Date of Award
5-2024
Degree Type
Thesis
Degree Name
Master of Science (MS)
Department
Cybersecurity
Abstract
ABSTRACT Security in the digital realm, once (and sadly for some continues to be) a mere afterthought, has been propelled to the forefront of even the most digitally disconnected person’s mind. With daily headlines publicizing new cyber-attacks and the ever-encroaching tendrils of nation state cyber power projection, it is no surprise that many large companies and the United States government have placed a premium on cybersecurity capabilities. And while this increased focus has brought with it standardization, automation, and price reduction, tailored security solutions continue to be cost and expertise prohibitive to small and medium size businesses (SMBs). To explore the feasibility of tailored security solutions for smaller organizations, the authors proposed a novel approach to carried out a holistic security assessment for a local small business with almost exclusively online operations. Using this experience as a case study, the authors endeavored to test the feasibility of implementing tailored security solutions for SMBs, as well as the effectiveness of assessments and their consequent recommendations for improving the security posture of SMBs. The lessons learned from this experience, while only a starting point, can help to improve the way SMBs approach cybersecurity in the future. The authors’ findings indicate that the methodology used in the case study is an excellent first step for SMBs attempting to improve their security posture, although replication of this study and continued research is necessary to address known potential issues and contingencies for success.
Recommended Citation
Amoo, Olukunle; Hutfless, Joshua; and Stemmler, Adam, "Advent Children: Union Worx Threat Hunting" (2024). Interdisciplinary Informatics Theses, Dissertations, and Student Creative Activity. 2.
https://digitalcommons.unomaha.edu/interdiscipinformaticsstudent/2
Comments
The authors hold the copyright to this work. Any reuse or permission must be obtained from them directly.
Note: Sensitive information related to an NDA has been removed.