Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Objectives: (1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4) What are the ways to detect digital threats? (5) What measures can be taken to prevent and avoid these attacks? (6) What does the cyber security management process consist of? (7) What cybersecurity evidence and trends can be selected? Methods: Document analysis; data selection and assambly; synthesis; conceptualization; interpretation. Results: The research results are: a presentation of the hacker community and the main vulnerable industries; a brief definition of the types of digital threats; presentation of various vulnerabilities and damages caused by cyber-attacks; a selection of the ways to detect digital threats; a selection of the main measures to prevent and avoid these attacks; cybersecurity management process and a selection of evidence and trends regarding cyber security. Also, two conceptualizations are proposed: the approach to cyber risk management and 10 basic actions to prevent and avoid cyber risks. Conclusions: The current and future situation is not encouraging for the management of organizations in terms of the risks caused by cyberattacks, which are increasing significantly. The solution to prevent and avoid these threats is for civil and military organizations to implement Cybersecurity risk management.
Czasopismo
Rocznik
Tom
Strony
60--84
Opis fizyczny
Bibliogr. 68 poz., rys., tab., wykr.
Twórcy
autor
- Department of Management and Economic Informatics, Transilvania University of Brasov, Faculty of Economics and Business Administration, Romania
autor
- Spiru Haret University Bucharest, Faculty of Legal Science and Economics, Romania
autor
- Spiru Haret University Bucharest, Faculty of Legal Science and Economics, Romania
Bibliografia
- 1. Abdel Hakeem, S.A.; Hussein, H.H.; Kim, H. (2022) Security Requirements and Challenges of 6G Technologies and Applications. Sensors 2022, 22, 1969. https://doi.org/10.3390/s22051969.
- 2. Adrian, F. (2012) National and international security objectives: some correlations, Journal of Defense Resources Management, Vol.3, Iss.1 (4), 2012, pp. 113-116.
- 3. Akpan F, Bendiab G, Shiaeles S, Karamperidis S, Michaloliakos M. Cybersecurity Challenges in the Maritime Sector. Network. 2022; 2(1):123-138. https://doi.org/10.3390/network2010009.
- 4. Borek, R., Woźnica, J. and Malawski, M. (2022) The role of eu public diplomacy in affecting international security in the context of the development of the outer space traffic management, Defence science review, DOI: 10.37055/pno/153381.
- 5. Brewer, R. (2016). Ransomware attacks: Detection, prevention and cure. Netw. Secur. 2016, 5-9. doi: 10.1016/S1353-4858(16)30086-1.
- 6. Carey, M.J. & Jin, J. (2019) Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, Wiley.
- 7. Dahiya, A., and Gupta, B. B. (2020). An economic incentive-based risk transfer approach for defending against DDoS attacks. Intl. J. E-Serv. Mob. Appl. 12, 60-84. doi: 10.4018/IJESMA.2020070104.
- 8. Kraus, R., Barber, B., Borkin, M., Alpern, N.J. (2010) Seven Deadliest Microsoft Attacks, ch 7, pp 129-145. https://doi.org/10.1016/B978-1-59749-551-6.00007-8.
- 9. Liu, X., Ahmad,S. F., Anser, M. K., Ke, J., Irshad, M., Ul-Haq, J. and Abbas, S. (2022) Cyber security threats: A never-ending challenge for e-commerce, Front. Psychol., 19 October 2022, Sec. Organizational Psychology, https://doi.org/10.3389/fpsyg.2022.927398.
- 10. Monnappa K. A. (2018) Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware, Packt Publishing.
- 11. Negulescu, O. (2015) Threats and opportunities in actual defence management in Proceedings of The 10th International Scientific Conference “Defence resources management in the 21st century” Braşov, 2015, National Defence University ,,Carol I” publishing house Braşov, pp. 205-214.
- 12. Radomska, A. (2021) Development directions of cybersecurity in aerospace, Defence science review, DOI: 10.37055/pno/147400.
- 13. Sikorski, M. & Honig, A. (2012) Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, No Starch Press.
- 14. Szyłkowska, M. (2022) Attributes of cyber conflict in the context of armed conflict - an outline of the problem, Defence science review, DOI: 10.37055/pno/148424.
- 15. Aura, Types of cyber attacks, Available at: https://www.aura.com/learn/types-of-cyber-attacks.
- 16. Avast, What Is a Computer Virus and How Does It Work? Available at: https://www.avast.com/c-computer-virus.
- 17. Avira, Available at: https://www.avira.com, Study, in Gatafy, 2021.
- 18. Beamer, T. (2022) What Industries Are Most Vulnerable to Cyber Attacks In 2022?, Available at: https://www.techbusinessnews.com.au/what-industries-are-most-vulnerable-to-cyberattacks-in-2022/.
- 19. Bedell, C., Loshin, P., Hanna, K. T. (2022) Computer Worm, Available at: https://www.techtarget.com/searchsecurity/definition/worm.
- 20. Bsigroup, Standards for IT and cyber security, Available at: https://www.bsigroup.com/en-GB/Cyber-Security/Standards-for-IT-and-cyber-security/.
- 21. Checkpoints, What is Ransomware?, Available at: Available at: https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/.
- 22. Cloudmask, Data Breaches: Threats and Consequences, Available at: www.cloudmask.com/blog/data-breaches-threats-and-consequences.
- 23. Corero Marketing (2021) The Damaging Impacts of DDoS Attacks, Available at: https://www.corero.com/the-damaging-impacts-of-ddos-attacks/.
- 24. Cyberproof, Managed threat intelligence, Cyber Threat Intelligence (CTI) team, pdf, Available at: https://www.cyberproof.com/managed-threat-intelligence/.
- 25. Cyber war and Ukraine, Available at: https://www.csis.org/analysis/cyber-war-and-ukraine.
- 26. DavidPur, N. 2022, Which Countries are Most Dangerous? Cyber Attack Origin - by Country, Available at: https://blog.cyberproof.com/blog/which-countries-are-most-dangerous.
- 27. Editorial Desk 2022, Australian Cyber Security Concerns Continue to Rise In 2022, Available at: https://www.techbusinessnews.com.au/australian-cyber-security-concerns-continue-to-rise-in-2022/.
- 28. Embroker, Top 10 Cybersecurity Threats in 2022. Available at: https://www.embroker.com/blog/top-10-cybersecurity-threats-2022/.
- 29. European Union (2022) Cyber Defence: EU boosts action against cyber threats (European Commission). Available at: https://www.consilium.europa.eu/en/policies/cybersecurity/.
- 30. Ethical Hacking tutorial, https://www.javatpoint.com/ethical-hacking.
- 31. Famous hackers, https://www.javatpoint.com/famous-hackers.
- 32. Fortinet, What is Spyware? Available at: https://www.fortinet.com/resources/cyberglossary/spyware.
- 33. Fruhlinger, J. (2020), Ransomware explained: How it works and how to remove it, Available at: https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-to-remove-it.html.
- 34. Gatafy (2021) Which countries are most targeted by hackers?, Available at: https://gatefy.com/blog/which-countries-are-most-targeted-hackers/.
- 35. Generally Accepted Information Security Principles (GAISP), https://www.lawinsider.com/dictionary/gaisp.
- 36. Gillis, A.S., Bush, K, Teravainer, T. Spyware, Available at: https://www.techtarget.com/searchsecurity/definition/spyware.
- 37. Gutiérrez, N. (2021) Top 5 Cyber Security Threats Today, Available at: https://preyproject.com/blog/top-5-current-cyber-threats-in-2020-malware-phishing-ransomware.
- 38. Harisaiprasad, K. (2020) COBIT 2019 and COBIT 5 Comparison, Available at: https://www.isaca.org/resources/news-and-trends/industry-news/2020/cobit-2019-and-cobit-5-comparison.
- 39. Hyperproof, Cybersecurity Risk Management: Frameworks, Plans, & Best Practices, Available at: https://hyperproof.io/resource/cybersecurity-risk-management-process/.
- 40. ISO/IEC Standard 15408, Available at: https://www.enisa.europa.eu/topics/risk-management/current-risk/laws-regulation/rm-ra-standards/iso-iec-standard-15408.
- 41. ISO/IEC 15408-1:2022, Available at: https://www.iso.org/standard/72891.html.
- 42. ITSEC, Available at: https://itsec.group/.
- 43. Kasperky, Ransomware attacks and types, Available at: https://www.kaspersky.com/resource-center/threats/ransomware-attacks-and-types.
- 44. Kirvan, P & Granneman, J. (2021) Top 10 IT security frameworks and standards explained, Available at: https://www.techtarget.com/searchsecurity/tip/IT-security-frameworks-and-standards-Choosing-the-right-one.
- 45. Komnenic, M. 2022, 98 Biggest Data Breaches, Hacks, and Exposures [2022 Update], Available at: https://termly.io/resources/articles/biggest-data-breaches/.
- 46. Levine, N. (2022) How to Tell if Your Computer Is Infected by a Trojan Horse, Available at: https://www.wikihow.com/Tell-if-Your-Computer-Is-Infected-by-a-Trojan-Horse.
- 47. Malwarebytes a., Trojan horse - Virus or malware? Available at: https://www.malwarebytes.com/trojan.
- 48. Malwarebytes B., What is a computer worm? Available at: https://www.malwarebytes.com/computer-worm.
- 49. Malwarebytes c., Randsomware, Available at: https://www.malwarebytes.com/ransomware.
- 50. Manship, R. (2022) The Top 6 Industries At Risk For Cyber Attacks, Available at: https://www.redteamsecure.com/blog/the-top-6-industries-at-risk-for-cyber-attacks.
- 51. McLean, M. (2022), Must-Know Cyber Attack Statistics and Trends, Available at: https://www.embroker.com/blog/cyber-attack-statistics/.
- 52. Nibusinessinfo, Cyber security risk management, Available at: https://www.nibusinessinfo.co.uk/content/cyber-security-risk-management.
- 53. OECD Guidelines for the Security of Information Systems of Government Commerce, Available at: https://www.oecd.org/sti/ieconomy/2494779.pdf.
- 54. Onelogin, What is a DDoS Attack? Available at: https://www.onelogin.com/learn/ddos-attack.
- 55. Paloaltonetworks, What is a denial of service attack DoS, Available at: https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos.
- 56. Patents, System and method of detecting computer worms, Available at: https://patents.google.com/patent/US8528086B1/en.
- 57. Redteamsecure, The top 6 industries at risk for cyber attacks, Available at: https://www.redteamsecure.com/blog/the-top-6-industries-at-risk-for-cyber-attacks.
- 58. Stefanini, Cyber Security Statistics For 2022: List Of Data And Trends, Available at: https://stefanini.com/en/insights/articles/cyber-security-statistics-for-2022-data-and-trends.
- 59. Stop ransomware, Available at: https://www.cisa.gov/stopransomware.
- 60. Taylor, H. (2021) What Are Cyber Threats and What to Do About Them, Available at: https://preyproject.com/blog/what-are-cyber-threats-how-they-affect-you-what-to-do-about-them.
- 61. Techtarget, Available at: https://www.techtarget.com/searchsecurity/definition/worm.
- 62. Tietsort, J. R. (2022) The 15 Types of Hackers You Didn’t Know About, https://www.aura.com/learn/types-of-hackers.
- 63. Trellix, What Is Ransomware? Available at: https://www.trellix.com/en-us/security-awareness/ransomware/what-is-ransomware.html.
- 64. Trendmicro, Data Breach, Available at: https://www.trendmicro.com/vinfo/us/security/definition/data-breach.
- 65. Trusted Computer System Evaluation Criteria (TCSEC), Available at: https://www.techopedia.com/definition/2623/trusted-computer-system-evaluation-criteria-tcsec.
- 66. Veracode, Spyware, Available at: https://www.veracode.com/security/spyware.
- 67. Vigderman, A. and Turner, G. (2022) What Is a Computer Worm?, Available at: https://www.security.org/antivirus/computer-worm/.
- 68. Ward, M. & Subramanian, S. (2021) States at risk: The cybersecurity imperative in uncertain times, Available at: https://www2.deloitte.com/us/en/insights/industry/public-sector/nascio-survey-government-cybersecurity-strategies.html.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e3462133-0220-41c2-8763-05f95cfffd06
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.