Implementing Cyber-Security: Best Practices at Work
Executive Summary 3
Proposed Solutions 6 Annotated Bibliography 8 Memorandum 11
References 14
Executive Summary The internet brings forth a world of social connectivity, growth and endless innovation opportunities. These have been hastened by the advent of mobile applications and computing. The sudden surge in technology has changed the way we communicate to the way we travel. While some see the beneficial side of technology, others see an opportunity to do harm. These individuals, states or groups present a cyber-threat to anyone who uses the internet. Nothing they are involved in is new; espionage is not new and so is activism ...