Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Walden Dissertations and Doctoral Studies

2020

Information Security

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes Jan 2020

Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes

Walden Dissertations and Doctoral Studies

AbstractDenial-of-service/distributed denial-of-service (DoS) attacks on network connectivity are a threat to businesses that academics and professionals have attempted to address through cyber-security practices. However, currently there are no metrics to determine how attackers target certain businesses. The purpose of this quantitative study was to address this problem by, first, determining differences among business sectors in rates and duration of attacks and financial damages from attacks and, second, examining relationship among assets and/or revenues and duration of attacks and financial damages. Cohen and Felson's routine activity theory and Cornish and Clarke's rational choice theory served as frameworks as they address the …


Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson Jan 2020

Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson

Walden Dissertations and Doctoral Studies

Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …