Emerging Cyber Security Threats in Organization
International Journal of Information and Communication Sciences
Volume 5, Issue 2, June 2020, Pages: 19-23
Received: Dec. 27, 2019; Accepted: Apr. 29, 2020; Published: Aug. 27, 2020
Views 63      Downloads 29
Author
Hailye Tekleselase Woldemichael, Department of Information Systems, School of Informatics, Addis Ababa University, Addis Ababa, Ethiopia
Article Tools
Follow on us
Abstract
Background Cyber-security is a preventive preparation of protecting sensitive information, information systems, computers, servers, critical infrastructure, mobile devices, and computer networks from unauthorized access or hackers. Now a day digital technology takes the most significant role in growth effectiveness and efficiency in the organization. However, new technologies like mobile technologies (5G), IoT and cloud computing are Coming with new information security threats. Study design qualitative, survey, case study and an in-depth literature review were conducted. Employees still using the old software, they didn’t update the software (operating system), they use a permanent password, they are still using weak and default password (Wife name or her phone number) information security literacy and behavior end users or IT staff. They don’t have awareness about proactive cyber-attacks prevention policies and procedures. Because they have not took short and long term training on most serious cyber-attacks like ransom ware, social engineering, malware, DDoS, and phishing. This study aims to assess the most common and emerging cyber security threats. That the organizations are facing. The main objective of these investigations is to create awareness about the emerging and the most serious cyber-attacks occurring in the organization. The findings/results demonstrate that cyber security preparations and trained employees are very low; hackers becoming more sophisticated. Conclusion based the findings we conclude that cyber security protection using current method is not sufficient; employees have no idea about security threats due to lack of awareness and training.
Keywords
Cyber Security, Sensitive Information, Threats, Information Security
To cite this article
Hailye Tekleselase Woldemichael, Emerging Cyber Security Threats in Organization, International Journal of Information and Communication Sciences. Vol. 5, No. 2, 2020, pp. 19-23. doi: 10.11648/j.ijics.20200502.12
Copyright
Copyright © 2020 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Yang Lu, "Cybersecurity Research: A Review of Current Research Topics," Journal of Industrial Integration and Management, vol. Vol. 3, no. No. 4, p. 25, Octobe 2018.
[2]
Bilal Khan, "Effectiveness of information security awareness methods based on psychological theories," African Journal of Business Managemen, vol. Vol. 5 (26, no. pp. 10862-10868, p. 8, October 2011.
[3]
Hussain Aldawood, "Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues," MDPI, p. 16, March 2019.
[4]
Ibrahim Ghafir, "Security threats to critical infrastructure: the human factor," doi.org, p. 17, March 2018.
[5]
Michele De Donno, "Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era," MDPI, p. 30, June 2019.
[6]
Mrs. M. Kundalakesi, "Network Security with Cryptography," International Journal for Scientific Research & Development, vol. Vol. 6, no. Issue 01, p. 3, September 2018.
[7]
Shilpa Pareek, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.
[8]
Adnan Rizal, "Information Security Challenges: A Malaysian Context," International Journal of Academic Research in Business and Social Sciences, vol. Vol. 7, no. No. 9, p. 8, September 2017.
[9]
Tooska Dargah, "ACyber-Kill-Chain based taxonomy of crypto-ransomware features," Journal of Computer Virology and HackingTechniques, p. 29, July 2019.
[10]
Shilpa Pareek1, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.
[11]
Tadas Limba¹, "CYBER SECURITY MANAGEMENT MODEL FOR CRITICAL INFRASTRUCTURE," The International Journal ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, vol. Volume 4, no. Number 4, p. 16, June 2017.
[12]
Yeshwanth Rao, "Artificial Intelligence and Big Data for Computer Cyber Security Systems," Journal of Advances in Science and Technology, vol. Vol. 12, no. Issue No. 24, p. 9, November 2016.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186