The Impact of Cyber Security in Developing Economies
CHAPTER ONE
AIMS AND OBJECTIVES
Main aim
The general objective of this study is to examine the impact of cybersecurity in developing economies. Improving cybersecurity in developing countries is essential for two important reasons. First, access to cyberspace is crucial for social, economic and political growth and development. However, if digital systems are not secure enough, cyberattacks may occur, destabilizing governments, electoral systems, economic systems, media spheres and public debate. Second, inadequate legislation on cybercrime contributes to making developing countries an attractive hiding place for cybercriminals.
Specific objectives
The specific objectives of this study are to:
- Examine how the economy is affected by cyber insecurity.
- Assist in reducing the vulnerability of Information and Communication Technology (ICT) systems and networks in developing countries.
- Examine the efficiency of National Cyber Security Services in developing countries.
- Examine the current trends in cyber insecurity and develop possible effective solutions.
RELEVANCE OF THE STUDY
Professional
Over-dependence on technology may infer that deficient cybersecurity measures can open the nation to a danger of significant interruptions if there should arise an occurrence of cyberspace attacks. Truth be told, such an occurrence may cause an economic emergency, which can prompt broad impacts. With technology getting progressively advanced, the aptitudes of the criminals regularly outpace the capacity of security professionals inside organizations. The evidence of this is the number of attacks that succeed. With the expanded significance of cybersecurity, qualified and well-prepared specialists are in extraordinary interest. Organizations need individuals who have aced the aptitudes to verify systems and to secure frameworks, PCs, and information from attack, harm and additionally unapproved get to.
The idea of cyberattacks is evolving radically. At first, the most widely recognized objective was the email, similar to the messages from ‘banks’ requesting account subtleties or even the legacy guarantee from a relative that was obscure. As different roads of registering progressed, cyber attacks progressed also to bigger scale activities which are never again restricted to focusing on an individual yet rather ventures from the money related markets to the administration part.
Overhauling frameworks are one more basic advance that can reinforce Cybersecurity somewhat however regularly is ignored. Similarly, as PC programming should be refreshed occasionally to perform effectively just as to have the option to battle against infections or other security dangers, also it is fundamental to redesign the foundations, yet many don’t understand its need while others can’t simply manage the cost of or are unconscious of the free updates accessible. For instance, individuals in Africa incline toward using their additional hours on the interpersonal organization to refreshing their gadgets.
One of the most imperative yet common dangers is information burglary. Many developing nations have neither solid cyber laws nor a database record of criminals. Individuals in certain states do not utilize the secret word which is the principal line of resistance. Subsequently, it has gotten simpler for criminals to take and exchange information from a person to organizations and regardless of whether they get captured, they are probably going to get any discipline because of the absence of proof. Aside from this, numerous institutions or organizations are either not mindful of the conceivable security information ruptures or are not furnished with appropriate advancements to identify and examine any information breach.
RESEARCH METHODOLOGY
Research design
The study will employ a quantitative descriptive research design to examine the impact of cyber securities in developing economies.
Sources of Data
Data for this proposed study will be generated from two main sources; Primary sources and secondary sources. Primary sources will include questionnaires, interviews and observations. Secondary sources will be magazines, newsletters, textbooks and the Internet.
REFERENCES
- Aniruddh, S., & Chaudhari, D. (2013). Cloud Computing: Infrastructure as a Service. International Journal of Inventive Engineering and Sciences (IJIES), Vol. 1, Issue-3, pp.14-36.
- Ashraf, I. (2014). An Overview of Service Models of Cloud Computing. International Journal of Multidisciplinary and Current Research, Vol. 2, (July/Aug 2014 issue), pp.779-783.
- Asigra, A. (2011). Agentless backup is not a myth. Retrieved from www.asigra.com on August 16, 2011.
- Aulbach, S., Grust, T., Jacobs, D., Kemper, A., & Rittinger, J. (2008). Multi-tenant databases for software as a service: schema-mapping techniques, Proceedings of the 2008 ACM SIGMOD international conference on Management of data, ACM, Vancouver, Canada, pp.1195-1206. Doi:10.1145/11376616.1376736
- Avram, M. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Proceedings of the 7th International Conference Interdisciplinarity in Engineering, (INTER-ENG 2013), Elsevier, Vol. 12, pp.529- 534. Doi:10.1016/j.proty.2013.12.525
- Bowers, K., Juels, A., & Oprea, A. (2009). Hail: a high-availability and integrity layer for cloud storage, in Proceedings of the 16th ACM conference on Computer and communications security, pp. 187–198.