Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control

Author:

Verma Aastha1ORCID,Shri Charu1ORCID

Affiliation:

1. Department of Management Studies, Netaji Subhas University of Technology, New Delhi, India

Abstract

The proliferation of the Internet’s interconnections has led to a substantial increase in cyberattack incidents, often with devastating and grave consequences for the organizations and their associated clientele. The pandemic of COVID-19 has pushed most organizations towards digital transformation. The higher dependence of a firm on digital infrastructure makes it more vulnerable to cyber-crimes. The existing literature suggests that the most notable and frequently chosen weapons of attackers are Internet of things (IoT) attacks, phishing attack, malware attack, distributed denial of service (DDoS) attack and structured query language (SQL) injection attack. In this study, an attempt has been made to generate a protection framework from these cyberattacks. In doing so, the present research has adopted a systematic stepwise process of investigation. The research method consists of four components. First, through bibliometric analysis in VOSviewer, authors identified the scope for searching the related literature published worldwide and generated visualization for comprehension. This step led to the selection of 60 research articles for further analysis. After that, each security threat’s MAXQDA software word tree was developed, representing its linkages with possible security solutions and control measures. Lastly, they adopted expert elicitation protocol through semi-structured interviews with six corporate IT experts and five academic experts. The synthesis of information gathered leads to the development of a suggestive protection framework for the organizations.

Publisher

SAGE Publications

Subject

Strategy and Management,Business and International Management

Reference60 articles.

1. An Extensive Research on Cyber Threats using Learning Algorithm

2. Ashford W. (2014, 4 March. Team Cymus exposes SOHO router compromise. Computer Weekly.com. https://www.computerweekly.com/news/2240215529/Team-Cymru-exposes-SOHO-router-compromise

3. Basset R. (2019, 3 October. 5 common phishing techniques. Vade. https://www.vadesecure.com/en/blog/5-common-phishing-techniques

4. Bisson D. (2020, 16 September. New smishing campaign using USPS as its disguise. Tripwire. https://www.tripwire.com/state-of-security/security-data-protection/new-smishing-campaign-using-usps-as-its-disguise/

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. IoT Vulnerabilities and Attacks: SILEX Malware Case Study;Symmetry;2023-10-26

2. Ontological Analysis of the Digital Crime Conceptual Model;2023 IEEE 18th International Conference on Computer Science and Information Technologies (CSIT);2023-10-19

3. Prospects of Cybersecurity in Smart Cities;Future Internet;2023-08-23

4. Cyber Security;Advances in Business Information Systems and Analytics;2023-06-30

5. Strategic defence as a cyber security game;Serbian Journal of Engineering Management;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3