You are on page 1of 14

1.

Defining Cybersecurity

Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs
and data from attack, damage or unauthorized access.

According to Forbes, the global cybersecurity market is expected to reach 170 billion by 2020.
This rapid market growth is being fueled by an array of technology trends, including the
onslaught of initiatives with ever-evolving security requirements, like “bring your own device”
(BYOD) and the internet of things (IoT), the rapid adoption of cloud-based applications and
workloads, extending security needs beyond the traditional data center and stringent data
protection mandates.

Why Cybersecurity is required


The core functionality of cybersecurity involves protecting information and systems from
major cyberthreats. These cyberthreats take many forms (e.g., application
attacks, malware, ransomware, phishing, exploit kits). Unfortunately, cyber adversaries have
learned to launch automated and sophisticated attacks using these tactics at lower and lower
costs.
As a result, keeping pace with cybersecurity strategy and operations can be a challenge,
particularly in government and enterprise networks where, in their most disruptive form,
cyberthreats often take aim at secret, political, military or infrastructural assets of a nation, or
its people. Some of the common threats are outlined below in more detail.

 Cyberterrorism is the disruptive use of information technology by terrorist groups to


further their ideological or political agenda. This takes the form of attacks on networks,
computer systems and telecommunication infrastructures.

 Cyberwarfare involves nation-states using information technology to penetrate another


nation’s networks to cause damage or disruption. In the U.S. and many other nations,
cyberwarfare has been acknowledged as the fifth domain of warfare (following land,
sea, air and space). Cyberwarfare attacks are primarily executed by hackers who are
well-trained in exploiting the intricacies of computer networks, and operate under the
auspices and support of nation-states. Rather than “shutting down” a target’s key
networks, a cyberwarfare attack may intrude into networks to compromise valuable
data, degrade communications, impair such infrastructural services as transportation
and medical services, or interrupt commerce.

 Cyberespionage is the practice of using information technology to obtain secret


information without permission from its owners or holders. Cyberespionage is most
often used to gain strategic, economic, political or military advantage, and is conducted
using cracking techniques and malware.
Implementing effective cybersecurity measures is particularly challenging today because there
are more devices than people, and attackers are becoming more innovative.
Importance of Cyber Security
Cyber security is important because government, military, corporate, financial, and medical
organizations collect, process, and store unprecedented amounts of data on computers and
other devices. A significant portion of that data can be sensitive information, whether that be
intellectual property, financial data, personal information, or other types of data for which
unauthorized access or exposure could have negative consequences.

Organizations transmit sensitive data across networks and to other devices in the course of
doing businesses, and cyber security describes the discipline dedicated to protecting that
information and the systems used to process or store it. As the volume and sophistication of
cyber-attacks grow, companies and organizations, especially those that are tasked with
safeguarding information relating to national security, health, or financial records, need to take
steps to protect their sensitive business and personnel information.

As early as March 2013, the nation’s top intelligence officials cautioned that cyber-attacks and
digital spying are the top threat to national security, eclipsing even terrorism. Year over year,
the worldwide spend for cyber security continues to grow: 71.1 billion in 2014 (7.9% over
2013), and 75 billion in 2015 (4.7% from 2014) and expected to reach 101 billion by 2018.

Organizations are starting to understand that malware is a publicly available commodity that
makes it easy for anyone to become a cyber attacker, and even more companies offer security
solutions that do little to defend against attacks.

a. Areas of Interest

Challenges of Cyber Security


For an effective cyber security, an organization needs to coordinate its efforts throughout its
entire information system. Elements of cyber encompass all of the following:

 Network security
 Application security
 Endpoint security
 Data security
 Identity management
 Database and infrastructure security
 Cloud security
 Mobile security
 Disaster recovery/business continuity planning
 End-user education

The most difficult challenge in cyber security is the ever-evolving nature of security risks
themselves. Traditionally, organizations and the government have focused most of their cyber
security resources on perimeter security to protect only their most crucial system components
and defend against known treats. Today, this approach is insufficient, as the threats advance
and change more quickly than organizations can keep up with.
As a result, advisory organizations promote more proactive and adaptive approaches to cyber
security. Similarly, the National Institute of Standards and Technology (NIST) issued
guidelines in its risk assessment framework that recommend a shift toward continuous
monitoring and real-time assessments, a data-focused approach to security as opposed to the
traditional perimeter-based model.

2. What Pain Point Cyber Security address


Just what kind of security breach causes the most pain? Here’s a list of potential cyber horrors
and possible consequences;

 Loss of intellectual property

Some reports suggest that Sony may be forced to write off over $80 million in film assets after
five films including Brad Pitt’s WWII ‘Fury’ were stolen and made available by hackers ahead
of release. Fury was illegally downloaded over 1 million times in just one week.

Commenting that cyber crime’s effect on intellectual property is particularly damaging. On


average, breaches cost large businesses up to £1.4m and small businesses more than £60,000.

 Breach of employees personal data

Of all the editorial covering the Sony Pictures hack, one of the most compelling was written by
a Sony employee. Entitled ‘I work at Sony Pictures. This is what it was like after we got
hacked’ it paints a grim picture of the real human cost of an attack on a business.

“Seeing the faces of colleagues with families – they’re worried about their life savings, their
retirement funds, their kids. It’s taken a toll, mentally… you always have to look over your
shoulder. This is forever.” Sony employee.

Some Sony employees found that details of their bank and credit cards, pension plans and life
savings, home addresses and even some medical records were hacked and available online.
Having to change 30-40 personal passwords while dealing with the stress involved doesn’t
have the best outcome on productivity or engagement.

 Leaked salary details and loss of 3rd party data

The last taboo in the workplace was always salary. You could work alongside a colleague and
not know how much they were being paid even if they did the same job as you.

Deloitte’s salary information also got tangled up in the hack. It was reportedly sitting on the
computer of an HR person employed by Sony Pictures who used to work at Deloitte. This
person apparently had some of Deloitte’s files saved on that computer.

 Lost, stolen or just careless use of mobile devices

The rapid expansion of workers using their own laptops, smart phones and tablets for work
purposes is here to stay and needs careful management.
As the case of the Deloitte worker who moved on to Sony demonstrates organisations
embracing BYOD (Bring Your Own Device) must do so with their eyes open and not take
undue risk with their own data or that of their employees and customers.

Ultimately, it’s yet another example that people (of all ages) are an organisation’s ‘weakest
link’ and can pose the biggest risk to information security – accidentally or not.

 Rogue access to your CRM system

But what happens when data lost through an employee (or ex-employee) isn’t accidental?
What damage can they do? Past research by Ascentor showed that over half of the UK
workforce would be willing to sabotage their own employer through tampering with, stealing,
leaking or providing misinformation. Further proof that information security is as much a
people issue as it is IT.

CRM systems usually include customer data, such as email addresses, phone numbers and
company decision makers. Therefore, rogue access can cause chaos among customers as well
as the reputational damage of having to inform them that their data has been compromised.
Even worse, you could see your data end up in the hands of a competitor.

Examples of Cybersecurity
Viruses, Phishing and Identity Theft
A Primer on Identity Theft
Identity theft is considered the fastest-growing financial crime. It occurs when a thief assumes
the victim’s identity in order to apply for credit cards, loans or other benefits, in the victim’s
name, or uses this information to access your existing accounts. The thief will accumulate
massive debt or deplete your current assets and then move on to another stolen identity.
The victim, meanwhile, may end up thousands of dollars in debt, with a ruined credit history
or with an empty bank account. Until cleared up, this can make it difficult to find a job, buy a
car or home, obtain a student loan, or engage in other activities that depend on the use of your
own good name.
Your identity might be stolen through phishing, in which criminals trick victims into handing
over their personal information such as online passwords, Social Security or credit card
numbers. It might be done by invading your computer with spyware that reads your personal
information, or it may be as easy as stealing your wallet.

The Many Forms of Malware


“Malware,” or “malicious software,” refers to programs designed to invade and disrupt
victims’ computers. Malware might be used to delete and destroy valuable information; slow
the computer down to a standstill; or spy on and steal valuable personal data from the victim’s
computer.
The best-known types of malware are viruses and worms, which infect computers, replicate,
and spread to other computers. They might be transmitted via email or across networks.
Another type of malware is the Trojan horse. Like its namesake from Greek legend, a Trojan
horse looks like a gift – but when you click on it, you’re downloading a hidden enemy.
Spyware is a type of malware that collects information without the victim’s knowledge. Some
forms of spyware gather personal information including login accounts and bank or credit card
information. Some may redirect your browser to certain websites, send pop-up ads, and change
your computer settings.

Phishing and Social Engineering


Kevin Mitnick, once a notorious computer criminal and now a security consultant, summed up
in an August 2011 TIME magazine interview the ways criminals combine plain old
psychological trickery with malware-creation skills – a combination referred to as social
engineering.
He said a hacker may learn your likes and dislikes from your posts on Facebook. “If I know
you love Angry Birds (a popular smartphone game), maybe I would send you an email
purporting to be from Angry Birds with a new pro version. Once you download it, I would
have complete access to everything on your phone,” Mitnik said.
Attacks like this are a form of phishing. Through phishing and social engineering, computer
hackers trick victims into handing over sensitive data – or downloading malware – without
thinking twice.
Social engineering may take the form of emails or instant messages that appear to come from a
trusted source.

You may get fraudulent email that appears to come from your bank, a shopping website, a
friend, or even the State government. The message may even contain links to a counterfeit
version of the company’s website, complete with genuine-looking graphics and corporate
logos.
In a phishing attack, you may be asked to click on a link or fraudulent website which asks you
to submit your personal data or account information – and end up giving it to an identity thief.
Or you might receive a suspicious email with an attachment containing a virus. By opening the
attachment, you may download a Trojan horse that gives complete access to your computer.

The New Internet, a cybersecurity news site, has noted that hackers launch phishing scams
through instant messaging, Facebook, Twitter, and other social networking sites. In one attack,
Facebook users found fake video links that bore the title “distracting beach babes” and a
thumbnail image of a woman in a bikini. The posts appeared to come from the users’ friends.
A similar attack used posts with the title “try not to laugh,” and a link to what looked like a
humor website. In both cases, the links attempted to install malware on users’ computers.

Ads, Apps, and Your Personal Privacy

A Primer on Behavioral Advertising


“Behavioral advertising” involves gathering information on your online activities, and using it
to target you with ads relevant to your apparent interests. Behavioral advertising companies
typically seek to gather this information in ways you won’t notice. For example, they might
place cookies – small text files – on your Internet browser to track which websites you use and
how long you remain on each page.
“First-party” behavioral advertising is limited to the confines of a single website. For example,
if you browse a shopping website in search of a specific type of car, the site may make a note
of your interests – and show car ads or recommendations for vehicles sold on the site.
“Third-party” behavioral advertising occurs when a company seeks to track your activities
across multiple websites. The company might then use that information to target you with ads.
Most cookies placed by third-party advertisers will track your activities even after you leave
the company’s website.

Mobile Phones
Few devices know as much about you as your smartphone or tablet computer. Devices like the
iPhone, iPad, and Android phone are capable of tracking your online activities and more. They
may include a GPS that knows the device’s current location, or a unique device ID (UDID)
number that can never be turned off. A large number of entertainment and educational apps are
marketed specifically for children. More than a quarter of all parents have downloaded apps
for their children to use.

However, many apps have been found to transmit data about their users. Parents should be
aware that some apps have a built-in purchase mechanism which allows users to make
purchases while interacting with an app (for example, enabling the user to purchase additional
stories while using a storybook app). Some apps may also be integrated with social networks
such as Facebook or Twitter. These apps may be marketed without information that would
make parents fully aware of these capabilities.

Social Networking: How Exposed Is Your Life Online?


Facebook, Myspace, and other social networking sites have transformed the way millions of
people connect with each other and share information. They have emerged as a powerful new
medium and an important potential data source for advertisers. Facebook has more than 955
million active users; Twitter has more than 500 million active users; Google+ has 250 million
registered users; LinkedIn has more than 175 million registered users

However, you use these sites at your own risk and at the risk of exposing your personal
information to the world. Nothing online is private. Even the most ironclad privacy setting
doesn’t change the fact that whatever you post online or send through a “secure” chat message
can be copied and shared with others.
This section, however, covers the limited control you can exert over your own privacy while
using social networking sites responsibly.

It’s Too Easy to Share Too Much Information


Most social networking sites will ask you to create a personal profile with detailed
information. You may be asked to identify your current and past places of employment, your
education history, current hometown, and even your email address, cell number and instant
messaging ID. All of this information can expose you to the possibility of identity theft or
social engineering attacks. Predators have used personal information about victims in order to
take over their email or social networking accounts. If you forget your password, most
websites you do business with will ask security questions: “What was the name of your first
pet?” “What was your mother’s maiden name?” “What street did you grow up on?” If you post
too much information online, criminals can use it to hack those questions.

Before posting that information online, consider that too much information in your public
profile can also expose your political and religious views, relationships, or other sensitive
information to third parties such as current or prospective employers, schools, friends and
acquaintances, or business competitors. Indiscriminate public posts could harm your
professional reputation, career and educational prospects, or personal relationships.

Many social networking sites also allow other people to share information about you – or “tag”
you in photos or videos – that you would prefer to keep private. The websites generally
include privacy settings that give you some control over who can see your profile information,
who can read your posts, who can “tag” you, and who can see items in which you have been
tagged.
However, even the best and most clearly understood privacy settings do not change the
possibility that anything and everything you post on a social networking site can become
public – just as any email you send can be saved and forwarded to the world by a single person
who receives it.

Wireless Network
The security protocol used to protect the vast majority of Wi-Fi connections has been broken,
potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according
to the researcher who discovered the weakness, Mathy Vanhoef, a security expert at Belgian
university KU Leuven, discovered the weakness in the wireless security protocol WPA2

Attackers can use this novel attack technique to read information that was previously assumed
to be safely encrypted,” Vanhoef’s report said. “This can be abused to steal sensitive
information such as credit card numbers, passwords, chat messages, emails, photos and so on.
Depending on the network configuration, it is also possible to inject and manipulate data. For
example, an attacker might be able to inject ransomware or other malware into websites. The
vulnerability affects a number of operating systems and devices, including Android, Linux,
Apple, Windows, OpenBSD, MediaTek, Linksys and others.
If your device supports Wi-Fi, it is most likely affected. In general, any data or information
that the victim transmits can be decrypted, depending on the device being used and the
network setup, it is also possible to decrypt data sent towards the victim (e.g. the content of a
website).

3. Significance of the pain caused by Cyber Security

Telecom and cyber security


Telecommunication biggest issue was and will be Denial of service. Eg VOIP, SIP & SS7, a
network and protocol often used to route messages when a user is roaming outside their
provider's coverage, is exploited by criminals and surveillance companies to track targets,
intercept phone calls or sweep up text messages. In some cases, criminals have used SS7
attacks to obtain bank account two-factor authentication tokens, and last year, California Rep.
Ted Lieu said that, for hackers, "the applications for this vulnerability are seemingly limitless."
SS7 vulnerabilities can be exploited by criminals, terrorists, and nation-state actors/foreign
intelligence organizations. Examples include the risk that SIM cards could be used for identity
theft, the ability to redirect, duplicate, or eavesdrop on voice calls and threats posed by third-
party app stores.
The top threats from both sides (direct attacks by cyber criminals aimed directly at their
business, as well as indirect attacks targeting subscribers.) include:
1. Social engineering, phishing or malware aimed at subscribers
2. Distributed Denial of Service (DDoS) attacks
3. Insider threats
4. Exploitation of vulnerabilities within network and consumer devices

Potential damages:

 Credit card and identity theft


 Service interruption
 Website damages
 Loss of reputation

The consequences of an attack on a major telecom provider’s infrastructure have the potential
to span across the entire country. This can affect millions of businesses, consumers, and
government agencies. If a major network is unavailable, a telecom provider is unable to
operate, and brand reputation suffers. Further, the compromise of sensitive employee and
customer data can put valuable relationships at risk.

Financial institution and cyber security

1. Mobile Banking Risks

Mobile phones used for banking are on the rise, but mobile security is proving increasingly
challenging for banks and credit unions, as controls put in place to protect traditional online
banking do not translate well when applied to mobile, as mobile application robustness has
increased, so, too, have security risk
But RSA security researcher Rivner said "Mobile banking apps will not be a primary target for
fraudsters," he says. Instead, he believes mobile browsing will be more targeted in the coming
year, since most mobile users continue to use their online banking sites to conduct banking
functions.
2. Social Networks and Web 2.0
The connection between mobile phones and social media is growing, with Twitter and
Facebook apps offered for mobile users. Institutions embracing mobile also are embracing
social networking, says Rasmussen, Internet Identity's chief technology officer. "With more
banks on social networks, expect to see more fake sites using social networks, like Twitter and
Facebook, to try and trick people into giving up vital personal information," including banking
login credentials and Social Security numbers, he says.

But external threats aren't the only risks. Social networking sites are also a venue for an
institution's own employees to intentionally or inadvertently expose sensitive information. For
more on the topic,

3. Malware, Botnets and DDoS Attacks


Distributed denial-of-service, or DDoS, attacks, as seen in the wake of the recent WikiLeaks
incidents, are likely to increase. Botnet operators now see opportunity for additional income.
Attacks are also getting more sophisticated. The No. 1 banking-credential-stealing Trojan,
Zeus, is used by hundreds of criminal organizations around the world, so "add-ons" are
prevalent. This year alone, Zeus has been linked to some $100 million in financial losses
worldwide, according to the Federal Bureau of Investigation. Concerted attacks launched
against online banking sites will likely make stronger authentication a necessity.

4. Phishing
Sophistication in phishing, smishing and vishing attacks also is increasing, McNelley says.
"Fraudsters now create very polished messaging that targets everything from bank accounts to
Amazon accounts," she says.
In fact, respondents to the recent Faces of Fraud survey say phishing/vishing attacks rank No.
3 among fraud threats.

5. ACH Fraud: Corporate Account Takeover


We witnessed banks suing customers and customers suing banks over the responsibility for
fraud incidents and losses. In 2011, commercial banking attacks are expected to rise, experts
say, especially as man-in-middle or man-in-the-browser, also known as MitB, schemes
increase. With some gangs stealing millions from just a few victims, expect more and more
criminals to pile on the 'easy money' bandwagon," Rasmussen says. As the MitB attacks get
easier, less sophisticated criminals are expected to target consumer accounts, too, despite
smaller returns.
6. Cloud Computing
Cloud computing is touted for its ability to curb fraud, but fraudsters are working overtime to
create new threats in what Rivner calls "the Dark Cloud." He predicts fraudsters will hone
their ability to exploit new and yet-unknown cloud vulnerabilities. Rivner says institutions can
expect in 2011 to see cloud-targeted Trojans, like Qakbot, that focus on a geographic region
and/or specific banking sectors. People sometimes think there is no hardware involved and, as
a result, it will never fail. So it's one thing to keep in mind: Cloud computing is not limitless.
Every cloud has its own boundaries."
7. Inside Attacks
Malicious attacks or hacks are often launched inside an organization by a disgruntled
employee. But the inside threat also may be posed by an outside person who uses false
credentials to pose as an insider to illegally gain access to internal servers and systems. The
problem: companies and financial institutions have not properly limited access to databases
and files that contain sensitive information.
8. First-Party Fraud
First-party fraud continues to pose security challenges. Also known as "advances fraud," "bust
out fraud," "application fraud," "friendly fraud" and "sleeper fraud," first-party crime typically
involves a customer applying for and accepting credit with no intention of repayment. First-
party fraud applicants can use synthetic identification or misrepresent their real identities.
Once an identity is established, the fraudster builds credit and applies for multiple financial
products.
9. Skimming
In 2010, card skimming of all types took off, including traditional ATM skimming and new
incidents at merchant point-of-sale systems and self-service gasoline pumps. Even though
skimming incidents are localized, they represent a growing problem. The advent of ATM
"blitz" or "flash" attacks reveals growing sophistication and coordination among counterfeit-
card operations.
Blitz or flash attacks involve the simultaneous withdrawal of funds from multiple ATMs in
different locations, sometimes scattered throughout the world. The technology behind
skimming is reaching new levels of sophistication. Fraudsters throughout the world rely more
on wireless communications to transmit skimmed card data.
Health Care and Cyber Security
Healthcare organizations are facing increased security threats by:
 The adoption of digital patient records and the automation of clinical systems.
 The use of antiquated EMR and clinical applications that are not designed to
securely operate in today’s networked environment and software vendors who push that
problem to the provider.
 The ease of distributing ePHI both internally (laptops, mobile devices, thumb drives)
and externally (third parties, Cloud services).
 The heterogeneous nature of networked systems and applications (i.e. network-
enabled respirator pumps on the same network as registration systems that can browse
the Internet).
 The evolving threat landscape, where cyber-attacks today are more sophisticated and
well-funded given the increased value of the compromised data on the black market.

Top Cyber Security Threats


The most important cyber security concerns for healthcare providers and payers are coming
from external sources, according to KPMG’s survey of 223 healthcare executives, who named
external attackers and third-parties as their top vulnerabilities. The top threats are malware and
HIPAA violations. (See charts.)
Greatest Vulnerabilities in Data Security
65% Sharing Wireless Employee Inadequa
External data with computin breaches/t te
attackers third-parties g heft firewalls
48% 35% 35% 27%

Top Information Security Concerns


67% 31% 57% 40%
Malware Aging IT HIPAA 32% Internal
infecting hardware violations/ Medical vulnerab
systems compromise of device ilities
patient privacy security (employ
ee theft/
negligence)
As a result of divergent priorities, payers and providers have differing concerns when it
comes to security breaches. For providers, regulatory enforcement issues or litigation can
cut into already thin profit margins. Payers tend to be larger, publicly traded
organizations that operate in multiple jurisdictions. Their main concerns are a financial
loss that could affect shareholders or a reputational impact that could dampen growth
plans.
Hospitality Industry and its Computer System
Most of the computing systems are connected computer networks to enable variety of
applications, such as database sharing and shared storage. The hospitality industry uses
the computer networks to manage reservations while avoiding duplex reservations for the
same date and time. The hospitality industry uses two main types of computer networks:
local area network (LAN) and wide area network
(WAN).

Computer Network and Information Security


Information security aims at maximizing the revenue of organizations and investments by
minimizing the damage that could be caused by security attacks. Most of the information
security systems provide three main services: confidentiality,
Integrity and availability (ISO, 2000).

Organizations using IT are vulnerable to various security threats and attacks. The most
common threats include viruses, inside attackers for network access, laptop theft,
spoofing, unauthorized insider access, unauthorized outside attack, and denial of service
attacks. Computer crimes have always been there since the introduction of computers,
however, the nature of attacks varies as the technology evolves.

For instance, hacking or cracking is the crime of connecting to a computer system


without permission and aimed at obtaining confidential information (e.g., financial
information of banking accounts, user accounts information) without authorization.

Cyber Risks and Challenges in Hospitality Industry


There are five major risks and challenges that hotels have faced during 2015 and they still
continue, according to Hiller (January 23, 2015). These five challenges are:

1. Identity theft leading to credit card fraud which has caused a lot of data breaches and
information stealing from hotel’s network systems,
2. Silent invasions and Cyber-crime attacks that are powerful tactics from next generation
criminals, During 2015, there are lots of cyber criminals who have targeted and attacked
the hotels’ Wi-Fi and get the guests’ personal information as well as their passwords.

3. Unfortunately there are no security audit cycles in majority of the hotels and this issue
will put the situation of the investors and the guests in a high risk.
4. Physical crimes like terrorism that put the hotels in challenge and it can be more seen
in South Asia and Middle East.
5. Loss of competitive advantage and image as well as lots of negative words of mouth is
other challenges that hotels have faced due to the cybersecurity attacks” (Hiller, 2015).
One of the unique features of hospitality industry is being a place for their customers’
comfort and confidence. Unfortunately the reality shows that this confidence and
reputation can’t be achieved easily due to the estimation of annual cost of cybercrime that
can affect the global economy as much as $375 billion to $575 billion and these numbers
are still growing according to Butler ((January 15, 2016), due to greater technology
available in the market for cyber attackers that makes the hotels’ system more and more
vulnerable.

4. Cybersecurity Trends / Market (sectors of the economy)


Taking into account the cybersecurity value chain and its impact on citizens, companies
and Public Administrations. Below are some of the catchment areas for cyber security:

 Industry and Environment.


 Mobility Industry
 Economic Sector
 Citizen Sector
 ICT Sector (Cloud services, IP Services, communications security & Homeland
cybersecurity)
 Government sector (Ministry of defense, communication, National police agency
and other public sectors)
 Financial institution (Banks and other financial services company)
 Health care
 Transport
 Power grid
 Traffic control
 Power plant
 Housing
 National security
 Military
 Schools
 Mining
 Entertainment
 Hospitality
 Manufacturing
5. Products in Ghana serving these Markets
Cybersecurity products
At a global level, according to Gartner, the cybersecurity industry represented a global
turnover of 62,540 million euros in 2015 and a demand increase (from expenditure in
cybersecurity amounting to 54,082 million euros in 2014) that is expected to reach
79,292 million euros in 2018.
Cyber security comprises a host of product and services tailored to address the specific
needs of various industry verticals. Cyber security products are split into six categories:
1. Identity and access management
2. Endpoint security
3. Web security
4. Messaging security
5. Security and vulnerability management (SVM)
6. Network security
a. Competitors in the Market
1. Itrust IT company --- Tema(Antivirus and Cyberops)
2. Global Technology Solutions – Tema(same as one)
3. Unotelos ltd (SS7 and Simbox Fraud).

You might also like