Present Cyber Threat Management (Methodologies to mitigate evolving cyber-attacks)

被引:1
|
作者
Mawudor, Bright Gameli [1 ]
机构
[1] Pukyong Natl Univ, Software Engn & Multimedia Lab, Pusan, South Korea
关键词
threat; cyber-attacks; hackers; solutions;
D O I
10.1109/ASIAJCIS.2013.24
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current lifestyle of organizations depend on information exchange and easy access to allow for a progressive business continuity. All these are done with computers and the internet and with the fast pace at which information sharing through the internet is evolving, so as the level of threat increases to hackers with malicious intent. The methods of cyber-attacks are changing for faster results and thus requires organizations to adopt and adapt to working solutions to curb such threats if not eradicate them.
引用
收藏
页码:115 / 121
页数:7
相关论文
共 50 条
  • [1] Resisting the persistent threat of cyber-attacks
    Russell, Gavin
    [J]. Computer Fraud and Security, 2017, 2017 (12): : 7 - 11
  • [2] Turkish national cyber-firewall to mitigate countrywide cyber-attacks
    Sari, Arif
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 128 - 144
  • [3] CYBER-ATTACKS AND INTERNET OF THINGS AS A THREAT TO CRITICAL INFRASTRUCTURE
    Simec, Alen
    [J]. ECONOMIC AND SOCIAL DEVELOPMENT (ESD 2019): 37TH INTERNATIONAL SCIENTIFIC CONFERENCE ON ECONOMIC AND SOCIAL DEVELOPMENT - SOCIO ECONOMIC PROBLEMS OF SUSTAINABLE DEVELOPMENT, 2019, : 108 - 111
  • [4] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [5] Cyber-attacks on ERP systemsAn analysis of the current threat landscape
    Mariano Nunez
    [J]. Datenschutz und Datensicherheit - DuD, 2012, 36 (9) : 653 - 656
  • [6] The hidden threat of cyber-attacks - undermining public confidence in government
    Shandler, Ryan
    Gomez, Miguel Alberto
    [J]. JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2023, 20 (04) : 359 - 374
  • [7] The Impact of US Cyber Policies on Cyber-Attacks Trend
    Kumar, Sumeet
    Benigni, Matthew
    Carley, Kathleen M.
    [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
  • [8] Predicting Consequences of Cyber-Attacks
    Datta, Prerit
    Lodinger, Natalie
    Namin, Akbar Siami
    Jones, Keith S.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2073 - 2078
  • [9] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    [J]. ECONOMICS LETTERS, 2023, 233
  • [10] Cyber-attacks and international law
    Grove, GD
    Goodman, SE
    Lukasik, SJ
    [J]. SURVIVAL, 2000, 42 (03) : 89 - +