Abstract:
It reviews main cybersecurity risks including: computer worms and viruses, organized criminal activity, weak links in the global information infrastructure, hackers, potential military operations, and the rapid evolution of Information and Communication Technologies (ICTs). It then offers a network model based on three different stakeholders: policymakers, policy implementers, and operational personnel. The model functions include: threat assessment, the development of mechanisms to respond to cyber incidents and attacks, and the improvement of system security and application software, among others.
Industry Focus:
Information & Telecommunication,Internet & Cyberspace