Understanding the Relationship Between Trust and Faith in Micro-Enterprises to Cyber Hygiene: An Empirical Review

Understanding the Relationship Between Trust and Faith in Micro-Enterprises to Cyber Hygiene: An Empirical Review

DOI: 10.4018/979-8-3693-0839-4.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber hygiene is a practice of maintaining the security and health of devices, networks, and data. It involves some guidelines to prevent cyberattacks, data breaches, and identity theft. Trust needs strong protection in the cyber system world. Cyber hygiene is essential for both individuals and organizations, as it can protect them from financial losses, reputational damage, legal consequences, physical harm, and identity theft. The term “cybersecurity” indicates vulnerabilities or other issues related to protecting personal data. Data must adhere to cyber ethics other than protection. Cyber hygiene thus gives us a notion of how trust issues in a cyber-world can be handled with better understanding of the level, volume, veracity, and the longevity of data present in cyberspace. This chapter is about finding a suitable quantitative relationship between cyber hygiene and policy of trust in micro enterprises along with different aspects of cyber hygiene problems and the possible pathways and remedies that could be taken for better functioning of these enterprises in cyber spaces.
Chapter Preview
Top

Background Study

Data being the prime resource and can be kept secured and safe by adhering number of policies against the theft and loss of data. Some of the laws like GDPR. The Data Protection Act (DPA) (2018) and the UK GDPR are commonly found for protect ion of data. The laws are used to provide the enough and required protections. The capability of the data protection regulations has been incorporated into the laws of England and Wales. Different regulatory acts like Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019 (SI 2019/419)) (“UK GDPR”)(Legislation.gov.uk. The Data Protection,). Wales also follows the Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) that supports the specific privacy rules and the corresponding electronic communications. The Computer Misuse Act (CMA) 1990 legislation prevents different unauthorised accessing or modifications of computer materials . Lastly, the Network and Information Systems Regulations 2018 (“NIS Regulations”), renders the enough security in terms of the netwaorks and other security systems for providing many different essential services like water, transport, energy, healthcare and digital infrastructure) and digital services such as search engines, online marketplace or cloud computing services). The UK Government via the National Cyber Security Centre (NCSC) developed the Cyber Essentials Scheme to ensure a minimum level of security for all their suppliers and businesses to comply with the cyber security essentials required for all relevant Welsh Government.The main responsibility to the SME business aims to decide the importance of cyber security against the business needs (Welsh Government).The above scopes of such application of such security issues have been discussed and analysed in details in the following section.

Complete Chapter List

Search this Book:
Reset