Abstract
Advancements in the field of information and communication technology (ICT) have proved to be great enablers in our day-to-day functioning. However, it brings along with it several vulnerabilities that are often exploited by cybercriminals and hackers. Of late, an increasing number of cybercrimes are being reported worldwide. Cybercrimes range from cyber-stalking, cyber-bullying, ransomware, and cyber terrorism. Falling prey to carefully orchestrated cyber-attacks could prove disastrous at all levels, i.e., personal, organizational, or societal. Based on a review of the literature and practical experience in the area, the chapter presents a broad overview of various challenges related to cyber security and specifically highlights the importance of implementing effective cyber security controls for active cyber security risk management. The main contribution of this work is in terms of the selection of effective security controls based on cyber risk assessment for ensuring cyber resilience. This chapter also highlights the need for a sustainable business continuity plan for ensuring the continuity of operations during crises or threats. The chapter shall help individuals and organizations be aware of the likely threats and risks and suggest various mitigation techniques that can be practiced to counter cyber threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ayofe AN, Irwin B (2010) Cyber security: challenges and the way forward. Comput Sci Telecommun 29(6):56–69
Barrett M (2018) Framework for improving critical infrastructure cyber security version 1.1. NIST Cyber Security Framework. https://doi.org/10.6028/NIST.CSWP.04162018. Retrieved 10 Jan 2022, from https://www.nist.gov/cyberframework
(2021) CIS controls, version 8.0. Center for Internet Security. The 18 CIS critical security controls [Online]. Available: https://www.cisecurity.org/controls/cis-controls-list/. Accessed 10 Jan 2022
Gandhi VK, Thanjavur TNSI (2012) An overview study on cyber crimes in internet. J Inf Eng Appl 2(1):1–5
Isha U (2020) Top 10 challenges of cyber security faced in 2021. Jigsaw Education Article. Retrieved 02 Feb 2022 from https://www.jigsawacademy.com/blogs/cyber-security/challenges-of-cyber-security/
Pan L, Tomlinson A (2016) A systematic review of information security risk assessment. Int J Saf Secur Eng 6(2):270–281. https://doi.org/10.2495/SAFE-V6-N2-270-281
Sawant P (2020) Holistic approach to information security risk management. Int J Eng Res Technol (IJERT) 9(7):42–44. https://doi.org/10.17577/IJERTV9IS070004
Walkowski D (2019, Aug 22) An overview of the types of countermeasures security practitioners use to reduce risk. F5 Labs Education Article. Retrieved 10 Jan 2022 from https://www.f5.com/labs/articles/education/what-are-security-controls
Web sites
https://www.balbix.com/insights/cyber-risk-heat-map/. Accessed 10 Jan 2022
https://www.kroll.com/en/insights/publications/cyber/10-essential-cyber-security-controls. Accessed 2 Feb 2022
https://www.statista.com/statistics/309435/india-cyber-crime-it-act. Accessed 10 Jan 2022
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Shukla, A., Suri, P.K. (2024). Importance of Implementing Effective Cyber Security Controls for Active Cyber Security Risk Management. In: Sushil, Rani, N., Joshi, R. (eds) Flexibility, Resilience and Sustainability. Flexible Systems Management. Springer, Singapore. https://doi.org/10.1007/978-981-99-9550-9_19
Download citation
DOI: https://doi.org/10.1007/978-981-99-9550-9_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9549-3
Online ISBN: 978-981-99-9550-9
eBook Packages: Business and ManagementBusiness and Management (R0)