Authors :
Nurudeen Yemi Hussain; Ahmed Aliyu; Balogun Emmanuel Damilare; Abiola Alimat Hussain; David Omotorsho
Volume/Issue :
Volume 9 - 2024, Issue 5 - May
Google Scholar :
https://tinyurl.com/5n6j867k
Scribd :
https://tinyurl.com/yc7ufup3
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24MAY197
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
As interconnectivity and reliance on digital
technologies continue to rise exponentially, so too do
cybersecurity threats and risks. Malicious cyber actors
are employing increasingly sophisticated techniques to
target valuable data and disrupt critical systems and
infrastructure. The impacts of successful cyber-attacks
can be financially devastating and undermine an
organization's reputation and customer trust. This paper
examines how firms may utilize strong cybersecurity to
protect digital assets and reduce risks in a connected
society. As technology and communications improve,
cyber threats do too. Problems keep popping up.
Malware, phishing scams, and data breaches still harm
businesses. Hackers can also get in simpler with more
linked devices and the Internet of Things. This makes
protecting digital assets and systems, networks, and
critical infrastructure from sophisticated cyberattacks
even more crucial. Cybercriminals can steal data,
intellectual property, money, and customer information
in many ways. Advanced persistent threats are used by
state-backed parties for eavesdropping and geopolitics.
Therefore, organizations in all professions and industries
must prioritize safety and risk reduction. Businesses may
increase their safety with technical, process-based, and
strategic cybersecurity solutions, according to the report.
This requires strong access restrictions, networks,
encryption, software security, and audits. Human
aspects like cyber awareness training and a
comprehensive plan that matches an organization's risks
and resources are considered. A thorough security plan
discusses international conventions, following the rules,
and using modern technologies. Two case studies
demonstrate real-world operations. The first describes
how a large retailer stopped a complex APT with
numerous defenses. Learn how crucial segmentation,
detection tools, incident reaction, and public-private
partnerships are. The second one examines a major hotel
chain data breach and offers simple measures like strong
passwords and vendor tracking to reduce similar
dangers. Even if digital adversaries are getting smarter,
basic cybersecurity "hygiene." can block many attempts,
the report concludes. No organization is totally safe, but
following basic rules, laws, and best practices can help
protect people, organizations, and governments' assets in
today's linked globe. Researchers may investigate how
blockchain and AI might lessen hacking risks.
Keywords :
Cybersecurity, Data Protection, Encryption, Authentication, Access Control, Network Security, Firewall, IDS/IPS, Software Security, Vulnerability Management, Auditing, Penetration Testing, Threat Intelligence, Cyber Strategy, Cyber Awareness, Encryption, Internet of Things, Advanced Persistent Threats, Cyber-Attacks, Phishing, Malware, Ddos, Ransomware, Blockchain, Artificial Intelligence, Machine Learning.
References :
- Abbott, C. (2022, January 19). How the US Air Force built a highly effective cyber defense? Anthropic.
- Abdel-Rahman, M. (2023). Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world. Eigenpub Review of Science and Technology, 7(1), 138-158.
- Simplilearn. (2020, March 26). What is data encryption: Algorithms, methods and techniques. Simplilearn.com. https://www.simplilearn.com/data-encryption-methods-article
- Ahmed, S., & Khan, M. (2023). Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem. AI, IoT and the Fourth Industrial Revolution Review, 13(9), 1-17.
- Ali, H., & Kasowaki, L. (2024). Data Protection in the Digital Age: Safeguarding Information Assets (No. 11743). EasyChair.
- Anisetti, M., Ardagna, C., Cremonini, M., Damiani, E., Sessa, J., & Costa, L. (2020). Security threat landscape. White Paper Security Threats.
- Anthropic. (2022, February 15). Lessons from successfully defending weapon systems: An interview with a US Air Force cyber officer. Anthropic.
- Babate, A., Musa, M., Kida, A., & Saidu, M. (2015). State of cyber security: emerging threats landscape. International Journal of Advanced Research in Computer Science & Technology, 3(1), 113-119.
- Burroughs, G. (2020, January 14). Cybersecurity has become a strategic investment, not just a cost. TechTarget.
- Chaisse, J., & Bauer, C. (2018). Cybersecurity and the protection of digital assets: assessing the role of international investment law and arbitration. Vand. J. Ent. & Tech. L., 21, 549.
- Chen, F., Wang, Y., & Yu, Z. (2023). Cooperative active cyber defense through over-the-air software update in connected vehicles. IEEE Transactions on Vehicular Technology, 72(2), 1577-1588.
- Chen, P., Desmet, L., & Huygens, C. (2014). A study on advanced persistent threats. In Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings 15 (pp. 63-72). Springer Berlin Heidelberg.
- Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & security, 30(8), 719-731.
- Claessens, S. (2013, October). Interactions between monetary and macroprudential policies in an interconnected world. In Bank of Thailand-IMF conference on Monetary Policy in an Interconnected World, Bangkok (Vol. 31).
- Covington, M. J., & Carskadden, R. (2013, June). Threat implications of the internet of things. In 2013 5th international conference on cyber conflict (CYCON 2013) (pp. 1-12). IEEE.
- Dash, B., & Ansari, M. F. (2022). An Effective Cybersecurity Awareness Training Model: First Defense of an Organizational Security Strategy.
- Enriques, L., & Romano, A. (2022). Rewiring corporate law for an interconnected world. Ariz. L. Rev., 64, 51.
- Evren, R., & Milson, S. (2024). The Cyber Threat Landscape: Understanding and Mitigating Risks (No. 11705). EasyChair.
- FireEye. (2017, June 27). Cyber attack: Petya Ransomware [Blog post]. FireEye.
- Garrett, G. A. (2018). Cybersecurity in the Digital Age: Tools, Techniques, & Best Practices. Aspen Publishers.
- Green, J. (2022). Cybersecurity Challenges in the Digital Age. International Multidisciplinary Journal Of Science, Technology & Business, 1(4), 19-23.
- He, W., & Zhang, Z. (2019). Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce, 29(4), 249-257.
- Helbing, D. (2013). Globally networked risks and how to respond. Nature, 497(7447), 51-59.
- Jamshedovna, K. R., & Rahim oʻg‘li, Q. J. (2024). Cybersecurity in the Digital Age: Safeguarding Business Assets. Open Herald: Periodical of Methodical Research, 2(3), 42-45.
- Khaleefa, E. J., & Abdulah, D. A. (2022). Concept and difficulties of advanced persistent threats (APT): Survey. International Journal of Nonlinear Analysis and Applications, 13(1), 4037-4052.
- Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103-2115.
- Mandiant. (2018, May 25). Reducing risk from cyber attacks on operational technology. FireEye Threat Research Blog.
- Memmi, G., Kapusta, K., & Qiu, H. (2015, August). Data protection: Combining fragmentation, encryption, and dispersion. In 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) (pp. 1-9). IEEE.
- Microsoft. (2022, February 2). 2017 Equifax data breach [Blog post]. Microsoft Security.
- Ortiz, J. (2022). Information sharing helps automakers patch vehicles faster. AutomotiveIT.
- Pansara, R. R. (2022). Cybersecurity Measures in Master Data Management: Safeguarding Sensitive Information. International Numeric Journal of Machine Learning and Robots, 6(6), 1-12.
- Pescaroli, G., & Alexander, D. (2018). Understanding compound, interconnected, interacting, and cascading risks: a holistic framework. Risk analysis, 38(11), 2245-2257.
- Qureshi, M. B., Qureshi, M. S., Tahir, S., Anwar, A., Hussain, S., Uddin, M., & Chen, C. L. (2022). Encryption techniques for smart systems data security offloaded to the cloud. Symmetry, 14(4), 695.
- Skurka, M. (2021). Building cybersecurity resilience in the financial sector. World Economic Forum.
- Tarter, A. (2017). Importance of cyber security. Community Policing-A European Perspective: Strategies, Best Practices and Guidelines, 213-230.
- The New York Times. (2014, January 12). Target data breach spanned weeks, hit 110 million customers. Reuters.
- Trombley, L. (2022, June 3). 5 years later, lessons from the Target breach still apply. Security Boulevard.
- US-CERT. (2017, September 08). Alert (TA17-293A): Equifax announces cybersecurity incident involving sensitive information. US-CERT.
- Wheatley, M. (2021). The Equifax data breach: Four years later, what have we learned? CSO.
As interconnectivity and reliance on digital
technologies continue to rise exponentially, so too do
cybersecurity threats and risks. Malicious cyber actors
are employing increasingly sophisticated techniques to
target valuable data and disrupt critical systems and
infrastructure. The impacts of successful cyber-attacks
can be financially devastating and undermine an
organization's reputation and customer trust. This paper
examines how firms may utilize strong cybersecurity to
protect digital assets and reduce risks in a connected
society. As technology and communications improve,
cyber threats do too. Problems keep popping up.
Malware, phishing scams, and data breaches still harm
businesses. Hackers can also get in simpler with more
linked devices and the Internet of Things. This makes
protecting digital assets and systems, networks, and
critical infrastructure from sophisticated cyberattacks
even more crucial. Cybercriminals can steal data,
intellectual property, money, and customer information
in many ways. Advanced persistent threats are used by
state-backed parties for eavesdropping and geopolitics.
Therefore, organizations in all professions and industries
must prioritize safety and risk reduction. Businesses may
increase their safety with technical, process-based, and
strategic cybersecurity solutions, according to the report.
This requires strong access restrictions, networks,
encryption, software security, and audits. Human
aspects like cyber awareness training and a
comprehensive plan that matches an organization's risks
and resources are considered. A thorough security plan
discusses international conventions, following the rules,
and using modern technologies. Two case studies
demonstrate real-world operations. The first describes
how a large retailer stopped a complex APT with
numerous defenses. Learn how crucial segmentation,
detection tools, incident reaction, and public-private
partnerships are. The second one examines a major hotel
chain data breach and offers simple measures like strong
passwords and vendor tracking to reduce similar
dangers. Even if digital adversaries are getting smarter,
basic cybersecurity "hygiene." can block many attempts,
the report concludes. No organization is totally safe, but
following basic rules, laws, and best practices can help
protect people, organizations, and governments' assets in
today's linked globe. Researchers may investigate how
blockchain and AI might lessen hacking risks.
Keywords :
Cybersecurity, Data Protection, Encryption, Authentication, Access Control, Network Security, Firewall, IDS/IPS, Software Security, Vulnerability Management, Auditing, Penetration Testing, Threat Intelligence, Cyber Strategy, Cyber Awareness, Encryption, Internet of Things, Advanced Persistent Threats, Cyber-Attacks, Phishing, Malware, Ddos, Ransomware, Blockchain, Artificial Intelligence, Machine Learning.