Information Security Management for Cyber Security Challenges in Smart Cities Security and Privacy
Abstract
Information security management universally needed and has become popular in our digital world. A growing proportion of human activities, such as social interactions, entertainment, shopping, and gathering information, are now mediated by digital services and devices that are needed to be protected 24/7 based on the information security triangle Confidentiality, Integrity, and Availability. Currently, there are more than 12.3 billion IoT devices connected to our digital world recording everything around us such as street cameras, smart security devices, smart refrigerators, smart watches, etc. These devices collect most of our daily time information as our health by smart watches, refrigerator needs, air condition status, GPS information, and so on. Much of our daily life activities and privacy collected by these digital devices connected to the Internet. The main objective of this research is to answer the question whether information security management can protect our daily life and privacy information to be able to live in safe life in our smart cities or not. The findings of this study suggest that lack of in-house expertise, insufficient funding, difficulty in locating right security talent, poor leadership and lack of accountability are the top cyber-security challenges. In addition, it was found that organizations are mediocrely prepared to detect, prevent and respond to cyber-threats. Furthermore, it was revealed that individuals have mediocre level of security awareness.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Human Behaviour in Cyber Security
Aljniebi, Alya (The British University in Dubai (BUiD), 2020-04)The aim of this research is to identify the history of cyber threats and define the cyber security system. Moreover, highlight the human behavior and factor that influencing the security system supported by a qualitative ... -
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
JUMA, MAZEN GHAZI (The British University in Dubai (BUiD), 2021-12)We are becoming progressively reliant on the Critical Information Infrastructures (CIIs) to provide essential services in our daily lives, such as telecommunications, energy facilities, financial systems, and power grids. ... -
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
ALSHAMSI, SUROUR (The British University in Dubai (BUiD), 2022-01)Currently, malware continues to represent one of the main computer security threats. It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis ...