JISAR

Journal of Information Systems Applied Research

Volume 8

V8 N2 Pages 52-59

October 2015


Cyber Security Best Practices: What to do?


Howard Kleinberg
University of North Carolina Wilmington
Wilmington, NC 28403, USA

Bryan Reinicke
Rochester Institute of Technology
Rochester, NY 14623, USA

Jeffrey Cummings
University of North Carolina Wilmington
Wilmington, NC 28403, USA


Abstract: While cyber security is an increasingly important topic for organizations globally, it is also a confusing one for both researchers and practitioners. A great deal has been written about cyber security, but there is comparatively little written about how to actually implement cyber security – specifically, who should actually do what. There also tends to be an assumption made that cyber security is simply something that the networking group will take care of, and is therefore put out of mind by most users and IT professionals. In this paper, we examine some of the suggested best practices for cyber security and suggest a framework for thinking about these practices. We also examine how cyber security tasks can be broken out by area of responsibility within an organization.

Keywords: Security, Cyber Security, best practices

Download this article: JISAR - V8 N2 Page 52.pdf


Recommended Citation: Kleinberg, H., Reinicke, B., Cummings, J. (2015). Cyber Security Best Practices: What to do?. Journal of Information Systems Applied Research, 8(2) pp 52-59. http://jisar.org/2015-8/ ISSN: 1946-1836. (A preliminary version appears in The Proceedings of CONISAR 2014)