𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Systems Security in Small and Medium-Sized Enterprises. Emerging Cybersecurity Threats in Times of Turbulence

✍ Scribed by Kennedy Njenga


Year
2022
Tongue
English
Leaves
116
Series
Cybercrime and Cybersecurity Research
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Contents
Preface
Chapter 1
Information Systems Security in SMEs and Emerging Cybersecurity Threats
1.1. Introduction
1.2. A Period of Turbulence and Uncertain Times for SMEs
1.3. A Brief Overview of Information Systems Security
1.3.1. A Brief Overview of Technology Evolution in SMEs
1.3.2. A Brief Overview of Information Systems Security and Cybersecurity in SMEs
1.4. Conclusion
Key Points
Chapter 2
An Overview of the Disciplines of Information Systems Security and Cybersecurity and the Role these Fields Play in SMEs
2.1. Introduction
2.2. SMEs Information Systems
2.2.1. SME Transaction Processing Systems
2.2.2. SME Management Information Systems
2.2.3. SME Decision Support Systems
2.2.4. SME Executive Support Systems
2.3. Information Systems Security and Cybersecurity
2.3.1. Approaches to Implementing Information Security in SMEs
2.3.2. Common Information Security Threats to SMEs Information Systems
2.4. Overview and Role of Information Systems Security in SMEs
2.4.1. Information and Cybersecurity Terminologies Relevant to SMEs
2.5. Measures to Information Security and Cybersecurity in SMEs
2.5.1. SME Attitude Towards Information and Cybersecurity Measures
2.5.2. SME Business Risk for Not Expending Security Measures
2.5.3. Impact of Cybersecurity Risk to SMEs
2.6. Information and Cybersecurity Controls Frameworks for SMEs
2.6.1. Useful Control Habits to Enhance Cybersecurity Awareness
2.6.2. Cyber-Insurance as a Control Tool for SMEs Cybersecurity Risk
2.7. Conclusion
Key Points
Chapter 3
Technology Evolution in SMEs
3.1. Introduction
3.2. The Historical Development of Technology in SMEs
3.2.1. Early Days of Technology Use in SMEs
3.2.2. Major Evolution of Technology Use in SMEs
3.3. Information Systems Security and Cybersecurity Threats Evolution in SMEs
3.3.1. Information Systems Security and Cybersecurity in SMEs in Early Days
3.3.2. Major Evolution in Information Systems Security and Cybersecurity in SMEs during and after COVID-19
3.3.3. Major Evolution in Cybersecurity Software Hardware and Networking Evolution in SMEs
3.4. Information Systems Security Governance Evolution
3.5. Conclusion
Key Points
Chapter 4
Information Systems Security Behavior and Culture in SMEs
4.1. Introduction
4.2. Culture and Behavior in SMEs Operations and Impact to Cybersecurity Threat Mitigation
4.3. The Role of the Insider as a Security Threat
4.4. Building Positive Cybersecurity Behavior and Culture in SMEs
4.4.1. Building Positive Cybersecurity Behavior by Making Procedures More Usable
4.4.2. Raising Awareness of the Risks of Using Technologies
4.4.3. Designing Security Measures and Techniques That Are Easy to Understand
4.4.4. Addressing Instances When the Employee Becomes an Information Security Risk
4.5. Conclusion
Key Points
Chapter 5
Information Systems Security and the Role of Women Entrepreneurs in SMEs
5.1. Introduction
5.2. Equity, Diversity and Inclusion for Career Women
5.3. Women Entrepreneurs in SMEs
5.3.1. Financing Technology and Entrepreneurial Struggle
5.3.2. Overcoming Fear of Failure by Women Entrepreneurs
5.3.3. Gender and Information Security Behavior
5.4. Women in Information Security and Cybersecurity Profession
5.4.1. Marriage and IT Career Women
5.4.2. Women in IT and Cybersecurity
5.4.3. Possible Cybersecurity Routes Women Can Pursue
5.5. Educating Women in Information and Cybersecurity
5.5.1. Certification and Formal Education for Women in Cybersecurity
5.5.2. Entrepreneurial Role of Women in Cybersecurity
5.5.3. Women in Cybersecurity Working from Home
5.5.4. Protecting Women Entrepreneurs in SMEs
5.6. Conclusion
Key Points
Chapter 6
Novel and Emergent Information and Cybersecurity Threats Facing SMEs during Lockdowns
6.1. Introduction
6.2. COVID-19 Pandemic Themed Exploits and Attacks to SMEs
6.2.1. Extended Phishing Campaigns
6.2.2. Emotet Malware
6.2.3. Distributed Denial of Service (DDoS) Attack
6.2.4. Bring Your Own Device (BYOD)
6.3. More Specialized SME Attacks
6.3.1. Ransomware Targeting SMEs
6.3.2. Supply Chain Attacks Targeting SMEs
6.3.3. Attacks on Collaborative Tools
6.3.4. Cross-Site Scripting (XSS)
6.4. Conclusion
Key Points
Chapter 7
Protecting Small Business Information in the Advent of Innovative Business Ideas
7.1. Introduction
7.2. The Evolution of Small Business Management
7.3. New Kinds of Technology-Centric SMEs
7.3.1. Metaverse and the Age of New Business Ideas for SMEs
7.3.2. Protecting SMEs Information in the Metaverse
7.4. Conclusion
Key Points
Chapter 8
The Fourth Industrial Revolution and Information Security for SMEs
8.1. Introduction
8.2. Artificial Intelligence and Machine Learning in Information Security for SMEs
8.2.1. Artificial Intelligence and Machine Learning
8.3. Big Data Analytics in SMEs: No Data Is Too Big for Small Businesses
8.3.1. Improving Analytic Capabilities of SMEs
8.3.2. Big Data Use for Information Security by SMEs
8.3.3. Security Threat Analysis in SMEs Using Big Data
8.3.4. Examples of Open Source Platforms for Security Threat Analysis in SMEs
8.4. The Internet of Everything and Impact to Information Security in SMEs
8.5. Conclusion
Key Points
Chapter 9
Synopsis to Information Security in SMEs and the Future of Technology
9.1. Synopsis on Information Systems Security
9.2. Synopsis on the Disciplines of Information Systems Security and Cybersecurity
9.3. Synopsis on Technology Evolution
9.4. Synopsis of Information Systems Security Behavior and Culture
9.5. Synopsis of Information Systems Security and the Role of Women Entrepreneurs
9.6. Synopsis of Novel and Emergent Information and Cybersecurity Threats
9.7. Synopsis of Protecting Small Business Information in the Advent of Innovative Business Ideas
9.8. Synopsis of the Fourth Industrial Revolution and Information Security
About the Author
References
Index
Blank Page
Blank Page


πŸ“œ SIMILAR VOLUMES


Information Systems Security: in Small a
✍ Kennedy Njenga πŸ“‚ Library πŸ“… 2022 πŸ› Nova Science Publishers 🌐 English

This book is the outcome of a review of literature on the possible concerns and issues Small and Medium-Sized Enterprises (SMEs) would face when adopting the fourth industrial revolution (4IR) technologies. From a review of the current and past literature, this book disseminates insightful ideas and

Information Systems for Small and Medium
✍ Erik Guldentops (auth.), Jan Devos, Hendrik van Landeghem, Dirk Deschoolmeester πŸ“‚ Library πŸ“… 2014 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book establishes and explores existing and emerging theories on Small and Medium-sized Enterprises (SMEs) and the adoption of IT/IS. It presents the latest empirical research findings in that area of IS research and explores new technologies and practices. The book is written for researchers

Energy Efficiency in Small and Medium Si
✍ Marika, Julia Illman, Laura Oja, Iivo VehvilΓ€inen, Gaia Consulting πŸ“‚ Library πŸ“… 2014 πŸ› Nordic Council of ministers 🌐 English

The EU’s Directive 2012/27/EU on energy efficiency obliges Member States to develop programmes to encourage small and medium sized enterprises (SMEs) to improve energy efficiency by implementing energy audits and the recommendations that stem from these audits. <br /> <br />This study looks at the

Safety management in small and medium si
✍ George Boustras, Frank W. Guldenmund πŸ“‚ Library πŸ“… 2018 πŸ› CRC Press 🌐 English

<P>Safety is an important aspect of everyday business operations. It can have an impact on the operations of an enterprise as well as the wellbeing of the workers. Literature shows that SMEs face extra problems in this area due to limited resources and lack of knowledge. A potential accident on the