Cybersecurity Risks in Romanian Companies

Cybersecurity Risks in Romanian Companies

Anca Gabriela Petrescu, Marius Petrescu, Ioana Panagore, Florentina Raluca Bîlcan
DOI: 10.4018/978-1-7998-3473-1.ch087
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

During the last period, information and communication systems became an essential component of our society that, at its turn, became more and more dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process which, besides its benefits come to raise specific threats to their users' interests. Due to the high level of interconnectivity, it is essential that all members of the cyber community to be aware of their responsibilities in information security. Rising awareness is the first step towards a more trustful and credible communication information environment that is a pre-requisite of the information society. This chapter demonstrates, on the one hand, how Romanian organizations are able to optimize their information security risk in order to streamline their activities and, on the other hand, how security mechanisms have to be properly designed and commensurate with the specific threats for the specific types of information.
Chapter Preview
Top

Introduction

Risk management process is proving to be an essential factor for the development and stability of an organization, it is the basis for developing a sustainable strategy for achieving organizational objectives and the basis for planning and decision making (Singh & Fhom, 2017).

At the same time, sophisticated attacks are expected directed to the staff users of the communication and information systems, such as social engineering attacks, correlation between office, ISP, and home computers or mobile device attacks. State-sponsored cyber terrorism is of great concern for state authorities, as this new form of terrorism is cheap and ready available to practically everyone, on each side of the world and it can lead to major disruptions in modern societies. The uncertainty may take the form of either threats or opportunities. Thereby, each manager must handle threats, because otherwise the organization's objectives cannot be met and capitalize the opportunities to the benefit of the organization, proving efficiency (McQuade, 2006; He, Chen, Chan, & Bu, 2012).

Among the most important factors of disruptive impact on the activities of an organization, risk factors are, by far the leading place.

Risk, as defined in the western socio-economic and military environments, can occur anywhere: within the organization, structure, and decision-making process, the relationship with the external environment, the management and policies of the organization (Ruževičius & Gedminaitė, 2007).

In order to identify, analyze and organize organizational risk assessment activities to reiterate the importance of the organizational concepts of systems theory perspective (Hjortdal, 2011; Chen, Ge, & Xie, 2015).

Risk treatment is the second important step in risk management organizational stage where management organization has the key role in the adoption of the most appropriate decision in terms of the balance between the need to fulfill the performance indicators proposed and costs (Hadžiosmanović, Bolzoni, & Hartel, 2012).

Stage security risk treatment is based entirely on the results of the risk analysis phase, the risks have been identified and ranked in terms of the impact that their implementation can have on the organization's mission. This is why, security mechanisms have to be properly designed and commensurate with the specific threats for the specific types of information (Tropina & Callanan, 2015).

Choosing an effective strategy development organization should consider the risks and vulnerabilities exposed to treatment solutions adapted to the needs of each organization's risk and reduce costs, both short and long term. Meanwhile, the adoption of certain measures that contribute to risk management is conditioned by the nature of the organization and the costs incurred for these measures.

As such, also in Romanian companies, concern continues to diminish the effect of unwanted influence involves a compulsory, dedication of resources which, if prolonged neglect can radically affect the overall level of resources of an organization and therefore, the quality of its task.

In order to achieve this aim, the chapter analyzes a number of problems of research. Firstly, this study explores the Romanian organizations’ attitude towards information technology security. Secondly, the protection of this infrastructure represents a major concern of authorities all around the world. Information security has become a top of mind issue for the public, media and government. And last but not least, it investigates the necessity to develop a structured process of information security risk within the organization. It must be borne in mind that, regardless of the type of organization, the field of activity or form of organization, there is uncertainty both in organization and in the environment in which it operates. Given that uncertainty is a fact of life, then the uncertainty response should become a permanent managerial concern.

However, collective efforts are necessary, at both national authorities’ level and managers of public and private organizations in order to ensure a safe and trusted cyber space. The awareness of potential threats and vulnerabilities is thus vital, as well as preoccupation towards cooperation in countering them by well-established rules and mechanisms created at national and organizational level.

Key Terms in this Chapter

Risk Management: The implementation and updating of methods and tools to minimize risks associated with the information system of an organization, such as the Information Security policies, procedures and practices associated formalized and adopted other means in order to bring these risks to acceptable levels.

Prevention: Implementation of mechanisms that users not be able to counteract and are implemented correctly, unaltered, so the attacker cannot alter them.

Threats: The possibility of accidental or deliberate compromise of information security, the loss of confidentiality, integrity or availability or impaired functions that provide authenticity and non-repudiation of information.

Integrity: The prohibition amendment - by deleting or adding - or the unauthorized destruction of information; integrity refers to confidence in the data and resources of a system by which to manage information.

Complete Chapter List

Search this Book:
Reset