ENSURING A SAFE TOMORROW: CONCLUSIONS FROM THE ANALYSIS OF THE LEADING CYBER ATTACKS AND THEIR IMPACT ON INFORMATION SECURITY DOI

A. R. Yerboluly,

T. K. Tusipova

Bulletin of Shakarim University Technical Sciences, Journal Year: 2024, Volume and Issue: 3(15), P. 5 - 15

Published: Sept. 27, 2024

In today's world, where digitalization and universal connectivity play a key role, cybersecurity issues are coming to the fore in context of global security. With increasing dependence on digital technologies, cyberspace continues evolve, presenting new threats challenges. This article focuses analysis major attacks network infrastructure that have occurred recent years, exploring various types such as DDoS, APT, ransomware, Man-in-the-Middle (MitM) SQL Injection. The main focus is identifying common attack patterns protection techniques, which allows for better understanding mechanisms strategies countering cyber threats. examines detail tools methods traffic used detect neutralize threats, analyzes their effectiveness real conditions. Using included histograms, charts tables, visualizes data trends, contributes complexity dynamics attacks. Based analysis, recommendations formulated improve defense develop approaches ensuring security critically important protecting valuable information assets maintaining stability cyberspace.

Language: Английский

Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis DOI
Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: 150, P. 104276 - 104276

Published: Dec. 11, 2024

Language: Английский

Citations

3

Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis DOI
Ahmed M. Asfahani

International Journal of Information Security, Journal Year: 2024, Volume and Issue: 23(4), P. 2515 - 2530

Published: April 26, 2024

Language: Английский

Citations

2

Mitigating the Impact of Work Overload on Cybersecurity Behavior: The Moderating Influence of Corporate Ethics—A Mediated Moderation Analysis DOI Open Access
Yunsook Hong,

Min‐Jik Kim,

Taewoo Roh

et al.

Sustainability, Journal Year: 2023, Volume and Issue: 15(19), P. 14327 - 14327

Published: Sept. 28, 2023

This present study examines how work overload affects cybersecurity behavior, considering job stress as a mediator and corporate ethics moderator. Using time-lagged survey design, 377 South Korean employees were surveyed. The results of SEM analysis (structural equation model) show that leads to higher stress, which in turn worsens behavior. High levels buffer this negative relationship. research fill gaps the existing literature by linking overload, offering valuable insights for both theory practice. Future directions are also discussed.

Language: Английский

Citations

4

Identifying Key Issues to Enhance the Cybersecurity Awareness Strategy within Organizations DOI

Anawin Kaewsa-ard,

Nattavee Utakrit

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 11

Published: Jan. 1, 2024

Language: Английский

Citations

1

Behavior Types from Cybersecurity Perspective: An Overview DOI
Afrah Almansoori

Studies in computational intelligence, Journal Year: 2024, Volume and Issue: unknown, P. 203 - 215

Published: Jan. 1, 2024

Language: Английский

Citations

1

Motivation and guidance of college students’ low-carbon behavior: evidence from Chinese colleges and universities DOI Creative Commons

Gaofei Ren,

Changjin Liu,

Yaoyao Chen

et al.

Frontiers in Psychology, Journal Year: 2024, Volume and Issue: 15

Published: June 13, 2024

In the context of global implementation emission peak and carbon-neutral strategic goal, guiding residents’ low-carbon behavior is great significance for realization dual carbon goal. However, existing studies have paid less attention to college students. Based on theory planned behavior, this paper constructs a theoretical model influencing factors students’ behavior. Combined with 612 questionnaires from Chinese colleges universities, study uses structural equation multi-group analysis method explore motivation education strategies. The results show that attitude, subjective norms, values, perceived control significant positive effects low intention students, influence their through intention. Further research found gender growth environment (urban vs. rural) presented heterogeneity in different paths, cost had negative moderating effect during transition These findings provide basis policy inspiration explaining

Language: Английский

Citations

1

Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations DOI Creative Commons
Morgan Djotaroeno, Erik Beulen

Information, Journal Year: 2024, Volume and Issue: 15(8), P. 505 - 505

Published: Aug. 21, 2024

Cybercrime is currently rapidly developing, requiring an increased demand for information security knowledge. Attackers are becoming more sophisticated and complex in their assault tactics. Employees a focal point since humans remain the ‘weakest link’ vital to prevention. This research investigates what cognitive internal factors influence awareness (ISA) among employees, through quantitative empirical using survey conducted at Dutch financial insurance firm. The question of “How extent do contribute (ISA)?” has been answered, theory situation as theoretical lens. constructs Security Complexity, Information Goals (InfoSec Goals), SETA Programs (security education, training, awareness) significantly ISA. most important recommendations seek novel explaining variables ISA, further investigate roots Complexity influences InfoSec Goals, venture into qualitative experimental methodologies depth. practical minimize complexity (1) topics (e.g., by contextualizing it specific employee groups) (2) integrate these simplifications various methods gamification online training).

Language: Английский

Citations

1

Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia DOI
Ali Vafaei-Zadeh, Davoud Nikbin,

Kit Yik Teoh

et al.

International Journal of Bank Marketing, Journal Year: 2024, Volume and Issue: unknown

Published: Nov. 16, 2024

Purpose Drawing on protection motivation theory (PMT), this study aims to explore the factors that enhance cybersecurity awareness among online banking users in Malaysia. More specifically, it investigates influences of perceived vulnerability, severity, technical knowledge, privacy intrusions and threats then examines effects threats, along with response efficacy self-efficacy, awareness, considering moderating role fear cyberattacks. Design/methodology/approach A survey-based research approach was applied, hypotheses were tested using a sample 324 respondents, employing partial least squares structural equation modeling (PLS-SEM). Findings The results show significantly influence while knowledge does not threats. Furthermore, found self-efficacy both have no it. Finally, our confirmed cyberattacks relationship between awareness. Practical implications For individuals, highlights significance fear, shaping perceptions, paving way for enhanced tailored programs. Moreover, understanding relationships empowers individuals craft personalized risk mitigation strategies, fostering confidence navigating digital landscape. Businesses can leverage insights informed design employee training programs data-driven decision-making investments. Government entities, recognizing nuanced are encouraged formulate context-specific policies foster cross-sector collaboration comprehensive initiatives. Originality/value This extends PMT by incorporating additional antecedent variables – namely, within context been overlooked thus far. delves into unique cyberattack as variable, thereby enhancing PMT.

Language: Английский

Citations

1

Cybersecurity Practices of Rural Underserved Communities in Africa: A Case Study from Northern Namibia DOI
Gabriel Tuhafeni Nhinda, Fungai Bhunu Shava

Published: Aug. 3, 2023

Globally, Information Communication Technology (ICT) device usage has seen a steep rise over the last few years. This also holds in developing countries, which have embarked on connecting unconnected or previously disadvantaged parts of their populations. connectivity enables people to interact with cyberspace, brings opportunities and challenges. Opportunities such as ability conduct business online, attend online education, perform banking activities. Challenges experienced are cost Internet access more worrying cyber-risks potential for exploitation. There remain pockets communities that experience sporadic these tend be susceptible cyber-attacks due issues lack/limited awareness cyber secure practices, an existent culture might exploited by cybercriminals, overall, lackluster approach cyber-hygiene. We present qualitative study conducted rural Northern Namibia. Our findings indicate both insecure cybersecurity practices exist. However, through Ubuntu Uushiindaism Afrocentric lenses, sharing mobile devices without passwords among community mirror unity. Practices this mainstream research can considered insecure. propose interrogating "common" universality applicability.

Language: Английский

Citations

2

Mobile Technologies at Risk: A Literature Review on the Evolving Challenges and Solutions in Mobile Technology Security DOI Creative Commons

Miranda Stanfield

Scientific Bulletin, Journal Year: 2024, Volume and Issue: 29(1), P. 151 - 162

Published: June 1, 2024

Abstract This study examines the growth of mobile technology usage and increasing cybersecurity threats that come with it, over 3.8 billion users globally. The paper reviews existing research on security, highlighting a surge in incidents, identifies patterns, user behaviors, technological gaps exacerbate security risks. By providing more nuanced understanding technology’s challenges, this contributes to developing effective protection strategies ensure users’ safety digital domain.

Language: Английский

Citations

0