Full Paper View Go Back

Emerging Cyber Security Threats in Organization

Hailye Tekleselase Woldemichael1

1 Department of Information Systems, School of Informatics, Addis Ababa University, Addis Ababa, Ethiopia.

Section:Research Paper, Product Type: Journal
Vol.7 , Issue.6 , pp.7-10, Dec-2019

Online published on Dec 31, 2019


Copyright © Hailye Tekleselase Woldemichael . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hailye Tekleselase Woldemichael, “Emerging Cyber Security Threats in Organization,” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.6, pp.7-10, 2019.

MLA Style Citation: Hailye Tekleselase Woldemichael "Emerging Cyber Security Threats in Organization." International Journal of Scientific Research in Network Security and Communication 7.6 (2019): 7-10.

APA Style Citation: Hailye Tekleselase Woldemichael, (2019). Emerging Cyber Security Threats in Organization. International Journal of Scientific Research in Network Security and Communication, 7(6), 7-10.

BibTex Style Citation:
@article{Woldemichael_2019,
author = {Hailye Tekleselase Woldemichael},
title = {Emerging Cyber Security Threats in Organization},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {12 2019},
volume = {7},
Issue = {6},
month = {12},
year = {2019},
issn = {2347-2693},
pages = {7-10},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=378},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=378
TI - Emerging Cyber Security Threats in Organization
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Hailye Tekleselase Woldemichael
PY - 2019
DA - 2019/12/31
PB - IJCSE, Indore, INDIA
SP - 7-10
IS - 6
VL - 7
SN - 2347-2693
ER -

30 Views    39 Downloads    12 Downloads
  
  

Abstract :
Cyber-security is a preventive preparation of protecting sensitive information, information systems, computers, servers, critical infrastructure, mobile devices, and computer networks from unauthorized access or hackers. Now a day digital technology takes the most significant role in growth effectiveness and efficiency in the organization. However, new technologies like mobile technologies (5G), IoT and cloud computing are Coming with new information security threats. Employees still using the old software, they didn’t update the software (operating system), they use a permanent password, they are still using weak and default password (Wife name or her phone number) information security literacy and behavior end users or IT staff. They don’t have awareness about proactive cyber-attacks prevention policies and procedures. Because they have not took short and long term training on most serious cyber-attacks like ransom ware, social engineering, malware, DDoS, and phishing. This article attempts to assess or explore the most common and emerging cyber security threats. That the organizations facing. An in-depth literature review is delivered. The main objective of this article is to create awareness about the emerging and the most serious cyber-attacks occurring in the organization. The findings demonstrate that cybersecurity preparations and trained employees are very low; hackers becoming more sophisticated.

Key-Words / Index Term :
Cyber security, Sensitive information, Threats, Information Security

References :
[1] Yang Lu, "Cybersecurity Research: A Review of Current Research Topics," Journal of Industrial Integration and Management, vol. Vol. 3, no. No. 4, p. 25, Octobe 2018.
[2] Bilal Khan, "Effectiveness of information security awareness methods based on psychological theories ," African Journal of Business Managemen, vol. Vol. 5(26, no. pp. 10862-10868, p. 8, October 2011.
[3] Hussain Aldawood, "Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues," MDPI, p. 16, March 2019.
[4] Ibrahim Ghafir, "Security threats to critical infrastructure: the human factor," doi.org, p. 17, March 2018.
[5] Michele De Donno, "Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era," MDPI, p. 30, June 2019.
[6] Mrs. M.Kundalakesi, "Network Security with Cryptography ," International Journal for Scientific Research & Development, vol. Vol. 6, no. Issue 01, p. 3, September 2018.
[7] Shilpa Pareek, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.
[8] Adnan Rizal, "Information Security Challenges: A Malaysian Context ," International Journal of Academic Research in Business and Social Sciences , vol. Vol. 7, no. No. 9, p. 8, September 2017.
[9] Tooska Dargah, "A Cyber-Kill-Chain based taxonomy of crypto-ransom ware features," Journal of Computer Virology and Hacking Techniques, p. 29, July 2019.
[10] Shilpa Pareek1, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.
[11] Tadas Limbaą, "CYBER SECURITY MANAGEMENT MODEL FOR CRITICAL INFRASTRUCTURE ," The International Journal ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES , vol. Volume 4, no. Number 4 , p. 16, June 2017.
[12] Yeshwanth Rao, "Artificial Intelligence and Big Data for Computer Cyber Security Systems ," Journal of Advances in Science and Technology, vol. Vol. 12, no. Issue No. 24, p. 9, November 2016.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  editor@isroset.org or view contact page for more details.

Impact Factor

Journals Contents

Author & Reviewer

Download

Digital Certificate

Go to Navigation