Evaluating the Role of Protection Motivation Theory in Information Security Policy Compliance: Insights from the Banking Sector Using PLS-SEM Approach DOI Creative Commons

Ebrahim Mohammed Alrawhani,

Awanis Romli, Mohammed A. Al‐Sharafi

et al.

Journal of Open Innovation Technology Market and Complexity, Journal Year: 2024, Volume and Issue: unknown, P. 100463 - 100463

Published: Dec. 1, 2024

Language: Английский

Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure DOI Open Access

Azheen Waheed,

Bhavish Seegolam,

Mohammad Faizaan Jowaheer

et al.

Published: July 29, 2024

Zero-day threats are a more severe and constantly developing menace to various participants including large companies, government offices, educational establishments. These entities may contain valuable information essential operations that attract cyber attackers. exploits especially devastating as they target weaknesses an organization’s vendors not even aware of, making them have no protection against them. This paper focuses on the background use of zero-day exploitation structure technologies these complex malware attacks. We examine two notable real-life cases: case ‘HAFNIUM targeting Exchange Servers with exploits’ was investigated by Microsoft 365 Security Threat Intelligence, ‘Log4j vulnerability’ reported National Cyber Centre. cases show critical effects vulnerabilities measures taken combat Additionally, this outlines different strategies can be used prevent attacks help modern technologies. fast patch release, effective IDS/IPS, security model involves constant vigilance behavioral analytics. Thus, studying lifecycle exploits, one enhance organization invisible traditional systems. extensive survey is designed useful in understanding characteristics vulnerabilities, for their mitigation, threat development field cybersecurity. it possible strengthen develop time analyzing previous events predicting potential problems.

Language: Английский

Citations

8

Evaluating the Role of Protection Motivation Theory in Information Security Policy Compliance: Insights from the Banking Sector Using PLS-SEM Approach DOI Creative Commons

Ebrahim Mohammed Alrawhani,

Awanis Romli, Mohammed A. Al‐Sharafi

et al.

Journal of Open Innovation Technology Market and Complexity, Journal Year: 2024, Volume and Issue: unknown, P. 100463 - 100463

Published: Dec. 1, 2024

Language: Английский

Citations

1