Are small medium enterprises cyber aware? International Conference on Global Security, Safety and Sustainability (ICGS3)

Homan Forouzan, Amin Hosseinian Far, Dilshad Sarwar

Research output: Other contribution

Abstract

Technology has become a pivotal point in our society, this de-pendency is becoming increasingly more critical on a daily basis. . This rang-es from people to businesses and on a larger scale government organisations who are now increasingly focusing on becoming more cyber resilient. This paper intends to provide an overview as to why a comprehensive knowledge management framework is necessity for SMEs on tackling cyber and cyber-enabled crimes. The paper explores new sources of data to reliably under-stand the importance as to why such a framework is required. This type of system can pave the way for SME’s to devise their cyber strategy and to be able to respond efficiently to cyber-related incidents. One of the cyber weak-ness and vulnerabilities for the SME’s are through their interactivity and or engagement with their suppliers and customers. Namely the interactions which take place via their respective internet sites, email communications, ports (using external devices, USB, CD drive, SD cards etc...) or the router (The use of their WIFI systems). The benefits of this framework model will be primarily to educate SME’s in becoming more cyber resilient and provide them with the knowledge, awareness and techniques to identify weaknesses and vulnerabilities in their computer networks, devices and internet usage.
Original languageEnglish
PublisherSpringer Nature Link
ISBN (Print)978-3-031-20159-2
ISBN (Electronic)978-3-031-20160-8
DOIs
Publication statusPublished - 3 Jan 2023

Publication series

Name Advanced Sciences and Technologies for Security Applications (ASTSA)
PublisherSpringer
ISSN (Print)1613-5113
ISSN (Electronic)2363-9466

Fingerprint

Dive into the research topics of 'Are small medium enterprises cyber aware? International Conference on Global Security, Safety and Sustainability (ICGS3)'. Together they form a unique fingerprint.

Cite this