This research work aims to review "cyber attack" being a significant global risk in terms of like... more This research work aims to review "cyber attack" being a significant global risk in terms of likelihood of occurrence stipulations; it will further evaluate the mechanism for attacks, and develop control measures for future attacks. Using the Russia and Georgia cyber conflict in 2008 as a case study, this paper will elucidate the effect of cyber attack on a nation, designs a contextual diagram of the relationship between cyber attack and other World Economic Forum (WEF) identified global risks. This work identifies the possibility of cyber attack triggering terrorism, organised crime, global governance failure, massive incident of data fraud or theft and critical fragile state if left uncontrolled. This paper implements the ISO 27001 ISMS Model of PLAN, DO, CHECK ACT to management of cyber attack risk; using reports, computer journals, peer reviewed articles and internet sources, will design a cyber attack risk control hierarchy strategy in organizational context to combat this emerging challenge.
This research work aims to review "cyber attack" being a significant global risk in terms of like... more This research work aims to review "cyber attack" being a significant global risk in terms of likelihood of occurrence stipulations; it will further evaluate the mechanism for attacks, and develop control measures for future attacks. Using the Russia and Georgia cyber conflict in 2008 as a case study, this paper will elucidate the effect of cyber attack on a nation, designs a contextual diagram of the relationship between cyber attack and other World Economic Forum (WEF) identified global risks. This work identifies the possibility of cyber attack triggering terrorism, organised crime, global governance failure, massive incident of data fraud or theft and critical fragile state if left uncontrolled. This paper implements the ISO 27001 ISMS Model of PLAN, DO, CHECK ACT to management of cyber attack risk; using reports, computer journals, peer reviewed articles and internet sources, will design a cyber attack risk control hierarchy strategy in organizational context to combat this emerging challenge.
Uploads
Papers by Lilian Aluede