Solms R, Furnell S, Ghani NA, Herawan T (2015) Information security conscious care behaviour formation in organisations. Comput Secur 53:65–78CrossRef
25.
Zurück zum Zitat Sallos MP, Garcia-Perez A, Bedford D, Orlando B (2019) Strategy and organisational cybersecurity: a knowledge-problem perspective. J Intellect Cap. 20(4):581–597CrossRef Sallos MP, Garcia-Perez A, Bedford D, Orlando B (2019) Strategy and organisational cybersecurity: a knowledge-problem perspective. J Intellect Cap. 20(4):581–597CrossRef
26.
Zurück zum Zitat Staff I (2016) CISM review manual, 15th ed. Information systems audit and control association Staff I (2016) CISM review manual, 15th ed. Information systems audit and control association
29.
Zurück zum Zitat Sennewald CA, Baillie C (2020) Effective security management. Butterworth-Heinemann Sennewald CA, Baillie C (2020) Effective security management. Butterworth-Heinemann
32.
Zurück zum Zitat Vukašinovi M (2018) Cyber security measures in companies. Int J Econ Stat 6:125–128 Vukašinovi M (2018) Cyber security measures in companies. Int J Econ Stat 6:125–128
33.
Zurück zum Zitat Vähäkainu P, Lehto M (2019) Artificial intelligence in the cyber security environment. In: 14th International conference on cyber warfare and security, ICCWS 2019, pp 431–440 Vähäkainu P, Lehto M (2019) Artificial intelligence in the cyber security environment. In: 14th International conference on cyber warfare and security, ICCWS 2019, pp 431–440
34.
Zurück zum Zitat von Solms B, von Solms R (2018) Cybersecurity and information securitywhat goes where? Inf Comput Secur 26(1):2–9CrossRef von Solms B, von Solms R (2018) Cybersecurity and information securitywhat goes where? Inf Comput Secur 26(1):2–9CrossRef
35.
Zurück zum Zitat Weir C, Becker I, Noble J, Blair L, Sasse MA, Rashid A (2019) Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw-Pract Exp. 50(3):275–298CrossRef Weir C, Becker I, Noble J, Blair L, Sasse MA, Rashid A (2019) Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers. Softw-Pract Exp. 50(3):275–298CrossRef
36.
Zurück zum Zitat Yu Y, Kaiya H, Yoshioka N, Hu Z, Washizaki H, Xiong Y, Hosseinian-Far A (2018) Goal modelling for security problem matching and pattern enforcement. Int J Secur Softw Eng. 8(3):42–57CrossRef Yu Y, Kaiya H, Yoshioka N, Hu Z, Washizaki H, Xiong Y, Hosseinian-Far A (2018) Goal modelling for security problem matching and pattern enforcement. Int J Secur Softw Eng. 8(3):42–57CrossRef
Metadaten
Titel
Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator
verfasst von
Ahmed Adel
Dilshad Sarwar
Amin Hosseinian-Far
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-68534-8_28