American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...IJNSA Journal
The paper at hand presents the design of a survey aiming at the cyber-security culture assessment of critical infrastructures during the COVID-19 crisis, when living reality was heavily disturbed and working conditions fundamentally affected. The survey is rooted in a security culture framework layered into two levels, organizational and individual, further analyzed into 10 different security dimensions consisted of 52 domains. An in-depth questionnaire building analysis is presented focusing on the aims, goals, and expected results. It concludes with the survey implementation approach while underlining the framework’s first application and its revealing insights during a global crisis.
ABSTRACT: Cybersecurity risk pervades all sectors of the US economy. It challenges the reliability, resiliency, and safety of our infrastructures. The chemical industry, particularly the petro-chemical industry, is a critical infrastructure that is vulnerable to cyber attacks. By its nature, the chemical industry deals with products that are sometimes highly hazardous for people and the environment. Cyber attacks on chemical industry represent a threat beyond the boundaries of the factory involved. This paper presents a brief introduction to how cybersecurity affects the chemical industry.
KEY WORDS: cybersecurity, computer security, chemical industry
This document summarizes a research paper on cyber security intelligence. It discusses the growth of cybercrimes and how the internet is insecure for transmitting confidential information. Various cyber attack methods in India and worldwide are presented. The document also examines cyber security technologies, issues, and challenges. It provides details on cyber defamation law, the evolution of cyber security, and the importance of managing cyber security risks.
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. This study investigates a general framework for assessing the security and privacy of current networks. We ask a more general question: what security and privacy mechanisms are available to the medium sized businesses in Nigeria and to what extent have they utilized these mechanisms for the safety of organizational data. The study made use of both primary and secondary data sources. The primary source was a questionnaire administered to a total of 105 medium scale businesses in some of states i, Nigeria. The result showed that medium scale businesses in Nigeria store electronic data to a very high extent but lack the adequate hardware/software to prevent unauthorized access to electronically stored data. However, many of these companies do not have official policy as regards customer data privacy. In cases where they exist, customers are not aware of such policies. This study therefore recommends that government and regulatory bodies should give serious attention to network security and privacy of medium scale businesses in Nigeria. Network security standards should be set for any organization setting up or providing a wireless network. Government should also review existing data privacy laws and ensure that customers are aware of such laws before engaging in any transaction that involves giving aware their personal data to the third party.
The document discusses information security and analyzes its importance. It describes key aspects of information security like confidentiality, integrity and availability. It also outlines some common threats to information security such as computer viruses, theft, sabotage and vandalism. The document then analyzes some challenges to effective information security, including employees being fooled by scams, issues with authentication, and the growing threat of phishing. It emphasizes the importance of addressing security concerns to build trust with customers and gain a competitive advantage.
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
This document summarizes a research paper that conducted a critical review of contemporary social engineering solutions, measures, policies, tools, and applications. Through a systematic review of recent studies, the analysis identified that providing training for employees to understand social engineering risks and how to avoid attacks is important for protection. Key measures identified include awareness programs, training non-technical staff, implementing new security networks and protocols, and using software to address social engineering threats. The review examined 30 studies on measures, policies and tools adopted by organizations and found that education, training, and awareness programs are effective at enhancing employee behavior and defenses against social engineering.
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
The document is a resolution from the American Bar Association that encourages organizations to develop and maintain cybersecurity programs to protect their data and systems from threats. It recommends that organizations conduct risk assessments, implement security controls based on the risks identified, develop response plans for cyber attacks, and engage in information sharing about cyber threats. The resolution aims to address the growing cybersecurity threats facing both private and public sector organizations and the nation's critical infrastructure systems.
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...IJNSA Journal
The paper at hand presents the design of a survey aiming at the cyber-security culture assessment of critical infrastructures during the COVID-19 crisis, when living reality was heavily disturbed and working conditions fundamentally affected. The survey is rooted in a security culture framework layered into two levels, organizational and individual, further analyzed into 10 different security dimensions consisted of 52 domains. An in-depth questionnaire building analysis is presented focusing on the aims, goals, and expected results. It concludes with the survey implementation approach while underlining the framework’s first application and its revealing insights during a global crisis.
ABSTRACT: Cybersecurity risk pervades all sectors of the US economy. It challenges the reliability, resiliency, and safety of our infrastructures. The chemical industry, particularly the petro-chemical industry, is a critical infrastructure that is vulnerable to cyber attacks. By its nature, the chemical industry deals with products that are sometimes highly hazardous for people and the environment. Cyber attacks on chemical industry represent a threat beyond the boundaries of the factory involved. This paper presents a brief introduction to how cybersecurity affects the chemical industry.
KEY WORDS: cybersecurity, computer security, chemical industry
This document summarizes a research paper on cyber security intelligence. It discusses the growth of cybercrimes and how the internet is insecure for transmitting confidential information. Various cyber attack methods in India and worldwide are presented. The document also examines cyber security technologies, issues, and challenges. It provides details on cyber defamation law, the evolution of cyber security, and the importance of managing cyber security risks.
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. This study investigates a general framework for assessing the security and privacy of current networks. We ask a more general question: what security and privacy mechanisms are available to the medium sized businesses in Nigeria and to what extent have they utilized these mechanisms for the safety of organizational data. The study made use of both primary and secondary data sources. The primary source was a questionnaire administered to a total of 105 medium scale businesses in some of states i, Nigeria. The result showed that medium scale businesses in Nigeria store electronic data to a very high extent but lack the adequate hardware/software to prevent unauthorized access to electronically stored data. However, many of these companies do not have official policy as regards customer data privacy. In cases where they exist, customers are not aware of such policies. This study therefore recommends that government and regulatory bodies should give serious attention to network security and privacy of medium scale businesses in Nigeria. Network security standards should be set for any organization setting up or providing a wireless network. Government should also review existing data privacy laws and ensure that customers are aware of such laws before engaging in any transaction that involves giving aware their personal data to the third party.
The document discusses information security and analyzes its importance. It describes key aspects of information security like confidentiality, integrity and availability. It also outlines some common threats to information security such as computer viruses, theft, sabotage and vandalism. The document then analyzes some challenges to effective information security, including employees being fooled by scams, issues with authentication, and the growing threat of phishing. It emphasizes the importance of addressing security concerns to build trust with customers and gain a competitive advantage.
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
This document summarizes a research paper that conducted a critical review of contemporary social engineering solutions, measures, policies, tools, and applications. Through a systematic review of recent studies, the analysis identified that providing training for employees to understand social engineering risks and how to avoid attacks is important for protection. Key measures identified include awareness programs, training non-technical staff, implementing new security networks and protocols, and using software to address social engineering threats. The review examined 30 studies on measures, policies and tools adopted by organizations and found that education, training, and awareness programs are effective at enhancing employee behavior and defenses against social engineering.
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
The document is a resolution from the American Bar Association that encourages organizations to develop and maintain cybersecurity programs to protect their data and systems from threats. It recommends that organizations conduct risk assessments, implement security controls based on the risks identified, develop response plans for cyber attacks, and engage in information sharing about cyber threats. The resolution aims to address the growing cybersecurity threats facing both private and public sector organizations and the nation's critical infrastructure systems.
This document discusses the potential for using multimedia in enterprise security user training. It argues that traditional training methods like posters and emails are ineffective. Multimedia could provide more effective training through interactive presentations using audio, video, images and text. Examples show multimedia has been successfully used in other training domains. The document concludes that a multimedia training tool could improve security awareness if designed carefully to avoid helping adversaries understand security systems and policies.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Cyber security: challenges for society- literature reviewIOSR Journals
This document summarizes challenges related to cyber security for society based on a literature review. It discusses how cyber security plays an important role in technology development and internet services. Key challenges include a lack of coordination between security agencies and critical IT infrastructure, as well as widespread computer illiteracy in some countries like India that has led to increased cybercrime. The document also reviews common approaches to IT security risk analysis and discusses threats to cyber security such as cyber attacks aimed at damaging systems and cyber exploitation for unlawful purposes.
The document discusses the role and responsibilities of the National Critical Information Infrastructure Protection Centre (NCIIPC) in India. It provides examples of past cyber attacks on critical information infrastructures around the world, such as Stuxnet and Flame malware. It also outlines international efforts to protect critical infrastructure and discusses India's initiatives to enhance information security and protect critical government organizations from cyber attacks.
Online security – an assessment of the newsunnyjoshi88
This document discusses online security risks and recommendations. It begins with definitions of online security, information security, information warfare, and internet security risk. It then reviews literature finding increasing dependence on the internet, expansion of criminal activity online like identity theft, and growing demand for cybersecurity specialists. Specific examples of data breaches at major organizations are provided. The document recommends a multi-layered approach to online security including collaboration between governments, businesses, and individuals. It also recommends businesses reconsider security strategies with trends like cloud computing and social media increasing risk.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
The document provides an overview of cyber risks and proposes a governance framework to manage those risks. It defines key concepts like cyber, security, threats and governance. It then presents a meta-model and framework with four core concepts: risks, response, reputation and resources that revolve around an organization's cyber ecosystem. The framework is intended to provide high-level guidance for executives on continuously governing cyber risks through a strategic approach.
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
In today’s dynamic and technologically advanced world, the Internet has become one of the most innovative and rapidly growing technologies. With its rise, it has also become vulnerable to a significant increase in occurrences of cyber attacks, with detrimental effects. Typically, these cyber attacks are targeted at accessing, manipulating, or damaging confidential data, extracting users money, or extorting an organization’s or user’s private information. Sensitive information, whether intellectual property, financial data, confidential information, or other forms of private data are exposed to unauthorized access or disclosure, which can have adverse consequences. Protecting data has become one of the greatest obstacles today as cyber attacks are constantly escalating. Along with the growth of internet services and the advancement of information technology, the importance of cybersecurity is crucial. Cybersecurity aims to ensure that the security interests of the company and users assets are protected and preserved against relevant cyber threats in the digital world. The data and confidentiality of computing assets pertaining to the network of an organization are protected by cybersecurity. This paper mainly focuses on threats and issues in cybersecurity facing modern technologies. It also focuses on the latest cybersecurity strategies and developments that are transforming the face of cybersecurity. Omkar Veerendra Nikhal "An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38195.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38195/an-analytical-study-on-attacks-and-threats-in-cyber-security-and-its-evolving-trends-on-modern-technologies/omkar-veerendra-nikhal
Institutional Cybersecurity from Military PerspectiveGovernment
1. The document discusses institutional cybersecurity from a military perspective, analyzing challenges, organizational structure, the military decision-making process (MDMP), and cybersecurity workforce.
2. It outlines key dilemmas institutions face regarding cybersecurity, such as security vs privacy and technical vs administrative approaches.
3. Military organizations are especially vulnerable due to their use of advanced technologies and need to ensure robust cybersecurity policies and preparedness for threats like malware and cyber espionage.
The document discusses how predictive cyber intelligence can help organizations stay ahead of both cyber and physical security threats. It notes that investigations often find warning signs were missed by conventional defenses. The challenge is for organizations to detect potential threats early through tools like predictive cyber intelligence, which uses software and hardware to monitor public information for pre-incident indicators. This allows businesses to contain threats before damage occurs, whereas reactive security measures only address threats after the fact. The document provides examples of both cyberattacks and physical security risks organizations face and argues that predictive cyber intelligence can add important depth to defensive strategies.
The study provides valuable insight into the change in agency investment, awareness, and support for cybersecurity – as well as the challenges and barriers faced in achieving these goals.
Notable Takeaways:
• Financial Risks: According to a 2016 BetaNews article, “the total average cost of a data breach is now put at $6.53M, which includes $3.72M in lost business. Forensic investigations can cost up to $2,000 an hour, and the average annual salary of a security engineer is $92,000. With these high costs, proper preventative attack measures and cybersecurity insurance are crucial for the financial safety of organizations
• Employee Risks: A sizeable percentage of local agencies responded to never having taken cybersecurity awareness training for citizens (71.4%), contractors (61.9%), and local elected officials (50.1%). Given that human error creates vulnerabilities for breaches through targeted attacks like spear-phishing – employee education, RBAC measures, and RMS are of critical importance for agencies.
• What Agencies Want: The top three actions that were recommended by the respondents of the study were (1) Higher funding for cybersecurity; (2) Better cybersecurity polices; and (3) Greater cybersecurity awareness among employees in their local governments.
Cloud computing environment is very much prone to intrusion attacks due to modern-days new attacks and hence security of cloud computing is very much required. People will move towards cloud services until and unless they are not having full reliance in its security. Although various measures are taken place from time to time but still various attacks like DDOS attacks are glaring. Hence Multiple Dynamic Thresholds based DDOS attack detection mechanism is proposed as statistical algorithms are more stable
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
A paper writing submission on an existing or emerging area in Internet Governance, leveraging the learnings from the course (Internet Governance) and Internet Society 2021 Projects. Papers will be evaluated by a selection committee and the best submissions will be selected as IGF Youth Ambassadors.
Online security – an assessment of the newsunnyjoshi88
The document discusses e-business and online security. It defines key terms and reviews literature finding that lack of trust and privacy concerns are major barriers to e-commerce. The literature review finds that online security risks come from state-sponsored cyber warfare, criminal hacking, identity theft and more. It concludes that current security levels are inadequate given growing threats and calls for more strategic priority and action on online security issues.
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
The number of disaster occurrences around the world based on the climate changes due to the global
warming has been indicating an increase. To prevent and cope with such disaster, a number of researches
have been actively conducted to combine the user location service as well as the sensor network
technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of
the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this
thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and
the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design
the beacon protocol collected from the smartphone to safely receive the notification information. In
addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a
comparative analysis was conducted.
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...IJNSA Journal
The paper at hand presents the design of a survey aiming at the cyber-security culture assessment of critical infrastructures during the COVID-19 crisis, when living reality was heavily disturbed and working conditions fundamentally affected. The survey is rooted in a security culture framework layered into two levels, organizational and individual, further analyzed into 10 different security dimensions consisted of 52 domains. An in-depth questionnaire building analysis is presented focusing on the aims, goals, and expected results. It concludes with the survey implementation approach while underlining the framework’s first application and its revealing insights during a global crisis.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cyber security is a potential activity by which information and other communication systems are protected from and or defended against the unauthorized use or modification or exploitation or even theft. Likewise, cyber security is a well designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access. All sorts of data whether it is government, corporate, or personal need high security however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level. Gajendra Kumar Malviya "Cyber Crime and Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49888.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49888/cyber-crime-and-cyber-security/gajendra-kumar-malviya
This document discusses controls for protecting critical information infrastructure from cyberattacks. It begins by examining vulnerabilities in critical information infrastructure that cyberthreats exploit to launch attacks, such as software vulnerabilities, personnel vulnerabilities, and network protocol vulnerabilities. It then analyzes various cyberthreats like malware, distributed denial of service attacks, cyberwarfare, and social engineering that target these vulnerabilities. The document proposes implementing a system of preventive, detective, and corrective security controls based on general systems theory to address the vulnerabilities. Finally, it presents a model for securing critical information infrastructure that is currently insecure.
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
The novel coronavirus (COVID-19) has changed the way human think and live. COVID-19 has forced people to embrace new practices such as social distancing and remote working.
This document discusses the potential for using multimedia in enterprise security user training. It argues that traditional training methods like posters and emails are ineffective. Multimedia could provide more effective training through interactive presentations using audio, video, images and text. Examples show multimedia has been successfully used in other training domains. The document concludes that a multimedia training tool could improve security awareness if designed carefully to avoid helping adversaries understand security systems and policies.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Cyber security: challenges for society- literature reviewIOSR Journals
This document summarizes challenges related to cyber security for society based on a literature review. It discusses how cyber security plays an important role in technology development and internet services. Key challenges include a lack of coordination between security agencies and critical IT infrastructure, as well as widespread computer illiteracy in some countries like India that has led to increased cybercrime. The document also reviews common approaches to IT security risk analysis and discusses threats to cyber security such as cyber attacks aimed at damaging systems and cyber exploitation for unlawful purposes.
The document discusses the role and responsibilities of the National Critical Information Infrastructure Protection Centre (NCIIPC) in India. It provides examples of past cyber attacks on critical information infrastructures around the world, such as Stuxnet and Flame malware. It also outlines international efforts to protect critical infrastructure and discusses India's initiatives to enhance information security and protect critical government organizations from cyber attacks.
Online security – an assessment of the newsunnyjoshi88
This document discusses online security risks and recommendations. It begins with definitions of online security, information security, information warfare, and internet security risk. It then reviews literature finding increasing dependence on the internet, expansion of criminal activity online like identity theft, and growing demand for cybersecurity specialists. Specific examples of data breaches at major organizations are provided. The document recommends a multi-layered approach to online security including collaboration between governments, businesses, and individuals. It also recommends businesses reconsider security strategies with trends like cloud computing and social media increasing risk.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
The document provides an overview of cyber risks and proposes a governance framework to manage those risks. It defines key concepts like cyber, security, threats and governance. It then presents a meta-model and framework with four core concepts: risks, response, reputation and resources that revolve around an organization's cyber ecosystem. The framework is intended to provide high-level guidance for executives on continuously governing cyber risks through a strategic approach.
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
In today’s dynamic and technologically advanced world, the Internet has become one of the most innovative and rapidly growing technologies. With its rise, it has also become vulnerable to a significant increase in occurrences of cyber attacks, with detrimental effects. Typically, these cyber attacks are targeted at accessing, manipulating, or damaging confidential data, extracting users money, or extorting an organization’s or user’s private information. Sensitive information, whether intellectual property, financial data, confidential information, or other forms of private data are exposed to unauthorized access or disclosure, which can have adverse consequences. Protecting data has become one of the greatest obstacles today as cyber attacks are constantly escalating. Along with the growth of internet services and the advancement of information technology, the importance of cybersecurity is crucial. Cybersecurity aims to ensure that the security interests of the company and users assets are protected and preserved against relevant cyber threats in the digital world. The data and confidentiality of computing assets pertaining to the network of an organization are protected by cybersecurity. This paper mainly focuses on threats and issues in cybersecurity facing modern technologies. It also focuses on the latest cybersecurity strategies and developments that are transforming the face of cybersecurity. Omkar Veerendra Nikhal "An Analytical Study on Attacks and Threats in Cyber Security and its Evolving Trends on Modern Technologies" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38195.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38195/an-analytical-study-on-attacks-and-threats-in-cyber-security-and-its-evolving-trends-on-modern-technologies/omkar-veerendra-nikhal
Institutional Cybersecurity from Military PerspectiveGovernment
1. The document discusses institutional cybersecurity from a military perspective, analyzing challenges, organizational structure, the military decision-making process (MDMP), and cybersecurity workforce.
2. It outlines key dilemmas institutions face regarding cybersecurity, such as security vs privacy and technical vs administrative approaches.
3. Military organizations are especially vulnerable due to their use of advanced technologies and need to ensure robust cybersecurity policies and preparedness for threats like malware and cyber espionage.
The document discusses how predictive cyber intelligence can help organizations stay ahead of both cyber and physical security threats. It notes that investigations often find warning signs were missed by conventional defenses. The challenge is for organizations to detect potential threats early through tools like predictive cyber intelligence, which uses software and hardware to monitor public information for pre-incident indicators. This allows businesses to contain threats before damage occurs, whereas reactive security measures only address threats after the fact. The document provides examples of both cyberattacks and physical security risks organizations face and argues that predictive cyber intelligence can add important depth to defensive strategies.
The study provides valuable insight into the change in agency investment, awareness, and support for cybersecurity – as well as the challenges and barriers faced in achieving these goals.
Notable Takeaways:
• Financial Risks: According to a 2016 BetaNews article, “the total average cost of a data breach is now put at $6.53M, which includes $3.72M in lost business. Forensic investigations can cost up to $2,000 an hour, and the average annual salary of a security engineer is $92,000. With these high costs, proper preventative attack measures and cybersecurity insurance are crucial for the financial safety of organizations
• Employee Risks: A sizeable percentage of local agencies responded to never having taken cybersecurity awareness training for citizens (71.4%), contractors (61.9%), and local elected officials (50.1%). Given that human error creates vulnerabilities for breaches through targeted attacks like spear-phishing – employee education, RBAC measures, and RMS are of critical importance for agencies.
• What Agencies Want: The top three actions that were recommended by the respondents of the study were (1) Higher funding for cybersecurity; (2) Better cybersecurity polices; and (3) Greater cybersecurity awareness among employees in their local governments.
Cloud computing environment is very much prone to intrusion attacks due to modern-days new attacks and hence security of cloud computing is very much required. People will move towards cloud services until and unless they are not having full reliance in its security. Although various measures are taken place from time to time but still various attacks like DDOS attacks are glaring. Hence Multiple Dynamic Thresholds based DDOS attack detection mechanism is proposed as statistical algorithms are more stable
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
A paper writing submission on an existing or emerging area in Internet Governance, leveraging the learnings from the course (Internet Governance) and Internet Society 2021 Projects. Papers will be evaluated by a selection committee and the best submissions will be selected as IGF Youth Ambassadors.
Online security – an assessment of the newsunnyjoshi88
The document discusses e-business and online security. It defines key terms and reviews literature finding that lack of trust and privacy concerns are major barriers to e-commerce. The literature review finds that online security risks come from state-sponsored cyber warfare, criminal hacking, identity theft and more. It concludes that current security levels are inadequate given growing threats and calls for more strategic priority and action on online security issues.
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
The number of disaster occurrences around the world based on the climate changes due to the global
warming has been indicating an increase. To prevent and cope with such disaster, a number of researches
have been actively conducted to combine the user location service as well as the sensor network
technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of
the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this
thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and
the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design
the beacon protocol collected from the smartphone to safely receive the notification information. In
addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a
comparative analysis was conducted.
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...IJNSA Journal
The paper at hand presents the design of a survey aiming at the cyber-security culture assessment of critical infrastructures during the COVID-19 crisis, when living reality was heavily disturbed and working conditions fundamentally affected. The survey is rooted in a security culture framework layered into two levels, organizational and individual, further analyzed into 10 different security dimensions consisted of 52 domains. An in-depth questionnaire building analysis is presented focusing on the aims, goals, and expected results. It concludes with the survey implementation approach while underlining the framework’s first application and its revealing insights during a global crisis.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cyber security is a potential activity by which information and other communication systems are protected from and or defended against the unauthorized use or modification or exploitation or even theft. Likewise, cyber security is a well designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access. All sorts of data whether it is government, corporate, or personal need high security however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level. Gajendra Kumar Malviya "Cyber Crime and Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49888.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49888/cyber-crime-and-cyber-security/gajendra-kumar-malviya
This document discusses controls for protecting critical information infrastructure from cyberattacks. It begins by examining vulnerabilities in critical information infrastructure that cyberthreats exploit to launch attacks, such as software vulnerabilities, personnel vulnerabilities, and network protocol vulnerabilities. It then analyzes various cyberthreats like malware, distributed denial of service attacks, cyberwarfare, and social engineering that target these vulnerabilities. The document proposes implementing a system of preventive, detective, and corrective security controls based on general systems theory to address the vulnerabilities. Finally, it presents a model for securing critical information infrastructure that is currently insecure.
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
The novel coronavirus (COVID-19) has changed the way human think and live. COVID-19 has forced people to embrace new practices such as social distancing and remote working.
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
8
Network Security April 2020
FEATURE
Are your IT staff ready
for the pandemic-driven
insider threat? Phil Chapman
Obviously the threat to human life is
the top concern for everyone at this
moment. But businesses are also starting
to suffer as productivity slips globally
and the workforce itself is squeezed.
The UK Government’s March budget
did announce some measures, especially
for small and medium-size enterprises
(SMEs), that will make this period
slightly less painful for organisations.
However, as is apparent from the tank-
ing stock market (the FTSE 100 has
hit levels not seen since June 2012) the
economy and pretty much all businesses
in the country (unless you produce hand
sanitiser) are going to suffer. There is no
time like now for the UK to embrace
its mantra of ‘keep calm and carry on’
because that is what we must do if we’re
going to keep business flowing.
For the IT department at large there is
lots of urgent work to do to ensure that
the business is prepared to keep running
smoothly even if people are having to
work remotely. The task at hand for cyber
security professionals is arguably even
larger as Covid-19 is seeing cyber criminals
capitalising on the fact that the insider
threat is worse than ever, with more people
working remotely from personal devices
than many IT and cyber security teams
have likely ever prepared for.
This article will argue that the cyber
security workforce, which is already suf-
fering a digital skills crisis, may also be
lacking the adequate soft skills required
to effectively tackle the insider threat
that has been exacerbated by the pan-
demic. It will first examine the insider
threat, and why this has become so
much more insidious because of Covid-
19. It will then look into the essential
soft skills required to tackle this threat,
before examining how organisations can
effectively implement an apprentice-
ship strategy that generates professionals
with both hard and soft skills, includ-
ing advice from the CISO of globally
respected law firm Pinsent Masons, who
will provide insight into how he is mak-
ing his strategy work. It will conclude
that many of these issues could be solved
if the industry didn’t rely so heavily on
recruiting graduates and rather looked
towards hiring apprentices.
The insider threat
In the best of times, every cyber-pro-
fessional knows that the biggest threat
to an organisation’s IT infrastructure
is people, both malicious actors and
– much more often – employees and
partners making mistakes. The problem
is that people lack cyber knowledge and
so commit careless actions – for exam-
ple, forwarding sensitive information to
the wrong recipient over email or plug-
ging rogue USBs into their device (yes,
that still happens). Cyber criminals
capitalise on this ignorance by utilising
social engineering tactics ranging from
the painfully simple, like fake emails
from Amazon, to the very sophisticated,
such as.
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
8
Network Security April 2020
FEATURE
Are your IT staff ready
for the pandemic-driven
insider threat? Phil Chapman
Obviously the threat to human life is
the top concern for everyone at this
moment. But businesses are also starting
to suffer as productivity slips globally
and the workforce itself is squeezed.
The UK Government’s March budget
did announce some measures, especially
for small and medium-size enterprises
(SMEs), that will make this period
slightly less painful for organisations.
However, as is apparent from the tank-
ing stock market (the FTSE 100 has
hit levels not seen since June 2012) the
economy and pretty much all businesses
in the country (unless you produce hand
sanitiser) are going to suffer. There is no
time like now for the UK to embrace
its mantra of ‘keep calm and carry on’
because that is what we must do if we’re
going to keep business flowing.
For the IT department at large there is
lots of urgent work to do to ensure that
the business is prepared to keep running
smoothly even if people are having to
work remotely. The task at hand for cyber
security professionals is arguably even
larger as Covid-19 is seeing cyber criminals
capitalising on the fact that the insider
threat is worse than ever, with more people
working remotely from personal devices
than many IT and cyber security teams
have likely ever prepared for.
This article will argue that the cyber
security workforce, which is already suf-
fering a digital skills crisis, may also be
lacking the adequate soft skills required
to effectively tackle the insider threat
that has been exacerbated by the pan-
demic. It will first examine the insider
threat, and why this has become so
much more insidious because of Covid-
19. It will then look into the essential
soft skills required to tackle this threat,
before examining how organisations can
effectively implement an apprentice-
ship strategy that generates professionals
with both hard and soft skills, includ-
ing advice from the CISO of globally
respected law firm Pinsent Masons, who
will provide insight into how he is mak-
ing his strategy work. It will conclude
that many of these issues could be solved
if the industry didn’t rely so heavily on
recruiting graduates and rather looked
towards hiring apprentices.
The insider threat
In the best of times, every cyber-pro-
fessional knows that the biggest threat
to an organisation’s IT infrastructure
is people, both malicious actors and
– much more often – employees and
partners making mistakes. The problem
is that people lack cyber knowledge and
so commit careless actions – for exam-
ple, forwarding sensitive information to
the wrong recipient over email or plug-
ging rogue USBs into their device (yes,
that still happens). Cyber criminals
capitalise on this ignorance by utilising
social engineering tactics ranging from
the painfully simple, like fake emails
from Amazon, to the very sophisticated,
such as.
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
As universities migrate online due to the advent of Covid-19, there is a need for enhanced security in information systems in the institution of higher learning. Many opted to invest in technological approaches to mitigate cybersecurity threats; however, the most common types of cybersecurity breaches happen due to the human factor, well known as end-user error or actions. Thus, this study aimed to identify and explore possible end-user errors in academia and the resulting vulnerabilities and threats that could affect the integrity of the university's information system. The study further presented state-of-the-art humanoriented security threats countermeasures to compliment universities' cybersecurity plans. Countermeasures include well-tailored ICT policies, incident response procedures, and education to protect themselves from security events (disruption, distortion, and exploitation). Adopted is a mixedmethod research approach with a qualitative research design to guide the study. An open-ended questionnaire and semi-structured interviews were used as data collection tools. Findings showed that system end-user errors remain the biggest security threat to information systems security in institutions of higher learning. Indeed errors make information systems vulnerable to certain cybersecurity attacks and, when exploited, put legitimate users, institutional network, and its computers at risk of contracting viruses, worms, Trojan, and expose it to spam, phishing, e-mail fraud, and other modern security attacks such as DDoS, session hijacking, replay attack and many more. Understanding that technology has failed to fully protect systems, specific recommendations are provided for the institution of higher education to consider improving employee actions and minimizing security incidents in their eLearning platforms, post Covid-19.
Cyber security involves defending computers, networks, and data from malicious attacks. It includes practices like network security, application security, information security, operational security, disaster recovery, business continuity, and end-user education. The global cyber threat is rapidly evolving, with over 7.9 billion records exposed in data breaches in the first nine months of 2019. Governments are responding by providing guidance to help organizations implement effective cyber security practices like continuous monitoring recommended by the National Institute of Standards and Technology cybersecurity framework.
A Systematic Literature Review On The Cyber SecurityAmy Cernava
This document summarizes a literature review on cyber security. It begins by introducing the topic and defining cyber security as the methods used to protect networks, computers, programs and data from unauthorized access and attacks. It then discusses the growth of internet usage and connected devices, and how this has led to increased cyber threats. The review covers various topics related to cyber security including its history and importance, different types of threats, frameworks and tools used, and ongoing challenges. The goal is to provide a comprehensive overview of current research on cyber security issues and solutions.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
Information security threats encountered by Malaysian public sector data cen...nooriasukmaningtyas
Data centers are primarily the main targets of cybercriminals and security threats as they host various critical information and communication technology (ICT) services. Identifying the threats and managing the risks associated with data centers have become a major challenge as this will enable organizations to optimize their resources to focus on the most hazardous threats to prevent the potential risks and damages. The objective of this paper is to identify major ICT security threats to data centers in the Malaysian public sector and their causes. The data for this study was collected through interview sessions. A total of 33 respondents from various government organizations were interviewed. The results revealed that the technical threats, spyware, phishing, bluesnarfing threats, social engineering and virus, trojan, malware, ransomware, viral websites threats are the major categories of threats often encountered by the malaysian public sector organizations. The causes for these threats are lack of budget, competent personnel, and manpower for security tasks, user awareness; lack of compliances and monitoring; insufficient security policies and procedures as well as deliberate cyber attacks. The outcome of this study will give a greater degree of awareness and understanding to the ICT security officers, who are entrusted with data center security.
CYBERCRIME AWARENESS ON SOCIAL MEDIA: A COMPARISON STUDYIJNSA Journal
The popularity of social media has not waned since it gained popularity in the early 2000s. Social networks such as Facebook, YouTube, Twitter, and Snapchat boast billions of active users worldwide. Social media remains an invaluable tool to both organizations and individuals because of the ease of sharing information and media and the ability to both reach and engage specific audiences of interest. Due to its massive user base, communication ease, and data sharing, social media presents fertile ground for the conduct of cybercrime. Cybercriminals actively target social media users, use social media to facilitate their cybercrime activities, and advertise their criminal activities on social media. The potential dangers of cybercrime on social media necessitate that organizations institute cybercrime on social media policies to guard against these threats and provide employees with cybercrime awareness on social media (CASM) training. CASM is important as corporate and personal use of social media becomes increasingly blurred. This study attempted to measure the CASM scores of employees in security-critical sectors and determine if hearing disability had any impact on the CASM scores. Employees of the education, finance, government, information technology, legal, medicine, military, and Policing sectors in the United States were surveyed. Results showed that the CASM score was average across all sectors. No statistically significant difference in CASM score was found between groups with and without hearing difficulties, although CASM scores were slightly lower for employees with hearing difficulties. The results suggested that more CASM training is needed for employees in the surveyed sectors.
This document discusses cyber security and provides an overview of the topic. It defines cyber security and lists some common categories including network security, application security, information security, operational security, disaster recovery, and end-user education. It then discusses the scale of the cyber threat, noting a large number of data breaches in recent years. Different types of cyber threats like hacking and ransomware are mentioned. The document concludes by outlining recommendations for managing cyber security risks through assessments, mitigation plans, and an evolving security program.
Post covid 19 era new age of cyber securityIgnitec Inc
The COVID-19 pandemic has altered the way Americans and everyone around the world live. Flattening the curve has changed everything- mandatory work from home policies seems to be the new normal, leading organizations to protect their sensitive data and businesses.
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
However, the adoption of cloud-based cybersecurity products and the advent of IoT security across organizations is likely to create lucrative opportunities for the entire ecosystem; businesses, governments, and cybersecurity vendors.
Visit: https://www.sganalytics.com/blog/increasing-cyberattacks-resulting-in-a-demand-for-cybersecurity-solutions/
The document discusses various topics related to digital empowerment and online security. It covers online security and privacy measures, threats in the digital world such as malware and phishing, an overview of blockchain technology and its applications, and online learning tools. The key points discussed include the importance of strong authentication, encryption, software updates and vigilance against phishing to enhance online security. Common cyber threats like ransomware, DDoS attacks, insider threats and IoT vulnerabilities are also summarized. Blockchain technology, its decentralized nature, consensus mechanisms and applications in areas like cryptocurrency and supply chain management are briefly outlined. Popular online learning tools including learning management systems and video conferencing platforms are also mentioned.
Safeguarding the Digital Realm: The Importance of Cybersecurity
Introduction:
In our increasingly interconnected world, cybersecurity has emerged as a critical concern for individuals, organizations, and governments alike. The pervasive nature of technology and the rapid digitization of various sectors have brought about numerous benefits, but they have also introduced unprecedented risks and vulnerabilities. As cyber threats continue to evolve in sophistication and scale, it is crucial to understand the significance of cybersecurity and adopt effective measures to protect our digital infrastructure.
The Ever-Present Cyber Threat Landscape:
Cyberattacks come in various forms, including data breaches, malware infections, ransomware attacks, phishing scams, and more. The motives behind these attacks range from financial gain to espionage, activism, and even geopolitical warfare. The digital landscape is teeming with hackers, criminal syndicates, and state-sponsored actors who constantly seek to exploit vulnerabilities in computer systems and networks. The impact of successful cyberattacks can be devastating, causing financial losses, reputational damage, and compromising personal privacy.
Protecting Sensitive Data:
One of the primary objectives of cybersecurity is to safeguard sensitive information. This includes personal data, financial records, intellectual property, and classified government documents. Robust encryption algorithms, secure authentication protocols, and effective access controls are essential components of protecting data from unauthorized access. Additionally, data backup and disaster recovery strategies play a crucial role in ensuring that information remains intact and accessible even in the event of a breach.
Securing Critical Infrastructure:
Cybersecurity is not limited to protecting personal information or corporate data; it also extends to safeguarding critical infrastructure. Industries such as energy, transportation, healthcare, and finance heavily rely on interconnected networks to function effectively. A breach in these sectors could result in catastrophic consequences, ranging from power outages and disruptions in transportation systems to compromised patient records and financial instability. Consequently, robust cybersecurity measures must be implemented to protect these vital systems from malicious actors.
Building a Cyber-Resilient Culture:
While technological solutions play a significant role in cybersecurity, an equally important aspect is fostering a cyber-resilient culture. This involves educating individuals and organizations about the risks, promoting good cyber hygiene practices, and cultivating a mindset of vigilance. Regularly updating software, using strong and unique passwords, enabling multi-factor authentication, and being cautious of suspicious emails or links are some of the fundamental steps to bolster cybersecurity defenses. Organizations should prioritize employee training programs and e
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
This document discusses threats, attacks, and vulnerabilities which play a key role in cyber security. It begins by defining cyber security as preventing, detecting, and responding to cyber attacks. It then discusses various common cyber threats like cyber theft, cyber vandalism, and denial of service attacks. It also examines different types of cyber attacks like untargeted and targeted attacks. The document outlines how vulnerabilities in software, policies, users, and other areas can enable these threats and attacks. It concludes that while technology can help reduce cyber attacks, vulnerabilities ultimately reside with human behavior, so education is important to strengthen cyber security.
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on the latest about cyber security techniques, ethics and the trends changing the face of cyber security. This paper mainly focuses on cyber Security and its fundamental elements on latest technologies. Aye Mya Sandar | Ya Min | Khin Myat Nwe Win "Fundamental Areas of Cyber Security on Latest Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26550.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26550/fundamental-areas-of-cyber-security-on-latest-technology/aye-mya-sandar
The document summarizes a textbook called "Rural Property Valuation" published by the Appraisal Institute. It discusses how the textbook provides essential guidance for appraising rural properties, covering topics unique to valuing agricultural land, ranches, timberland, and other rural uses. The textbook is said to be an important resource for students and practitioners to understand rural markets and issues. It contains 19 chapters covering key appraisal topics from a rural perspective, and provides up-to-date information on valuation of rural properties in the United States.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
Meet Dinah Mattingly – Larry Bird’s Partner in Life and Loveget joys
Get an intimate look at Dinah Mattingly’s life alongside NBA icon Larry Bird. From their humble beginnings to their life today, discover the love and partnership that have defined their relationship.
Everything You Need to Know About IPTV Ireland.pdfXtreame HDTV
The way we consume television has evolved dramatically over the past decade. Internet Protocol Television (IPTV) has emerged as a popular alternative to traditional cable and satellite TV, offering a wide range of channels and on-demand content via the internet. In Ireland, IPTV is rapidly gaining traction, with Xtreame HDTV being one of the prominent providers in the market. This comprehensive guide will delve into everything you need to know about IPTV Ireland, focusing on Xtreame HDTV, its features, benefits, and how it is revolutionizing TV viewing for Irish audiences.
Christian Louboutin: Innovating with Red Solesget joys
Christian Louboutin is celebrated for his innovative approach to footwear design, marked by his trademark red soles. This in-depth look at his life and career explores the origins of his creativity, the milestones in his journey, and the impact of his work on the fashion industry. Learn how Louboutin's bold vision and dedication to excellence have made his brand synonymous with luxury and style.
The Evolution of the Leonardo DiCaprio Haircut: A Journey Through Style and C...greendigital
Leonardo DiCaprio, a name synonymous with Hollywood stardom and acting excellence. has captivated audiences for decades with his talent and charisma. But, the Leonardo DiCaprio haircut is one aspect of his public persona that has garnered attention. From his early days as a teenage heartthrob to his current status as a seasoned actor and environmental activist. DiCaprio's hairstyles have evolved. reflecting both his personal growth and the changing trends in fashion. This article delves into the many phases of the Leonardo DiCaprio haircut. exploring its significance and impact on pop culture.
Barbie Movie Review - The Astras.pdffffftheastras43
Barbie Movie Review has gotten brilliant surveys for its fun and creative story. Coordinated by Greta Gerwig, it stars Margot Robbie as Barbie and Ryan Gosling as Insight. Critics adore its perky humor, dynamic visuals, and intelligent take on the notorious doll's world. It's lauded for being engaging for both kids and grown-ups. The Astras profoundly prescribes observing the Barbie Review for a delightful and colorful cinematic involvement.https://theastras.com/hca-member-gradebooks/hca-gradebook-barbie/
_7 OTT App Builders to Support the Development of Your Video Applications_.pdfMega P
Due to their ability to produce engaging content more quickly, over-the-top (OTT) app builders have made the process of creating video applications more accessible. The invitation to explore these platforms emphasizes how over-the-top (OTT) applications hold the potential to transform digital entertainment.
240529_Teleprotection Global Market Report 2024.pdfMadhura TBRC
The teleprotection market size has grown
exponentially in recent years. It will grow from
$21.92 billion in 2023 to $28.11 billion in 2024 at a
compound annual growth rate (CAGR) of 28.2%. The
teleprotection market size is expected to see
exponential growth in the next few years. It will grow
to $70.77 billion in 2028 at a compound annual
growth rate (CAGR) of 26.0%.
Unveiling Paul Haggis Shaping Cinema Through Diversity. .pdfkenid14983
Paul Haggis is undoubtedly a visionary filmmaker whose work has not only shaped cinema but has also pushed boundaries when it comes to diversity and representation within the industry. From his thought-provoking scripts to his engaging directorial style, Haggis has become a prominent figure in the world of film.
Top IPTV UK Providers of A Comprehensive Review.pdfXtreame HDTV
The television landscape in the UK has evolved significantly with the rise of Internet Protocol Television (IPTV). IPTV offers a modern alternative to traditional cable and satellite TV, allowing viewers to stream live TV, on-demand videos, and other multimedia content directly to their devices over the internet. This review provides an in-depth look at the top IPTV UK providers, their features, pricing, and what sets them apart.
Orpah Winfrey Dwayne Johnson: Titans of Influence and Inspirationgreendigital
Introduction
In the realm of entertainment, few names resonate as Orpah Winfrey Dwayne Johnson. Both figures have carved unique paths in the industry. achieving unparalleled success and becoming iconic symbols of perseverance, resilience, and inspiration. This article delves into the lives, careers. and enduring legacies of Orpah Winfrey Dwayne Johnson. exploring how their journeys intersect and what we can learn from their remarkable stories.
Follow us on: Pinterest
Early Life and Backgrounds
Orpah Winfrey: From Humble Beginnings to Media Mogul
Orpah Winfrey, often known as Oprah due to a misspelling on her birth certificate. was born on January 29, 1954, in Kosciusko, Mississippi. Raised in poverty by her grandmother, Winfrey's early life was marked by hardship and adversity. Despite these challenges. she demonstrated a keen intellect and an early talent for public speaking.
Winfrey's journey to success began with a scholarship to Tennessee State University. where she studied communication. Her first job in media was as a co-anchor for the local evening news in Nashville. This role paved the way for her eventual transition to talk show hosting. where she found her true calling.
Dwayne Johnson: From Wrestling Royalty to Hollywood Superstar
Dwayne Johnson, also known by his ring name "The Rock," was born on May 2, 1972, in Hayward, California. He comes from a family of professional wrestlers, with both his father, Rocky Johnson. and his grandfather, Peter Maivia, being notable figures in the wrestling world. Johnson's early life was spent moving between New Zealand and the United States. experiencing a variety of cultural influences.
Before entering the world of professional wrestling. Johnson had aspirations of becoming a professional football player. He played college football at the University of Miami. where he was part of a national championship team. But, injuries curtailed his football career, leading him to follow in his family's footsteps and enter the wrestling ring.
Career Milestones
Orpah Winfrey: The Queen of All Media
Winfrey's career breakthrough came in 1986 when she launched "The Oprah Winfrey Show." The show became a cultural phenomenon. drawing millions of viewers daily and earning many awards. Winfrey's empathetic and candid interviewing style resonated with audiences. helping her tackle diverse and often challenging topics.
Beyond her talk show, Winfrey expanded her empire to include the creation of Harpo Productions. a multimedia production company. She also launched "O, The Oprah Magazine" and OWN: Oprah Winfrey Network, further solidifying her status as a media mogul.
Dwayne Johnson: From The Ring to The Big Screen
Dwayne Johnson's wrestling career took off in the late 1990s. when he became one of the most charismatic and popular figures in WWE. His larger-than-life persona and catchphrases endeared him to fans. making him a household name. But, Johnson had ambitions beyond the wrestling ring.
In the early 20
Modern Radio Frequency Access Control Systems: The Key to Efficiency and SafetyAITIX LLC
Today's fast-paced environment worries companies of all sizes about efficiency and security. Businesses are constantly looking for new and better solutions to solve their problems, whether it's data security or facility access. RFID for access control technologies have revolutionized this.
At Digidev, we are working to be the leader in interactive streaming platforms of choice by smart device users worldwide.
Our goal is to become the ultimate distribution service of entertainment content. The Digidev application will offer the next generation television highway for users to discover and engage in a variety of content. While also providing a fresh and
innovative approach towards advertainment with vast revenue opportunities. Designed and developed by Joe Q. Bretz
From Swing Music to Big Band Fame_ 5 Iconic Artists.pptx
D372326.pdf
1. American Journal of Multidisciplinary Research & Development (AJMRD)
Volume 03, Issue 07 (July- 2021), PP 23-26
ISSN: 2360-821X
www.ajmrd.com
Multidisciplinary Journal www.ajmrd.com Page | 23
Research Paper Open Access
Information systems security in the age of pandemics: COVID-19
and beyond
Dismas Kitaria1
, David Kibara2
Stephen Mageto3
,Patrick Njuguna4
1,2,3,4
Computer Science Department, Meru University of Science and Technology, Kenya
*Corresponding Author: DismasKitaria
ABSTRACT: In the wake of the COVID-19, most organizations have had to invest in different information
systems to facilitate virtual working and meetings between organizations to ensure adherence to the COVID-19
prevention guidelines. This presented a new challenge of information systems security, which most organizations
may not have been ready to handle or manage. As a result, organizations have had to change how they view
information systems security. This new unfolding of events has presented an opportunity for cybercriminals to
exploit the crisis, which involves some laxity in security measures to accommodate the new working formula and
focus shifting to the pandemic. Due to the increased risks and challenges to information systems, organizations
have understood the need to invest in information systems security. To address human actions as a source of risk
to information systems, organizations have and should develop appropriate interventions such as cybersecurity
awareness campaigns, governance frameworks, and protocols. Even beyond the COVID-19 era, the policies,
protocols, and guidelines that organizations have developed to prevent attacks on information systems will
become operations guiding policies.
Keywords: cyberattacks,cybercriminals, COVID-19, information system security
I. Introduction
In the wake of the COVID-19, most organizations have had to invest in different information systems to
facilitate virtual working and meetings between organizations. While this move has helped organizations remain
operational in a manner that adheres to the COVID-19 prevention guidelines, it presents a new challenge of
information systems security, which most organizations may not have been ready to handle or manage. There have
been different technological innovations that have been developed, including information systems and technology
geared towards making a positive contribution to the global pandemic [1]. As the COVID-19 pandemic continues to
rage across the world, it affects all aspects of life as we previously understood but presents different perspectives
where information systems can positively contribute [2]. Organizations have had to change how they view
information systems security. Remote working during the COVID-19 pandemic has seen most people working from
their homes, using their own computers, routers, and virus protection. There is a need to consider cybersecurity
protection for people to invest in for protection against possible hacker attacks, which might expose an
organization's highly sensitive information [3]. The purpose of this research review paper is to provide a
comprehensive review of the literature on information systems security in the age of pandemic and even beyond the
pandemic.
II. Definition
It is important to understand the meaning of information systems and information systems. Several
definitions have been proposed to explain the term information system.In general terms, an information system
refers to "a system of people, data records and activities that process the data and information in an organization,
and it includes the organization’s manual and automated processes” [4].An information system may be considered
as “computer-based systems, which are combinations of hardware, software, and telecommunications networks that
people build and use to collect, create, and distribute useful information” [5]. One of the most relevant definitions of
an information system is one that considers it as a working system. An information system is "a work system whose
processes and activities are devoted to processing information, i.e., capturing, transmitting, storing, retrieving,
2. Information systems security in the age of pandemics: COVID-19 and beyond
Multidisciplinary Journal www.ajmrd.com Page | 24
manipulating, and displaying information” [6]. Information system as a working system involves human participants
and machines working on processes and activities with information technology assistance. Information system
security can be defined as the "application of any technical methods and managerial processes on the information
resources (hardware, software and data) in order to keep organizational assets and personal privacy protected” [7].
Another closely related but different term is information system management, which refers to "a set of activities
involved in configuring resources to meet an organization's information security needs” [8]. The purpose of
information system security is to secure information in the systems to ensure that the information within the
information systems is to retain its confidentiality, integrity, and availability [9]. This narrative review seeks to
examine how in the current age of the COVID-19 pandemic, information systems security is facing various
challenges and solutions implemented to protect the confidentially, integrity, and availability of the information in
information systems and assess whether such solutions would last beyond the pandemic era.
III. Risks and Challenges to Information Systems Security during the Pandemic Era
As a response to curb the spread of COVID-19, health guidelines on maintaining physical distance led to
national lockdowns, which made people and organizations dependent on technologies to carry on their business.
Therefore, it is apparent the pandemic has led to drastic changes to business models, contributing to the phenomena
of "working from home,” where employees are remotely connected to the organization’s corporate information
systems infrastructure [10]. This new unfolding of events has presented an opportunity for cybercriminals to exploit
the crisis, which involves some laxity in security measures to accommodate the new working formula and focus
shifting to the pandemic. This leads to a challenge where the global economy has to deal with both the COVID-19
pandemic and cybersecurity warfare, where there are increased risks for the occurrence of cybercrimes [10]. A
notable challenge of the "working from home" phenomenon is that most personal information technology devices
tend to be poorly configured relative to the work-based information systems, making the home devices more prone
to cyberattacks [11]. A report by Delloite observed that even with the increase in technology need, most
organizations filed to avail a cyber-safe remote-working environment, which has contributed to increased exposure
to cyber risk. Cybersecurity experts have estimated that the incidents of cybercrimes and attacks have almost
doubled in the wake of the COVID-19 pandemic [12]. The cybercriminals have exploited the opportunity presented
by the unprecedented havoc due to the COVID-19 pandemic to carry out attacks on information systems and steal or
distort sensitive information.
Different industries face different challenges and risks to information systems security. The health sector is
one of the industries whose information cybercriminal attacks have often compromised systems security. It has been
identified that COVID-19 has challenges in the health care information system [13]. It has been observed that cyber
attackers have sought to exploit the crisis of the COVID-19 pandemic and carried out attacks against health care
organization's information systems [14]. The World Health Organization has identified that during the COVID-19
pandemic period, the number of cyber-attacks has increased five-fold, with the increased cyber risks arising from the
actions of people and systems and technology failures [15]. It has been observed that “the main changes to health
services caused by the COVID-19 pandemic include decreased mobility, border closures, and the increasing reliance
on remote work, often carried out with little previous experience and planning” [13]. Another sector affected by the
COVID-19 pandemic is the e-Commerce sector. Most small and medium-sized commercial stores have shifted to
the digital platform to sustain their business following the pandemic. It has been reported that the financial sector
has been affected by hackers relatively more than other sectors during the COVID era but are also has a leading
edge in their response to the cyber risk [16]. The extent of information systems security exposure to the risk of
attacks is evident from the increased attacks on organizations. These attacks have affected even the large
organization such as "World Health Organization (WHO), World Bank, US Centers for Disease Control and
Prevention (CDC), the Gates Foundations, the US National Institutes of Health (NIH), the Wuhan Institute of
Virology” [17]. Organizations from different sectors have been compelled to shift to holding online meetings using
different platforms such as zoom during the pandemic. The online meeting platforms have presented a major weak
point for attacks, which hackers have exploited to pose a threat referred to as "Zoom bombing” [17]. Therefore, it is
apparent that different industries have been affected by the increased risks and challenges to information systems
security.
3. Information systems security in the age of pandemics: COVID-19 and beyond
Multidisciplinary Journal www.ajmrd.com Page | 25
IV. Solutions to Risks and Challenges to Information Systems Security during the Pandemic
Era
Due to the increased risks and challenges to information systems, organizations have understood the need
to invest in information systems security. Organizations have had to invest in their capacity to counteract
cyberattacks in an effort to protect their information system. Among the notable solutions to prevent attacks on
information systems is remote working security assurance. With remote working being an integral part of many
business models, including the healthcare services delivery model, employees have been prompted to utilize
enterprise remote desktop protocols and virtual private networks (VPN) to access corporate networks [13]. Other
security features have been added to support the "working from home" phenomena, such as the use of a firewall,
whitelist, and multifactor authentication. In addition, organizations offering video conferencing platforms have taken
initiatives to improve the security of their platforms to improve the security of information systems. For example,
Zoom has been forced to evaluate and improve its security measures, such as improvement in end-to-end encryption.
It is noted that Zoom Video Communications initiated end-to-end encryption with the aim of protecting conversation
during the meeting even from insiders in Zoom company itself [18].
Among the factors contributing to increased risks to information systems security is human factors. To
address human actions as a source of risk to information systems, organizations have and should develop appropriate
interventions such as cybersecurity awareness campaigns, governance frameworks, and protocols. Cybersecurity
awareness campaigns and educational programs would be an essential intervention to address threats to information
system security. Such training and awareness campaigns would equip the employees with skills to identify possible
threats and urge them to be vigilant and collaborate to combat cybercrime, especially in the COVID-19 era [10]. In
addition, organizations have been urged to implement a cybersecurity governance framework addressing issues such
as good cyber hygiene, verify sources, and get official updates [19]. Information system security protocols provide
guidelines to employees engaged in remote working, which is a norm during this COVID era.
Among the solution proposed to improve information systems, security is the use of artificial intelligence.
This intervention involves using artificial intelligence to identify and prevent threats before there is an establishment
in the information system [17]. An artificial intelligence solution would involve a collective of data for service and
analyzing it to establish patterns or common attacks. Such a solution is expected to be effective during the COVID-
19 pandemic era, characterized by more frequent attacks, whereby speeding up the machine learning process and
preventing information system cyberattacks would be more effective [17].
V. Implications Beyond COVID-19 Era
While the COVID-19 has opened a window of opportunity to organizations to shift into the digital
platform, it has also exposed a laxity in their information systems security. The pandemic has made it clear that my
organizations should invest in information system security and have plans to minimize possible cyberattacks. Even
beyond the COVID-19 era, the policies, protocols, and guidelines that organizations have developed in response to
preventing attacks on information systems will become operations guiding policies. Organizations will continue
taking proactive measures to improve information system security. Industries will develop sector-wide guidelines to
govern information system security. Organizations offer remote work platforms has been made to realize
vulnerabilities in their systems, which will become keener addressing such threats even beyond the COVID-era.
VI. Conclusion
The ongoing COVID-19 has exposed the vulnerabilities of information system security. The COVID-19
has changed the business model in most industries, with the most notable change being the increased adoption of the
"working from home" arrangement. Another notable observation has been that there is an increase in attacks on
information systems. A key advantage of this research paper review is that it has reviewed different sources and
thereby provided a broader perspective on information systems security during COVID and beyond. However, one
of the limitations of this study is that since it uses secondary data, the research had no control over the quality of the
evidence. Nevertheless, the study findings can be applied by the management of any organization seeking to
improve its information systems security.
4. Information systems security in the age of pandemics: COVID-19 and beyond
Multidisciplinary Journal www.ajmrd.com Page | 26
References
[1] He, W., Zhang, Z. J., & Li, W. (2021). Information technology solutions, challenges, and suggestions for
tackling the COVID-19 pandemic. International journal of information management, 57, 102287.
https://doi.org/10.1016/j.ijinfomgt.2020.102287
[2] Ågerfalk, P. J., Conboy, K., & Myers, M. D. (2020). Information systems in the age of pandemics:
COVID-19 and beyond.
[3] Wang, L., & Alexander, C. A. (2021). Cybersecurity during the COVID-19 pandemic. AIMS Electronics
and Electrical Engineering, 5(2), 146-157.
[4] Paul, R. J. (2010). What an information system is, and why is it important to know this. Journal of
computing and information technology, 18(2), 95-99.
[5] Jessup, L. M., & Valacich, J. S. (2008). Information systems today: managing in the digital world (Vol. 3).
Upper Saddle River, NJ: Pearson Prentice Hall.
[6] Alter, S. (2008). Defining information systems as work systems: implications for the IS field. European
Journal of Information Systems, 17(5), 448-469.
[7] Hong, K. S., Chi, Y. P., Chao, L. R., & Tang, J. H. (2006). An empirical study of information security
policy on information security elevation in Taiwan. Information Management & Computer Security.
[8] Singh, A. N., & Gupta, M. P. (2019). Information security management practices: Case studies from
India. Global Business Review, 20(1), 253-271.
[9] Lundgren, B., & Möller, N. (2019). Defining information security. Science and engineering ethics, 25(2),
419-441.
[10] Chigada, J., & Madzinga, R. (2021). Cyberattacks and threats during COVID-19: A systematic literature
review. South African Journal of Information Management, 23(1), 1-11.
[11] BA, O., OM, O., Sobowale, A. A., Nnamdi, O., Adebimpe, E., & OO, A. (2020). Cyber Security Threats in
the Era of COVID-19 Pandemic: A Case Study of Nigeria System. International Journal of Advanced
Research in Engineering and Technology, 11(9).
[12] Omodunbi B. A., Odiase P. O., Olaniyan O. M., Esan A. O (2016):; Cybercrime in Nigeria:
Analysis, Detection and Prevention. InFUOYE Journal of Engineering and Technology Vol 1 Issue 1, Pp
37-42
[13] He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health Care Cybersecurity Challenges and Solutions
Under the Climate of COVID-19: Scoping Review. Journal of medical Internet research, 23(4), e21747.
[14] Stein S, Jacobs J. Cyber-attack hits U.S. health agency amid Covid-19 Outbreak. Bloomberg. 2020 Mar 16.
URL: https://www.bloomberg.com/news/articles/2020-03-16/u-s-health-agency-suffers-cyber-attack-
during-covid-19-response
[15] Sardi, A., Rizzi, A., Sorano, E., & Guerrieri, A. (2020). Cyber Risk in Health Facilities: A Systematic
Literature Review. Sustainability, 12(17), 7002.
[16] Aldasoro, I., Frost, J., Gambacorta, L., & Whyte, D. (2021). Covid-19 and cyber risk in the financial
sector (No. 37). Bank for International Settlements.
[17] Eian, I. C., Yong, L. K., Li, M. Y. X., Qi, Y. H., & Fatima, Z. (2020). Cyber Attacks in the Era of COVID-
19 and Possible Solution Domains.
[18] Isobe, T., & Ito, R. (2021). Security Analysis of End-to-End Encryption for Zoom Meetings. IACR Cryptol.
ePrint Arch., 2021, 486.
[19] Abukari, A. M., & Bankas, E. K. (2020). Some cybersecurity hygienic protocols for teleworkers in
COVID-19 pandemic period and beyond. International Journal of Scientific & Engineering
Research, 11(4), 1401-1407.