Business Strategy analysis of Cybersecurity Incidents
In the current social and economic processes, information and communication services play a decisive role, changing several entities’ operations. The growing dependence that has developed over the last two decades made the security needs introduced political will, which has resulted in an iterative...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2021-06-01
|
Series: | Revista Academiei Forţelor Terestre |
Subjects: | |
Online Access: | https://doi.org/10.2478/raft-2021-0020 |
id |
doaj-c522c52b33fd4e3da3ffd07853793b88 |
---|---|
record_format |
Article |
spelling |
doaj-c522c52b33fd4e3da3ffd07853793b882021-09-05T14:01:18ZengSciendoRevista Academiei Forţelor Terestre2247-840X2021-06-0126213914810.2478/raft-2021-0020Business Strategy analysis of Cybersecurity IncidentsBederna Zsolt0Rajnai Zoltan1Szadeczky Tamas2Óbuda University, Budapest, HungaryÓbuda University, Budapest, HungaryMasaryk University, Brno, Czech RepublicIn the current social and economic processes, information and communication services play a decisive role, changing several entities’ operations. The growing dependence that has developed over the last two decades made the security needs introduced political will, which has resulted in an iterative evolution of the regulatory environment. Hence, the legal framework requires that several entities develop protection that includes controls enhancing both preventive and reactive in a risk-proportionate manner under the business value to be protected. Nevertheless, due to the nature of cybersecurity, the development of such capabilities is not the task of a single organisation but all entities involved in cyberspace, including, e.g., individuals, non-profit and for-profit organisations, public sector actors. Therefore, each involved entity should design protection capabilities in a risk-proportionate manner, which requires strategic approaches and tools and requires organisations to learn from security incidents. This paper reviews the essential formal security strategy formulation tools, applying in the Facebook’s case based on publicly available information. The analysis aims to confirm the importance of management’s attitude and support for tackling cybersecurity’s challenges.https://doi.org/10.2478/raft-2021-0020cybersecuritycybersecurity capabilitiescybersecurity strategy |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Bederna Zsolt Rajnai Zoltan Szadeczky Tamas |
spellingShingle |
Bederna Zsolt Rajnai Zoltan Szadeczky Tamas Business Strategy analysis of Cybersecurity Incidents Revista Academiei Forţelor Terestre cybersecurity cybersecurity capabilities cybersecurity strategy |
author_facet |
Bederna Zsolt Rajnai Zoltan Szadeczky Tamas |
author_sort |
Bederna Zsolt |
title |
Business Strategy analysis of Cybersecurity Incidents |
title_short |
Business Strategy analysis of Cybersecurity Incidents |
title_full |
Business Strategy analysis of Cybersecurity Incidents |
title_fullStr |
Business Strategy analysis of Cybersecurity Incidents |
title_full_unstemmed |
Business Strategy analysis of Cybersecurity Incidents |
title_sort |
business strategy analysis of cybersecurity incidents |
publisher |
Sciendo |
series |
Revista Academiei Forţelor Terestre |
issn |
2247-840X |
publishDate |
2021-06-01 |
description |
In the current social and economic processes, information and communication services play a decisive role, changing several entities’ operations. The growing dependence that has developed over the last two decades made the security needs introduced political will, which has resulted in an iterative evolution of the regulatory environment. Hence, the legal framework requires that several entities develop protection that includes controls enhancing both preventive and reactive in a risk-proportionate manner under the business value to be protected. Nevertheless, due to the nature of cybersecurity, the development of such capabilities is not the task of a single organisation but all entities involved in cyberspace, including, e.g., individuals, non-profit and for-profit organisations, public sector actors. Therefore, each involved entity should design protection capabilities in a risk-proportionate manner, which requires strategic approaches and tools and requires organisations to learn from security incidents. This paper reviews the essential formal security strategy formulation tools, applying in the Facebook’s case based on publicly available information. The analysis aims to confirm the importance of management’s attitude and support for tackling cybersecurity’s challenges. |
topic |
cybersecurity cybersecurity capabilities cybersecurity strategy |
url |
https://doi.org/10.2478/raft-2021-0020 |
work_keys_str_mv |
AT bedernazsolt businessstrategyanalysisofcybersecurityincidents AT rajnaizoltan businessstrategyanalysisofcybersecurityincidents AT szadeczkytamas businessstrategyanalysisofcybersecurityincidents |
_version_ |
1717810454438346752 |