A PROCESS FLOW MODEL FOR DYNAMIC ENTERPRISE NETWORK CYBER SECURITY ANALYSIS IN EASTERN AND CENTRAL UGANDA

Authors: Shariff MUGOYA, Twaibu SSEMWOGERERE, Godfrey ODONGTOO, Mwase ALI, and Gilbert Gilibrays OCEN
Affiliation: Busitema University, Makerere University Business School

Category:

Keywords: Enterprise networks, Cyber Security, Analysis Model, Dynamic
ABSTRACT. Several Enterprises are adopting Enterprise Networks due to their benefits like remote file storage, resource sharing, and improved communication. Due to a large number of target groups, cyber-attackers have exploited vulnerabilities in the Enterprise Networks to launch cyber-attacks on these networks thus resulting into data theft and financial losses to the enterprises. In this study a Dynamic Enterprise Network Cyber Security Analysis Model that considers the ever changing components of enterprise networks was developed and implemented on windows operating system. Purposive sampling was used to select key informants with technical knowledge about cyber security. Primary data was collected using closed-ended questionnaires and secondary data was collected from analysis of scholarly articles, books, conference papers, and journals. Expert opinion guided the testing and implementation of the developed model.

References:

Statista. (2024). Internet user population. Retrieved from https://www.statista.com/statistics/617136/digital-population-worldwide/ Accessed on January 16th, 2024, at 4:30 P.M.
HOW MANY SMARTPHONES ARE IN THE WORLD? (2024). Retrieved from https://www.bankmycell.com/blog/how-many-phones-are-in-the-world. Accessed on January 17th, 2024, at 8: 16 A.M
M. McGrath (2014). Target Data Breach Spilled Info On As Many As 70 Million Customers. Retrieved from https://www.forbes.com/sites/maggiemcgrath/2014/01/10/target-data-breach-spilled-info-on-as-many-as-70-million-customers/?sh=df3f7cce7954. Accessed on January 17th, 2024, at 8:29 A.M.
A. DeSimone, and N. Horton. (2015). Sony’s Nightmare Before Christmas.
M. Hill (2023). The biggest data breach fines, penalties, and settlements so far. Retrieved from https://www.csoonline.com/article/567531/the-biggest-data-breach-fines-penalties-and-settlements-so-far.html. Accessed on January 17th, 2024, at 8:46 A.M.
M. Mcquade. (2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ Accessed on January 17th, 2024, at 8:52 A.M.
Uganda Police Force. (2022). Annual Crime Report. Retrieved from https://www.upf.go.ug/
Ocen, G. G., et al. (2019). An Algorithm and Process Flow Model for Extracting Digital Forensic Evidence in Android Devices. International Scientific Journal Theoretical and Applied Science, 72(Issue 04).
Schrenier, B. (1999). "Attack trees." Dr. Dobb’s Journal, 24(12), 21-29.
Phillips, C., & Swiler, L. P. (1998). A graph-based system for network vulnerability analysis (pp. 71-18).
S. Yusuf Enoch et al. (2021). Model-based Cyber Security Analysis: Past Work and Future Directions.
Bevan , J. L. , Tidgewell , K. D. , Bardull , K. C. , Cusanelli , L. , Hartsern , M. , et al. . (2007). Serial argumentation goals and their relationships with perceived resolvability and choice of conflict tactics.
H.F. Kaiser. (1974). An Index of Factorial Simplicity.
C.R. Kothari. (2004). Research Methodology: Methods and Techniques.
C. B. Perry R, Hinton, Isabella McMurray. (2014). SPSS Explained Second Edition.