This section begins by considering the importance of e-services in cyberspace, emphasizing the need for cybersecurity measures to protect these services. These measures are then reviewed considering key sources. Based on this background, the problem addressed in this paper is identified.
1.1 Cyberspace and Cybersecurity
The word cyberspace refers to “the online world of computer networks and the internet” (Merriam-Webster’s Learner’s Dictionary, 2020), which covers the whole world that is our physical space. This involves the various organizations and people worldwide that are connected. Cybersecurity is concerned with protecting cyberspace. The International Standards Organization (ISO) defined cybersecurity as “the preservation of confidentiality, integrity, and availability of information in the cyberspace” (ISO/IEC Standard 27032, 2012).
Every organization connected to cyberspace provides some type of e-service to enhance its effectiveness and promote its efficiency. Such services may be related to the organization’s internal and external supply chain or may be concerned with servicing customers or even the public at large. Examples of such organizations include those providing e-government services, e-trade services, and other e-services. The e-government services illustrated in Figure 1 provide an example of different e-services available in cyberspace (Bakry S. H., 2004).
Figure 1. Technology infrastructure
The e-government services illustrated in Figure 1 involve internal government-to-government (G2G) activities, government-to-citizen (G2C) services, and government-to-business (G2B) services. In addition, the Figure 1 illustrates the integration of these services with business-to-citizens (B2C) services. As governments have G2G activities, businesses can also have business-to-business (B2B) activities. Together, these services result in benefits to all the parties concerned and to the society at large (Bakry, Bakry, & Muhaya, 2016). To acquire and maintain these benefits, cybersecurity protection measures are needed to protect cyberspace and consequently to protect these benefits from risks caused by misuse or malicious actions.