DocumentCode
183168
Title
A strategic framework for managing internet security
Author
Sitnikova, E. ; Asgarkhani, M.
Author_Institution
Sch. of I.T. & Math. Sci., Univ. of South Australia, Adelaide, SA, Australia
fYear
2014
fDate
19-21 Aug. 2014
Firstpage
947
Lastpage
955
Abstract
The internet which was originally developed as an open distributed system has since evolved to become a key platform for connectivity of businesses and communities. Today, the internet is used for transferring critical information amongst sophisticated systems. These systems extend beyond one business organization to community of customers and suppliers. Consequently, today, vulnerabilities and risks to the Internet are equally relevant to systems that are integrated within corporate networks. Cloud Computing solutions, Supervisory Control and Data Acquisition (SCADA) systems and the Bring Your Own Device (BYOD) approach adopted by some organizations are examples of complexity of managing Internet security today. These systems are not only vulnerable to own system specific issues but also threatened by other Internet-related vulnerabilities. Whilst numerous previous studies have identified the need for managing Internet security, there remains a need for taking a strategic approach in security management of the Internet and sensitive Industrial Control Systems (ICS) integrated systems. This paper examines research on Internet security using a risk management approach. It presents an overview of key issues and recommends a management framework for secure Internet access.
Keywords
Bring Your Own Device; SCADA systems; business data processing; cloud computing; industrial control; open systems; risk management; security of data; BYOD approach; ICS integrated systems; Internet security management; SCADA systems; bring your own device approach; business organization; cloud computing solutions; industrial control system integrated systems; open distributed system; risk management approach; supervisory control and data acquisition systems; Cloud computing; Computer crime; Computer hacking; Organizations; SCADA systems; Cloud Computing; Cyber Security; Internet Security; Risk Management; SCADA Systems; Strategic Security Management;
fLanguage
English
Publisher
ieee
Conference_Titel
Fuzzy Systems and Knowledge Discovery (FSKD), 2014 11th International Conference on
Conference_Location
Xiamen
Print_ISBN
978-1-4799-5147-5
Type
conf
DOI
10.1109/FSKD.2014.6980967
Filename
6980967
Link To Document