Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Program name: Bachelor of Business Management Module: Sustainability and Development Code: SYD611S Name: Lineekelomwene Ndeulita Johannes Student number: 220027137 Group: 4 Assignment: 1 Submission date: 17 May 2022 1|Page Pitfalls and benefits associated with managing cyber security in the HEALTH SECTOR. In the early days, “computer crime” was the term used to relate to the abuse of computer related bias or data. During the same era, one of the first laws related to computer crime in the US was accepted, therefore the use of computer systems without authorization from the primary user was regarded as a crime, (Holt & Bossler, 2016). Current moment, as technology use patterns changed and improved, crime experimenters referred to crimes committed using the internet and or electronic bias, as cybercrimes. Therefore, the term cybercrime was espoused, and criminological experimenters use it to relate to the technological type of felonies. Cybercrime is also appertained to as the abuse of electronic bias or compromising network connections to steal data from various users and or the misconduct or unethical use of electronic bias, whether it be in the form of vilification, detest speech, misinformation, misrepresentation, or the act of marketing and dealing illegal services or products electronically causing the individual to purchase malicious software through the intentional purchase of a desired product or service to mention a few. Therefore, in the moment’s world of rising political pressure, the need for cyber security within organizations is pivotal, especially concerning cyberspace, as the need for data protection is magnified by the position of improved technological advancement. “Moment, computers, the Internet, and the wide range of mobile technologies have reshaped ultramodern society”, (Holt & Bossler, 2016). “Therefore article twenty-one of the Namibian constitution guarantees freedom of speech and expression, which therefore, includes freedom of the press and alternative media”, (Nashilongo, 2021). Even though Namibia may not be a high risk target for cyber attacks, the misunderstanding of composition 21 may lead to cyber crime advancement, as cyber attackers may see the inconsistent cyber security loophole within the Namibian industry, and use that as an opportunity to steal and demand monetary benefits depending on the monetary value or level of confidentiality of the data being leaked. One can be considered youths as digital natives since they were born and raised in a digital world, they spend as much time if not more, interacting in the virtual world than in the physical one. Thus technology changed youths’ actions, beliefs, and indeed traditions, including the way they view the world. Youths can therefore be considered the main contributors to cyber related crimes, as they're more educated and are apprehensive of the loopholes in technology, including the benefits if cybercrime traces are covered properly. Likewise, handling cyber crime or being apprehensive of its threats comes with the benefits of being cyber secure. Thus Namibian organizations should create consistent awareness of the risks and benefits of managing cyber security as in most cases cybercrime offenders get away unpunished since their tracks are usually untraceable through the use of crypto-currencies. 2|Page Feting the need for cyber security and seeing it as an integral part of organizational and national security is salutary to the frugality and well-being of a nation or organization, especially in the health sector. “One can observe married trials toward the creation of secure digital surroundings, manifested by the development of cyber security strategies and the establishment of national cyber security agencies around the world”, (CHRISTINA, MICHAIL, & ROBERTO, 2022). Indeed, though there's advancement in cyber security strategies, cyber offenders will in utmost cases always be one step ahead as they are advanced in terms of technicality and level of education and usually use loopholes within digital network systems to get access to compromise digital devices or networks. Therefore, the progress in cyber security exploration sweats should evolve resembling the elaboration of technological advancement, as cyber security is a global need as much as sustainability is a need. Humans have developed new ways of handling conflict using cyberspace loophole strategies which can heavily damage the operations, and reputation, of health organizations and other various organizations including the economy of the nation. Therefore, the health sector or industry and other various industries’ investment in cyber security will serve as prevention measures for engaging or being victims of cyber conflicts and or attacks. There are colorful pitfalls associated with cybercrime within the health sector, from cybercrimes similar to hacking, which is a term for unauthorized access of organizational computers and their data, phishing, malicious software attacks, attacks against website vulnerabilities, malvertising, MIMT attacks, as well as insider cyber pitfalls whereby an individual with authorization misuses his/her power to commit cyber related felonies, whether for an individual or an association, they independently bear the threat of experiencing cyber related attacks, although the public in utmost cases considers hacking as a felonious offence that begets detriment to individualities or organizations, the same hacking principles can be used to ensure digital or network security. Loss of databases within the health sector can bear veritably pivotal damage to the character of an organization and the government as well since past data helps them carry out their diurnal operations, may it be personnel data or medical records, fiscal records from insured or noninsured cases. Even though cyber security is a need it comes with costs associated with the hiring of skillful personnel and the purchase of advanced technology which are in most cases costly. Most organizations use Microsoft windows operating software which is vulnerable to cyber crime. An operation substantially targeting organizations in Singapore to steal sensitive information was allegedly carried out by the Whitefly Espionage Group. The attacks exploited an aged honor escalation vulnerability in Microsoft Windows. The excrescence lies in the Microsoft Web Distributed Authoring and Versioning and affects Windows Vista to Windows 10. The attackers used an unnamed open-source tool to exploit the excrescence, (Beek et al., 2019). With the development of crypto-currencies, cyber attackers engage in cyber crime and use block chained crypto addresses to transfer ransom from victims in crypto-currencies without solicitude of being traced, making it easy to commit cyber crimes and go untraced. Committed conduct 3|Page toward the establishment of a protected digital atmosphere and forestallment of cyber related attacks within the health sector around the globe can be seen, as demonstrated by the expanding styles of securing networks or computerized data, the mindfulness of cyber crimes, and the founding of cyber security associations can be observed. Indeed, there's growth in the mindfulness and education concerning cyber security, and associations are being established to ensure minimum cyber crimes, regardless the health sector should under no circumstances say they're safe from cyber related crimes. “Numerous organizations rely on cryptographic keys and digital instruments to know what to trust and what to not trust any time data is being transferred between users within organizations or between users from different organizations, so securing their businesses”, (Moallem, 2019). Even, though digital keys and instruments are being used as security, they are being stolen, and individualities or associations target to gain access to them intending to misrepresent and steal sensitive information from specific organizations mostly large, scaled types with valuable fortune worth data. Given the fact that keys and instruments are extensively used as means of creating an online identity, they're constantly under attack, therefore putting organizations and health related organizations at great threat. The New York University of Abu Dhabi thus created a chip considered un-hackable and is regarded as the first in the world, with the aim of combating cyber crimes, while experimenters at the Design for Excellence lab developed a ‘logic-locked’ security chip to cover bias from the swell in cyber attacks, secured by a secret key, that only permits authorized users to use the device and it is therefore also resistant to reverse engineering”, (CHRISTINA, MICHAIL, & ROBERTO, 2022, p. 10). The cyber security geography presents unique challenges and improvements for combating cyber attacks. Thus the determination for creating a safe digitalized atmosphere is frequently sensitive due to the same position of advancements in cyber crimes. With the change in methods of involvement in business related conflicts, cyber security is vital in the present cyber crime arena. “The importance of cyber security research has thus been recognized by many national governments”, (CHRISTINA, MICHAIL, & ROBERTO, 2022). Vision 2030 hereby recognizes cyber security as a strategic pillar outlined to promote a sustainable, diversified, high value added developing economy including the development of a resilient infrastructure capable of supporting the anticipated economic growth. Relating to the secure realization of such a vision, New York University of Abu Dhabi’s Center for Cyber Security, pushes frontiers concerning academic and industrial cyber security research, with a focus on hardware security, wireless security, critical infrastructure security, trust, and privacy. An increase in cyber crimes has caused the expansion of academia on cyber security related topics around the globe. Thus, academic or cyber security research institutions in Namibia should also engage and promote awareness through such research studies to help ensure cyber safety or security within organizations not only within the country, as most if not all organizations depend on advanced 4|Page technological machinery and connected computerized systems for day to day operations as used everywhere around the globe which are at risk of data loss due to cybercrime. The connectivity expansion across the globe offered by the Internet led organizations to digitalize their financial and non-financial data, may it be confidential or non-confidential, including substantial accessible databases. Business and non-business organizations including the health services sector moved from traditional ways of business operations to online means of marketing and offering their products and services directly to the comfort of computer users, by offering the appropriate means of ethical business operations curtesy of the advancement and technological evolution. Being cyber secured enable confidence within organizations, thus they continue their daily operation without the worry of data loss by being victims of cyber related criminal offences. Cyber security within the health industry will increase or improve the confidence of consumers, as they won’t have to worry about their data including medical records and personal information being leaked or being used as leverage to demand monetary benefits from the offenders. With the advancement in cyber security, one cannot predict to say the cyber-attack trend will completely lose momentum but should have the thought of it gaining more momentum, as will be of great use for being cyber secured within the health sector, thus the need for highly skilled personnel in the IT or cyber security departments in every organization in order to be ahead of offenders in terms of knowledge, skills, and technology, may it be through the use advance technology in the cyberspace sector should be mandatory. In conclusion, cyber attacks should be regarded as an ongoing developing crime so should cyber security. Therefore, educating personnel within the organization about ways to ensure security within the cyberspace and how to ensure authorization keys are always safe may it be by changing them on a regular basis or by using un-hackable logic keys for their digital devices, the health sector should therefore always be up to date with technological advancement, especially with the latest methods of combating cyber attacks to protect their data including intellectual property. 5|Page References Beek, C., Dunton, T., Fokker, J., Grobman, S., Hux, T., Polzer, T., Lopez, M. R., Roccia, T., Saavedra-Morales, J., Samani, R., & Sherstobitof, R. (2019). McAfee Labs Threats Report: December 2018. McAfee Labs Threats Report, 1, 1–41. https://doi.org/10.1016/s13613723(19)30004-1 CHRISTINA, P., MICHAIL, M., & ROBERTO, D. P. (2022). Cyber security research in the Arab region: a blooming ecosystem with global ambitions. Communications of the ACM, 1-7. Holt, T. J., & Bossler, A. M. (2016). Cybercrime in Progress : Theory and Prevention of Technology-enabled Offenses. Routledge. https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1124309&site=edslive Moallem, A. (2019). Human-Computer Interaction and Cybersecurity Handbook. Boca Raton: CRC Press. Nashilongo Gervasius. (2021). Namibia digital rights and inclusion. In Namibia Digital Rights and Inclusion Report. https://paradigmhq.org/wp-content/uploads/2021/05/lr-NamibiaDigital-Rights-Inclusion-2020-Report.pdf 6|Page