Impact of Human Vulnerabilities on Cybersecurity

被引:0
|
作者
Alsharif M. [1 ]
Mishra S. [2 ]
AlShehri M. [1 ]
机构
[1] Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Majmaah
[2] Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, Majmaah
来源
关键词
Cybersecurity; Cybersecurity awareness; Password attack; Phishing attack; Security risk; Social engineering;
D O I
10.32604/CSSE.2022.019938
中图分类号
学科分类号
摘要
Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39% of security risks are related to the human factor, and 95% of successful cyber-attacks are caused by human error, with most of them being insider threats. The major human factor issue in cybersecurity is a lack of user awareness of cyber threats. This study focuses on the human factor by surveying the vulnerabilities and reducing the risk by focusing on human nature and reacting to different situations. This study highlighted that most of the participants are not experienced with cybersecurity threats and how to protect their personal information. Moreover, the lack of awareness of the top three vulnerabilities related to the human factor in cybersecurity, such as phishing attacks, passwords, attacks, and social engineering, are major problems that need to be addressed and reduced through proper awareness and training. © 2021 CRL Publishing. All rights reserved.
引用
收藏
页码:1153 / 1166
页数:13
相关论文
共 50 条
  • [21] Educators' Cybersecurity Vulnerabilities in Marginalised Schools in South Africa
    Magunje, Caroline
    Chigona, Wallace
    SOUTH AFRICAN COMPUTER SCIENCE AND INFORMATION SYSTEMS RESEARCH TRENDS, SAICSIT 2024, 2024, 2159 : 347 - 360
  • [22] Vulnerabilities and Strategies of Cybersecurity in Smart Grid - Evaluation and Review
    Mohammed, Amira
    George, Gibin
    3RD INTERNATIONAL CONFERENCE ON SMART GRID AND RENEWABLE ENERGY (SGRE), 2022,
  • [23] CYBERSECURITY VULNERABILITIES AND THREATS OF SCADA SYSTEMS IN CRITICAL INFRASTRUCTURES
    Savin, Vlad Daniel
    Serban, Costel
    PROCEEDINGS OF THE 13TH INTERNATIONAL MANAGEMENT CONFERENCE: MANAGEMENT STRATEGIES FOR HIGH PERFORMANCE (IMC 2019), 2019, : 234 - 237
  • [24] The Impact of Artificial Intelligence on the Human Aspects of Information and Cybersecurity
    Malatji, M.
    Marnewick, A.
    von Solms, S.
    PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018), 2018, : 158 - 169
  • [25] Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem
    Williams, Patricia A. H.
    Woodward, Andrew J.
    MEDICAL DEVICES-EVIDENCE AND RESEARCH, 2015, 8 (305-316): : 305 - 315
  • [26] Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
    Yin, Jiao
    Tang, MingJian
    Cao, Jinli
    Wang, Hua
    KNOWLEDGE-BASED SYSTEMS, 2020, 210
  • [27] FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity
    Parente, F. R.
    Rodrigues, Emanuel B.
    Mattos, Cesar L. C.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [28] The CAN Bus in the Maritime Environment - Technical Overview and Cybersecurity Vulnerabilities
    Kessler, Gary C.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2021, 15 (03) : 531 - 540
  • [29] CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities
    Mittal, Sudip
    Das, Prajit Kumar
    Mulwad, Varish
    Joshi, Anupam
    Finin, Tim
    PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, 2016, : 860 - 867
  • [30] Cybersecurity Vulnerabilities of Smart Inverters and Their Impacts on Power System Operation
    Ustun, Taha Selim
    2019 INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, CONTROL AND AUTOMATION (ICPECA-2019), 2019, : 1 - 4