GRNTI 05.11 Общие проблемы народонаселения
GRNTI 06.51 Мировое хозяйство. Международные экономические отношения
GRNTI 10.01 Общие вопросы
GRNTI 11.01 Общие вопросы политических наук
GRNTI 11.25 Теория международных отношений. Внешняя политика и дипломатия
GRNTI 78.01 Общие вопросы военного дела
GRNTI 81.92 Пожарная безопасность
GRNTI 81.93 Безопасность. Аварийно-спасательные службы
GRNTI 82.01 Общие вопросы организации и управления
GRNTI 82.33 Стратегический менеджмент. Стратегическое планирование
GRNTI 11.15 Теория политических систем. Внутренняя политика
Not long ago, digital security was not seeing as everybody’s business, very unlike nowadays when everyone believe that it is imperative that computing and networking systems operate securely. And this is of utmost importance as many aspects of our business and private life rely on computing systems and telecommunication networks. Telecommunication networks security promotes trust among stakeholders. This paper presents an overview of challenges facing modern telecommunication networks security and suggest ways forward at facing those challenges.
network security, cyber security, e-commerce, security awareness, security training
1. Kevin Fitchard. (in press). 2013: The year mobile data revenue will eclipse voice in the US. Retrieved from http://gigaom. com/2013/03/13/2013-the-year-mobile-datarevenue-will-eclipse-voice-in-the-us/.
2. E-marketer. (20103). B2C Ecommerce Climbs Worldwide, as Emerging Markets Drive Sales Higher. Retrieved from http://www. emarketer.com/Article/ B2C-EcommerceClimbs-Worldwide-Emerging-Markets-DriveSales-Higher/ 1010004.
3. Keneth C. Laudon and Jane P. Laudon. (2007). Managing the Digital Firm. International Journal of Computers, Communications & Control Vol. II, No. 1, pp. 103-105.
4. ITU. (2013). ICT Facts and Figures [PDF file]. Retrieved from ITU website:http://www.itu.int/en/ITU-D/Statistics/Documents/ facts/ICTFactsFigures2013. pdf.
5. ITU. (2013). Mobile-cellular telephone subscriptions [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/ Statistics/Documents /statistics /2013/Mobile_ cellular_2000-2012.xls.
6. ITU. (2013). Percentage of Individuals using the Internet [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/Statistics/Documents /statistics/2013/Individuals_ Internet_2000-2012.xls.
7. yStats. (2013). Global B2C E-Commerce and Online Payment Report 2013 [Brochure]. Retrieved from http://www.ystats.com/en/reports/preview.php? reportId=1033&start=0.
8. yStats. (2012). Africa Internet & B2C E-Commerce Report 2012 [Brochure]. Retrieved from http://www.ystats.com/en/reports/ preview.php?reportId= 939&start=0.
9. Biztech Africa. (2013). Kenya Internet users surpass 16 million. Retrieved from http:// www.biztechafrica.com/article/kenya-internet-users-surpass-16-million /5806/.
10. Dr KF Lai. (2013). Africa finding its own solutions using mobile tech. Retrieved from http://www.bizcommunity.com/Article/111/394/88287.html.
11. CCK Kenya. (2013). Kenya Declares War on Cybercriminals. Retrieved from http:// www.cck.go.ke/news/2013/War_on_cybercrime.html.
12. iResearch. (2013). 2012-2013 China Online Shopper Behavior Report. Retrieved from http://www.iresearchchina.com/reports/ 4830.html.
13. Premium Times Nigeria. (2013). Gay Activist Hacks Nigerian Government’s Website Over Country’s Anti-Gay Law. Retrieved from http:// premium-timesng.com/news/140270gay-activist-hacks-nigerian-governmentswebsite-over-countrys-anti-gay-law.html.
14. The Telegraph UK. (2009). Thousands of NHS medical records lost. Retrieved from http://www.telegraph.co.uk/health/healthnews/5381605/Thousands-of-NHS-medicalrecords-lost.html.
15. PRWeb. (2013). Nuspire Networks Study Reveals Rise in IT Network Security Vulnerabilities at Remote Locations. Retrieved from http://www.prweb.com /releases/2013/ nuspire/prweb10873482.htm.