Affiliation:
1. Department of Management Studies, Netaji Subhas University of Technology, New Delhi, India
Abstract
The proliferation of the Internet’s interconnections has led to a substantial increase in cyberattack incidents, often with devastating and grave consequences for the organizations and their associated clientele. The pandemic of COVID-19 has pushed most organizations towards digital transformation. The higher dependence of a firm on digital infrastructure makes it more vulnerable to cyber-crimes. The existing literature suggests that the most notable and frequently chosen weapons of attackers are Internet of things (IoT) attacks, phishing attack, malware attack, distributed denial of service (DDoS) attack and structured query language (SQL) injection attack. In this study, an attempt has been made to generate a protection framework from these cyberattacks. In doing so, the present research has adopted a systematic stepwise process of investigation. The research method consists of four components. First, through bibliometric analysis in VOSviewer, authors identified the scope for searching the related literature published worldwide and generated visualization for comprehension. This step led to the selection of 60 research articles for further analysis. After that, each security threat’s MAXQDA software word tree was developed, representing its linkages with possible security solutions and control measures. Lastly, they adopted expert elicitation protocol through semi-structured interviews with six corporate IT experts and five academic experts. The synthesis of information gathered leads to the development of a suggestive protection framework for the organizations.
Subject
Strategy and Management,Business and International Management
Reference60 articles.
1. An Extensive Research on Cyber Threats using Learning Algorithm
2. Ashford W. (2014, 4 March. Team Cymus exposes SOHO router compromise. Computer Weekly.com. https://www.computerweekly.com/news/2240215529/Team-Cymru-exposes-SOHO-router-compromise
3. Basset R. (2019, 3 October. 5 common phishing techniques. Vade. https://www.vadesecure.com/en/blog/5-common-phishing-techniques
4. Bisson D. (2020, 16 September. New smishing campaign using USPS as its disguise. Tripwire. https://www.tripwire.com/state-of-security/security-data-protection/new-smishing-campaign-using-usps-as-its-disguise/
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT Vulnerabilities and Attacks: SILEX Malware Case Study;Symmetry;2023-10-26
2. Ontological Analysis of the Digital Crime Conceptual Model;2023 IEEE 18th International Conference on Computer Science and Information Technologies (CSIT);2023-10-19
3. Prospects of Cybersecurity in Smart Cities;Future Internet;2023-08-23
4. Cyber Security;Advances in Business Information Systems and Analytics;2023-06-30
5. Strategic defence as a cyber security game;Serbian Journal of Engineering Management;2023