Microsoft Word HenryOkupa2020
Download 0.84 Mb. Pdf ko'rish
|
HenryOkupa2020
- Bu sahifa navigatsiya:
- Chapter I: Introduction ......................................................................................................... 1
- Chapter II: Cybersecurity Literature – Selected overview ............................................... 8
- Chapter III: Dealing with Cyber security threats ............................................................ 25
TABLE OF CONTENTS
List of Figures ......................................................................................................................... vi Acknowledgments ................................................................................................................. vii Chapter I: Introduction ......................................................................................................... 1 1.1 Cybersecurity Defined .................................................................................................. 2 1.2 Research Problem ......................................................................................................... 5 1.3 Research Question ........................................................................................................ 6 1.4 Research Objectives ..................................................................................................... 6 1.5 Overview of Methods ................................................................................................... 7 1.6 Outline of the Thesis .................................................................................................... 7 Chapter II: Cybersecurity Literature – Selected overview ............................................... 8 2.1 Cybersecurity Risks ...................................................................................................... 8 2.2 Possible Avenues for Cyber-Attacks and the Agri-Food Sector .............................. 11 2.3 Cybersecurity in the Agri-Food Sector ...................................................................... 19 Chapter III: Dealing with Cyber security threats ............................................................ 25 3.1 Threat to Confidentiality ............................................................................................ 25 3.1.1 Unfairly unauthorized use to confidential data ................................................ 25 3.1.2 Publishing confidential information that could be damaging from suppliers . 26 3.1.3 The intentional data theft and/ unintentional data leakage .............................. 26 3.2 Integrity ....................................................................................................................... 26 3.2.1 Rogue data introduction into network .............................................................. 26 3.2.2 Falsification of data to disrupt both crop and livestock ................................... 27 3.3 Availability ................................................................................................................. 27 3.3.1 Timing of Equipment Availability ................................................................... 27 3.3.2 The Disruption to navigational., positioning and time systems ....................... 28 3.3.3 Disruption to communication networks ........................................................... 28 3.3.4 Foreign Supply Chain ....................................................................................... 28 3.4 Mitigating Cybersecurity Threats .............................................................................. 28 3.4.1 Block Chain ....................................................................................................... 29 3.4.2 Back up Files ..................................................................................................... 32 3.4.3 Do not open unknown emails ........................................................................... 32 3.4.4 Run up to date antivirus software ..................................................................... 32 v 3.4.5 Password management ...................................................................................... 33 3.4.6 Install firewall and closed unused ports ........................................................... 35 3.4.7 Employee training and education ..................................................................... 35 3.4.8 BYOD ................................................................................................................ 36 3.5 Conclusion .................................................................................................................. 37 |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling