Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

CHAPTER 11CYBERSECURITY AT ORGANIZATIONS: A DELPHI PILOT STUDY OF EXPERT OPINIONS ABOUT POLICY AND PROTECTION

Holly Reitmeier1, Jolanda Tromp2, John Bottoms3

1 State University of New York at Oswego, Oswego, New York, USA

2 Duy Tan University, Danang, Vietnam

3 FirstStar Systems, USA

Emails: holly.reitmeier@oswego.edu, jolanda.tromp@duytan.edu.vn, john@firststarsystems.com

Abstract

Cybercrime is becoming more and more prevalent in today’s society and attackers are continuously discovering new methods to hack systems. Monitoring and maintaining computer network security is a complex process that presents unique challenges. If security is not constantly strengthened, cyber threats have the potential to affect millions of systems, all of which share similar vulnerabilities.

The issues surrounding cybercrimes are exponentially different than other types of crimes carried out in society. Therefore, federal law enforcement agencies are faced with the difficult task of generating new approaches to combat them. This chapter explores the concepts of cybercrime and cybersecurity, presents the statistical impact it is having on organizations, and demonstrates the importance of an effective cybersecurity policy manual. It also describes the methodology used for this research, analyzes the data provided by expert testimonials, and introduces the development of a new innovative technological method (Blockchain) to minimize the risk of the cyber world. The analyses cover the extent to which ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book