Microsoft Word HenryOkupa2020


Download 0.84 Mb.
Pdf ko'rish
bet2/20
Sana14.09.2023
Hajmi0.84 Mb.
#1678285
1   2   3   4   5   6   7   8   9   ...   20
Bog'liq
HenryOkupa2020

TABLE OF CONTENTS 
List of Figures ......................................................................................................................... vi
Acknowledgments ................................................................................................................. vii
Chapter I: Introduction ......................................................................................................... 1
1.1 Cybersecurity Defined .................................................................................................. 2
1.2 Research Problem ......................................................................................................... 5
1.3 Research Question ........................................................................................................ 6
1.4 Research Objectives ..................................................................................................... 6
1.5 Overview of Methods ................................................................................................... 7
1.6 Outline of the Thesis .................................................................................................... 7
Chapter II: Cybersecurity Literature – Selected overview ............................................... 8
2.1 Cybersecurity Risks ...................................................................................................... 8
2.2 Possible Avenues for Cyber-Attacks and the Agri-Food Sector .............................. 11
2.3 Cybersecurity in the Agri-Food Sector ...................................................................... 19
Chapter III: Dealing with Cyber security threats ............................................................ 25
3.1 Threat to Confidentiality ............................................................................................ 25
3.1.1 Unfairly unauthorized use to confidential data ................................................ 25
3.1.2 Publishing confidential information that could be damaging from suppliers . 26
3.1.3 The intentional data theft and/ unintentional data leakage .............................. 26
3.2 Integrity ....................................................................................................................... 26
3.2.1 Rogue data introduction into network .............................................................. 26
3.2.2 Falsification of data to disrupt both crop and livestock ................................... 27
3.3 Availability ................................................................................................................. 27
3.3.1 Timing of Equipment Availability ................................................................... 27
3.3.2 The Disruption to navigational., positioning and time systems ....................... 28
3.3.3 Disruption to communication networks ........................................................... 28
3.3.4 Foreign Supply Chain ....................................................................................... 28
3.4 Mitigating Cybersecurity Threats .............................................................................. 28
3.4.1 Block Chain ....................................................................................................... 29
3.4.2 Back up Files ..................................................................................................... 32
3.4.3 Do not open unknown emails ........................................................................... 32
3.4.4 Run up to date antivirus software ..................................................................... 32



3.4.5 Password management ...................................................................................... 33
3.4.6 Install firewall and closed unused ports ........................................................... 35
3.4.7 Employee training and education ..................................................................... 35
3.4.8 BYOD ................................................................................................................ 36
3.5 Conclusion .................................................................................................................. 37


vi 

Download 0.84 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   20




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling