Emerging Cyber Security Threats in Organization

Authors

  • Hailye Tekleselase Woldemichael Department of Information Systems, School of Informatics, Addis Ababa University, Addis Ababa, Ethiopia

Keywords:

Cyber security, Sensitive information, Threats, Information Security

Abstract

Cyber-security is a preventive preparation of protecting sensitive information, information systems, computers, servers, critical infrastructure, mobile devices, and computer networks from unauthorized access or hackers. Now a day digital technology takes the most significant role in growth effectiveness and efficiency in the organization. However, new technologies like mobile technologies (5G), IoT and cloud computing are Coming with new information security threats. Employees still using the old software, they didn’t update the software (operating system), they use a permanent password, they are still using weak and default password (Wife name or her phone number) information security literacy and behavior end users or IT staff. They don’t have awareness about proactive cyber-attacks prevention policies and procedures. Because they have not took short and long term training on most serious cyber-attacks like ransom ware, social engineering, malware, DDoS, and phishing. This article attempts to assess or explore the most common and emerging cyber security threats. That the organizations facing. An in-depth literature review is delivered. The main objective of this article is to create awareness about the emerging and the most serious cyber-attacks occurring in the organization. The findings demonstrate that cybersecurity preparations and trained employees are very low; hackers becoming more sophisticated.

 

References

Yang Lu, "Cybersecurity Research: A Review of Current Research Topics," Journal of Industrial Integration and Management, vol. Vol. 3, no. No. 4, p. 25, Octobe 2018.

Bilal Khan, "Effectiveness of information security awareness methods based on psychological theories ," African Journal of Business Managemen, vol. Vol. 5(26, no. pp. 10862-10868, p. 8, October 2011.

Hussain Aldawood, "Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues," MDPI, p. 16, March 2019.

Ibrahim Ghafir, "Security threats to critical infrastructure: the human factor," doi.org, p. 17, March 2018.

Michele De Donno, "Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era," MDPI, p. 30, June 2019.

Mrs. M.Kundalakesi, "Network Security with Cryptography ," International Journal for Scientific Research & Development, vol. Vol. 6, no. Issue 01, p. 3, September 2018.

Shilpa Pareek, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.

Adnan Rizal, "Information Security Challenges: A Malaysian Context ," International Journal of Academic Research in Business and Social Sciences , vol. Vol. 7, no. No. 9, p. 8, September 2017.

Tooska Dargah, "A Cyber-Kill-Chain based taxonomy of crypto-ransom ware features," Journal of Computer Virology and Hacking Techniques, p. 29, July 2019.

Shilpa Pareek1, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.

Tadas Limba¹, "CYBER SECURITY MANAGEMENT MODEL FOR CRITICAL INFRASTRUCTURE ," The International Journal ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES , vol. Volume 4, no. Number 4 , p. 16, June 2017.

Yeshwanth Rao, "Artificial Intelligence and Big Data for Computer Cyber Security Systems ," Journal of Advances in Science and Technology, vol. Vol. 12, no. Issue No. 24, p. 9, November 2016.

Downloads

Published

2019-12-31

How to Cite

[1]
H. T. Woldemichael, “Emerging Cyber Security Threats in Organization”, Int. J. Sci. Res. Net. Sec. Comm., vol. 7, no. 6, pp. 7–10, Dec. 2019.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.