Article Preview
TopIntroduction
Popularity of information technologies and transfer of significant part of personal and business life to virtual reality evolved a new set of dangers related to security and privacy aspects in the internet. Nowadays, the Internet has a significant role in enabling the communications, monitoring, operations, business systems and personal applications. Nowadays, serious number of countries are developing own strategies securing their vital infrastructure (Azmi, Tibben & Win, 2016). People more and more often use internet as a medium to execute different activities that also bring new forms of privacy threats to the community. Despite other threats technology is not the major aspect that puts people privacy in danger. It can be noticed that human behaviour is one of the most risky elements of cyber security (Whitty, Doodson, Creese & Hodges, 2015; Wiederhold, 2014). Looking at the current situation cyberattacks become more frequent and take different forms, starting from the simplest ones e.g. phishing where attacked person is convinced to open infected attachment to serious cyber-attacks on national infrastructure (Snyder, 2014).
Also transfer of personal and business life to virtual reality moves loyalty programs, that are recognised as privacy-sensitive segment also to digital era. People more often use internet as a medium to execute different activities including loyalty programs and moving physical cards to mobile applications, that also bring other privacy threats to the community, where apart from analysis of common data used by retailers to investigate trends allows also for deeper analysis of other sensitive data collected from customers with or without their knowledge. It also puts other type of risk related to cybersecurity on participants of such programs. It can be noticed that human behaviour is one of the most risky elements of cyber security (Whitty, Doodson, Creese & Hodges, 2015; Wiederhold, 2014). As other research proves the major risk lay beneath the personal approach to cyber security and privacy protection of internet users (Winnefeld, Kirchhoff & Upton, 2015).
As other research proves the major risk lay beneath the personal approach to cyber security and privacy protection of internet users (Winnefeld, Kirchhoff & Upton, 2015). “In the 2016 Cyber Security Intelligence Index, IBM found that 60% of all attacks were carried out by insiders. Of these attacks, three-quarters involved malicious intent, and one-quarter involved inadvertent actors” (Zadelhoff, 2016).
Definition of a cybersecurity can be found in many publications and standards, although in this article authors would use the definition of cyber security that was used by von Solms and van Niekerk (2013) where is defined as protection of both informational and non-informational assets through the ICT infrastructure.
“Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. The general security objectives comprise the following: Availability, Integrity, which may include authenticity and nonrepudiation, Confidentiality” (Solms & Niekerk, 2013).