I understand that the British University in Dubai may make a digital copy available in the institutional repository. The main purpose of this research is to answer the question whether information security management can protect our daily life and privacy information to be able to live in a safe life in our smart cities or not.
Introduction
Information security
In the context of information security, the policy is divided into three categories: Enterprise information security policy (EISP), Issue-specific security policies (ISSPs) and system-specific policies (SysPs). Finally, the projects function refers to the implementation of project management principles for all components of the information security program (Whitman and Mattord, 2013).
Cybersecurity
Researchers are developing threat assessment techniques that use information fusion, which will help counter cyber attacks (Kuhl et al. 2007). It is crucial that companies have planned for disaster recovery (Omar et al. 2011).
Smart cities
Rushing the transformation into a smart city can lead to an abundance of unfinished projects that are a waste of funds. According to the Smart City Index 2021, Abu Dhabi and Dubai have been ranked as the smartest cities in the Middle East for the second consecutive year (Kumar, 2021).
Information Security Management in Smart Cities
- Audit security controls to assure conformity of information security
- Perform the assets owner review
- Vulnerability Assessment
- Penetration Testing
The most important step in information security when dealing with funds is the registration of funds. They are the most important information security milestone in the field of companies, organizations and smart cities. Presenting and writing a progress report to senior management, risk owners and information security itself.
Policies should be implemented, evaluated and updated by the information security team (Watson & Jones, 2013). Such information security training needs to be evaluated to ensure that information security training changes for the best (Abraham & Chengalur-Smith, 2019). Machine learning can be applied to the world of information security performance monitoring using the most well-known machine learning techniques.
This study developed a new information security control efficiency to detect the anomalies in the information security control logs (Sarker, 2021). The audit security check is a comprehensive evaluation of all information security controls that measures the applicability and capability of the security controls (Nahar, 2020). Therefore, the implementation of information security management, which is the compliance framework, is to protect the information from confidentiality, integrity and availability.
Literature review
2020) also discussed the challenges of applying data-driven decision-making approaches in identifying security vulnerabilities in smart cities. The use of data-driven cybersecurity in smart cities will help secure critical information related to the city's applications. Using data-driven cybersecurity in smart cities has many benefits in the form of: (1) Fast security.
According to Khatoun and Zeadally (2017), industrial control systems (ICSs) are widely used in smart city infrastructures. Given an overview of security and privacy challenges in smart cities, showed factors affecting information security in smart cities. They examined the four keys to a smart city and provided a smart city security overview while identifying the threats.
They discussed the fundamental issues of security and privacy in smart cities and explained some of the weaknesses and vulnerabilities in smart cities while giving some recommendations. Used data-driven cybersecurity methods to assess security issues in smart cities and discussed some of the challenges in using data-driven cybernetics. He identified nine main factors that will be affected by cyber security issues in smart cities, and then used the Fuzzy Analytical Hierarchy Process (FAHP) to determine which of the nine factors is most affected by security.
Research Methodology
Questions with a "checkbox" response type will be calculated and presented as a clustered bar graph to show the percentage of respondents' selected responses. These answers will be given weights from 1 to 5, based on the least favorable outcome to the most favorable outcome. Answers to the third question are “There have been no attacks at all in the last two years.”, which is the most favorable outcome, will be scored 5 next time.
More data attacks than two years ago”, which get a score of 2, and finally, “We are under constant attack these days”, which get a score of 1 because it is the least favorable outcome. Hypothesis tests will be conducted to validate whether organizations are prepared to detect, prevent and respond to cyber threats, and whether individuals have sufficient cybersecurity awareness. In addition, hypothesis testing will be performed on item 9 to evaluate the level of cybersecurity awareness among participants.
Focusing on developing an understanding of the previously mentioned parameters, a sample of at least 100 responses will be selected for analytical analysis. All the questions in the questionnaire will be closed and the data is planned to be collected within a period of one month. Participants should be informed about the techniques of the study and how their data will be processed, as well as any risks that may be associated with the process of collecting/processing the data.
Results
Descriptive statistics
Answers to Question 1 of the questionnaire reveal that the top three challenges to information security are lack of internal expertise, insufficient funding and difficulty finding the right security talent. One of the major concerns of the Dubai and Abu Dhabi organization is recruiting and retaining cyber security professionals. One or a high percentage of the responses (20.39%) indicate that there have been no attacks in the past two years.
Answers to question 5 of the survey are represented by figure 15, which is concerned with the presence of an information risk management strategy, 56.31% of respondents said that their organizations do have such a strategy, 25.24% said that their organizations either is developing a strategy, or planning to develop one. Answers to question 9 are presented in table 3. Here, the data was put through a non-parametric 1-sample signed test and compared with a target value of 4 to draw an overall conclusion about the situation of the respondents' self-rating of security awareness. Further details are discussed in section 5.2.2. the results of the test indicate that the respondents are somewhat insufficiently secure.
It is quite surprising that a very low percentage of respondents are aware of ransomware, as. This is an essential part of the information security system in the organization as top management plays an important role in achieving a state of high security. One of the most damaging effects of these attacks is the loss of customer confidence in the company.
Hypothesis testing
Furthermore, the p-value was greater than α = 0.05 when the median was compared to 3, which implies that our null hypothesis should be accepted and we conclude that the median is equal to 3. Furthermore, the p-value was greater than α = 0.05 when the median was compared to 3, which implies that we should accept the null hypothesis and conclude that the median is equal to 3. Furthermore, the p-value was greater than α = 0.05 when the median was compared to 3, which implies that we.
This result indicates that individuals have mediocre security awareness against different types of cyber threats. The p-value of (H1a) is equal to 0.000, This value is less than α = 0.05 (significance level), therefore the null hypothesis should be rejected, and the p-value of (H1b) was 0.193, This value is greater than α = 0.05, therefore we should accept the null hypothesis and conclude that the organizations are somewhat prepared to detect cyber threats. The p-value of (H2a) is equal to 0.000, this value is less than α = 0.05, therefore the null hypothesis should be rejected, and the p-value of (H2b) was 0.797, this value is greater than α = 0.05 , therefore we should accept the null hypothesis and conclude that the organizations are somewhat prepared to prevent cyber threats.
The p-value of (H3a) is equal to 0.000, this value is less than α = 0.05, therefore the null hypothesis should be rejected, and the p-value of (H3b) was 0.289, this value is greater than α = 0.05 , therefore the null hypothesis should be accepted and concluded that organizations are somewhat prepared to respond to cyber threats.
Discussion
Nevertheless, a security officer can justify the cyber security budget by knowing the frequency of cyber attacks, how many data breaches or how many of the employees were victims of email phishing. The work of Masrek et al. 2019) indicate that a good information security culture is created when the top management of an organization is sensitive to the importance of protecting its information. Instead of focusing on perimeter protection, it is important that top management adopt a strategy that focuses on detecting hidden threats.
Furthermore, the results of hypothesis testing indicated that organizations are somewhat prepared to detect, prevent and respond to cyber threats. These are core features of any cyber security system and organizations should implement carefully to ensure smooth business operations. One of the most important steps a company can take to identify and remedy a weakness is to quickly identify the cause of the problem.
Some methods that can help in the process of detecting a cyber threat are to identify. mysterious emails, identify suspicious pop-up notes, unusual password activity, penetration testing and keeping software up to date. The first two strategies are particularly important as the results of Question 2 revealed that these are the two biggest emerging cyber threats. Top management and the IT department should constantly raise awareness across the entire organization to avoid suspicious emails and avoid all web pop-ups, as unknown pop-ups can be infected with malware and malicious emails can lead for ransomware attacks through attachments and download links.
Conclusion
Developing Future Human-Centered Smart Cities: Critical Analysis of Smart City Security, Data Management and Ethical Challenges. Holistic big data integrated artificial intelligence modeling to improve privacy and security in smart city data management. Assessing Bhubaneswar's Vulnerability and Capacity as a Progressive Smart City: An Empirical Case Study of the Fani Cyclone's Impact on the City.
Retrieved on November 19, 2021 from https://www.khaleejtimes.com/uae/abu-dhabi-dubai-top-smart-city-index-2021-in-middle-east. Retrieved December 13, 2021 from https://www.ey.com/en_sy/government-public-sector/how-can-governments-safeguard-smart-cities-against-cybersecurity.