skip to main content
10.1145/3616712.3616721acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemeConference Proceedingsconference-collections
research-article

Security Assessment and Proposed Controls in a Philippines' Shopping Mall: A Case Study

Published: 15 December 2023 Publication History

Abstract

Security is one of the most important ways to protect the company systems. Companies could encounter different security risks that will endanger their assets. Email vulnerabilities, data breaches, identity theft, etc., are some of these risks. Cybercrimes do not choose any place to conduct malicious activities. Whether physical or cyber activities, as long as malicious actors can benefit from what they are doing, they will do all means to conduct such activities. Shopping malls pose not only physical security risks but also cyber security risks. With lacking security measures, the establishment may suffer huge damages that may affect its financials and reputation. This study aims to find different solutions to these security issues by experimenting with mitigation tools. The case study identifies the security issues of a small sized mall in the Philippines, focusing on CCTV Weak Configurations, Email Threats, Poor Document Management Systems, and Wi-Fi Vulnerability. The researchers have conducted simulations using iSpy, Bitly website, built-in document encryption methods, and brute force methods to assess and exploit the existing issues and security of the establishment. It has been concluded that owners or administrators should verify that the configurations of their devices are not set to default, provide employee awareness, and apply authentication and authorization methods.

References

[1]
Segal, E. 2022. Small Businesses Are More Frequent Targets Of Cyberattacks Than Larger Companies: New Report.
[2]
https://www.forbes.com/sites/edwardsegal/2022/03/30/cyber-criminals/?sh=4a8a164d52ae.
[3]
Dukes, S. 2018. “Safety and Cybersecurity in a Digital Age.” Smart Futures, Challenges of Urbanisation, and Social Sustainability, 241–258.
[4]
Ceccato, V., Tcacencu, S. 2018. Perceived Safety in a Shopping Centre: A Swedish Case Study. In: Ceccato, V., Armitage, R. (eds) Retail
[5]
Crime. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-73065-3_9
[6]
Hanif, S. 2021. Security as a Design Consideration for Shopping Mall Design in Nigeria: A Case of Lagos. International Journal of Innovative Science and Research Technology, 6(8), ISSN No:-2456-2165.
[7]
Eddy, Nathan. 2016. Businesses Lack Proper Document Management Training. https://www.eweek.com/small-business/businesses-lack-properdocument-management-training/
[8]
Melendex, S. 2019. Uses of Email in Business.https://www.techwalla.com/articles/uses-of-email-in-business
[9]
Acevendo, L. 2019. The Advantages of Email in Business Communication. https://smallbusiness.chron.com/advantages-email-businesscommunication-122.html
[10]
Bitly. 2018. Bitly, The power of the link. https://app.bitly.com/Bm4jfyN57B5/bitlinks/3Mhqysc
[11]
Watts, S. Secure authentication is the only solution for vulnerable public wifi. Computer Fraud & Security, 2016, 18–20.
[12]
Goodspeed. 2020. 7 Dangers of Public WiFi. https://goodspeed.io/blog/7-dangers-of-public-wifi.html
[13]
Norton. 2018. The risks of public Wi-Fi. https://us.norton.com/internetsecurity-privacy-risks-of-public-wi-fi.html
[14]
Cisco. 2020. Cisco Annual Internet Report (2018-2023) White Paper. https://www.cisco.com/c/en/us/solutions/collateral/executiveperspectives/annual-internet-report/white-paper-c11-741490.html
[15]
Papatsaras, A. 2017. 4 Steps to Mitigating Risks Caused By Poor Document Management Processes. Retrieved from https://www.salesforce.com/blog/risks-caused-by-poor-document-management-blog

Index Terms

  1. Security Assessment and Proposed Controls in a Philippines' Shopping Mall: A Case Study

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICEME '23: Proceedings of the 2023 14th International Conference on E-business, Management and Economics
    July 2023
    507 pages
    ISBN:9798400708022
    DOI:10.1145/3616712
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 December 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CCTV
    2. cyber activities
    3. security risks
    4. security solutions
    5. vulnerabilities

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICEME 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 29
      Total Downloads
    • Downloads (Last 12 months)28
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media