Affiliation:
1. University of Warmia and Mazury in Olsztyn
2. Warsaw University of Life Sciences
3. Koszalin University of Technology
Abstract
The objective of this paper is to analyse the threats arising from the rapid development of information and communication technologies (ICTs) without which contemporary information-based societies would not be able to function properly. The authors have advanced the thesis that most perpetrators turn to social engineering methods to carry out cyberattacks, while users of information systems are the weakest links of every cybersecurity management system. The article is also an attempt to define the notions of cybersecurity and cybersecurity management. To this end, the authors have analysed the applicable legal regulations.They have also explored cyberthreats to which small and medium-sized enterprises are exposed, and demonstrated opportunities for further research into the issues being discussed.
Reference45 articles.
1. Schmitt M. Artificial Intelligence in Business Analytics: Capturing Value With Machine Learning Applications in Financial Services, Doctoral Thesis, University of Strathclyde, 2020, https://doi.org/10.48730/5s00-jd45.
2. Kaczmarek K. Zapobieganie zagrożeniom cyfrowym na przykładzie Republiki Estońskiej i Republiki Finlandii. Cybersecurity and Law, 2019; 1:143-157.
3. Polskie Centrum Badań i Certyfikacji. Czym jest System Zarządzania PN-EN ISO/IEC 27001. https://www.pcbc.gov.pl/pl/uslugi/certyfikacja-systemow-zarzadzania/pluslugicertyfikacja-systemow-zarzadzaniapn-iso-iec-27001 (3 December 2023, date last accessed)
4. Alahmari A., Duncan B. Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence, 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, 2020: 1-5.
5. Ioannou M., E., Bada M. Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination, 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, 2019: 1-4.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献