Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Linked to FindBook
Google Book
Amazon
博客來
A Study on the Efficacy of Small Business Cybersecurity Controls.
Record Type:
Electronic resources : Monograph/item
Title/Author:
A Study on the Efficacy of Small Business Cybersecurity Controls./
Author:
McLaurin, Timothy.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
Description:
102 p.
Notes:
Source: Dissertations Abstracts International, Volume: 83-02, Section: B.
Contained By:
Dissertations Abstracts International83-02B.
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28645982
ISBN:
9798534699272
A Study on the Efficacy of Small Business Cybersecurity Controls.
McLaurin, Timothy.
A Study on the Efficacy of Small Business Cybersecurity Controls.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 102 p.
Source: Dissertations Abstracts International, Volume: 83-02, Section: B.
Thesis (D.Sc.)--Marymount University, 2021.
This item must not be sold to any third party vendors.
Research has found that small and medium businesses are less prepared for cybersecurity attacks, and less resilient in responding. My study, based on a survey of small and medium business owners or managers, indicates that the resources these businesses need to prevent and bounce back from cyberattacks are available but the decisionmakers may not be aware of them, or may not have implemented the controls properly. The primary question this research seeks to answer is: what are the challenges and the current defensive measures commonly implemented by small businesses? Responses showed commonalities between data breaches that occurred among the surveyed businesses. Since attackers reuse techniques to infiltrate environments and exfiltrate with sensitive information, then similar security controls could potentially be effective in mitigating the attack vectors in many small and medium businesses. The small and medium businesses in this study do not align their security with the threat actors they face. Nor are the controls they have in place designed to mitigate an attacker utilizing modern attacker techniques. The missing controls include those of technical and non-technical natures. However, respondents have an appetite for improving their security with a focus on which controls are most impactful in preventing a breach. The prevailing belief was that small and medium businesses lacked the resources to protect their data assets. The findings indicate decision-makers want the right resources but need the knowledge to implement them. Respondents' answers and comments are mapped back to best practice frameworks in cybersecurity. Recommendations are made that will help decision-makers understand the appropriateness and efficacy of available cybersecurity controls.
ISBN: 9798534699272Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
Cybersecurity
A Study on the Efficacy of Small Business Cybersecurity Controls.
LDR
:02964nmm a2200385 4500
001
2349583
005
20230509091119.5
006
m o d
007
cr#unu||||||||
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798534699272
035
$a
(MiAaPQ)AAI28645982
035
$a
AAI28645982
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
McLaurin, Timothy.
$3
3688993
245
1 0
$a
A Study on the Efficacy of Small Business Cybersecurity Controls.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
102 p.
500
$a
Source: Dissertations Abstracts International, Volume: 83-02, Section: B.
500
$a
Advisor: Schaeffer, Donna.
502
$a
Thesis (D.Sc.)--Marymount University, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
Research has found that small and medium businesses are less prepared for cybersecurity attacks, and less resilient in responding. My study, based on a survey of small and medium business owners or managers, indicates that the resources these businesses need to prevent and bounce back from cyberattacks are available but the decisionmakers may not be aware of them, or may not have implemented the controls properly. The primary question this research seeks to answer is: what are the challenges and the current defensive measures commonly implemented by small businesses? Responses showed commonalities between data breaches that occurred among the surveyed businesses. Since attackers reuse techniques to infiltrate environments and exfiltrate with sensitive information, then similar security controls could potentially be effective in mitigating the attack vectors in many small and medium businesses. The small and medium businesses in this study do not align their security with the threat actors they face. Nor are the controls they have in place designed to mitigate an attacker utilizing modern attacker techniques. The missing controls include those of technical and non-technical natures. However, respondents have an appetite for improving their security with a focus on which controls are most impactful in preventing a breach. The prevailing belief was that small and medium businesses lacked the resources to protect their data assets. The findings indicate decision-makers want the right resources but need the knowledge to implement them. Respondents' answers and comments are mapped back to best practice frameworks in cybersecurity. Recommendations are made that will help decision-makers understand the appropriateness and efficacy of available cybersecurity controls.
590
$a
School code: 2210.
650
4
$a
Information technology.
$3
532993
650
4
$a
Business administration.
$3
3168311
650
4
$a
Consortia.
$3
2129924
650
4
$a
Software.
$2
gtt.
$3
619355
650
4
$a
Malware.
$3
3562952
650
4
$a
Security management.
$3
3562413
650
4
$a
Firewalls.
$3
3681935
650
4
$a
ISO standards.
$3
3558997
653
$a
Cybersecurity
653
$a
Information technology
653
$a
Ransomware
653
$a
Security
653
$a
Small business
690
$a
0489
690
$a
0310
710
2
$a
Marymount University.
$b
Information Technology.
$3
3682682
773
0
$t
Dissertations Abstracts International
$g
83-02B.
790
$a
2210
791
$a
D.Sc.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28645982
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9472021
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login