Kontaktujte nás | Jazyk: čeština English
dc.title | Analysis of current preventive approaches in the context of cybersecurity | en |
dc.contributor.author | Oka, Mimi Enakome | |
dc.contributor.author | Hromada, Martin | |
dc.relation.ispartof | Proceedings - International Carnahan Conference on Security Technology | |
dc.identifier.issn | 1071-6572 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-1-6654-9363-5 | |
dc.date.issued | 2022 | |
utb.relation.volume | 2022-September | |
dc.event.title | 2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022 | |
dc.event.location | Valeč u Hrotovic | |
utb.event.state-en | Czech Republic | |
utb.event.state-cs | Česká republika | |
dc.event.sdate | 2022-09-07 | |
dc.event.edate | 2022-09-09 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/ICCST52959.2022.9896499 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/9896499 | |
dc.relation.uri | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9896499 | |
dc.subject | cyber-attacks | en |
dc.subject | cyber-crimes | en |
dc.subject | cyber-risks | en |
dc.subject | cybersecurity | en |
dc.subject | data breaches | en |
dc.subject | prevention | en |
dc.description.abstract | Reliance on information technology and computer network solutions is on the increase, so are the activities of cyber criminals, the number of cyber-attacks and the impact. According to Identity theft Resource Centre, the number of data breaches jumped 68% over what was reported in 2020.IT Governance recorded 1,243 security incidents in 2021 representing an 11% increase compared to 2020 that recorded 1,120. Governments and companies continue to invest in preventing these cyber-attacks from occurring by adopting various methods such as patch management, end point protection, installation of fire walls, backup of data, security policies, access control and privileges, Wi-Fi security access, and most importantly security awareness training. According to Info Guard cybersecurity, 95% of security breach is caused by human error.This review paper evaluated the findings from various articles on methods used to prevent cyber-attacks in a simplified format. © 2022 IEEE. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1011176 | |
utb.identifier.obdid | 43884078 | |
utb.identifier.scopus | 2-s2.0-85139871230 | |
utb.source | d-scopus | |
dc.date.accessioned | 2022-10-26T13:40:44Z | |
dc.date.available | 2022-10-26T13:40:44Z | |
utb.ou | Department of Security Engineering | |
utb.contributor.internalauthor | Oka, Mimi Enakome | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.fulltext.affiliation | Mimi Enakome Oka Deparment of Security Engineering Faculty of Applied Informatics Tomas Bata University in Zlin Zlin, Czech Republic [email protected] Martin Hromada Department of Security Engineering Faculty of Applied Informatics Tomas Bata University in Zlin, Zlin, Czech Republic [email protected] | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] Barbora Kotkova and Martin Hromada “Cybersecurity and social engineering” in 2021 25th International conference on circuits, systems, communications and computers (CSCC), Crete Island Greece, 2021 pp.134- 140. [2] Benoit Dupont, “Enhancing the effectiveness of cybercrime prevention through policy monitoring” Journal of Crime and Justice, pp.500–515. [3] Benjamin D Cone, Cynthia E Irvine*, Michael F. Thompson, Thuy D Nguyen “A video game for cybersecurity training and awareness” Science Direct Computer & security 26 (2007) 63-72. [4] Adedapo Ojowuni The role of cybersecurity updates and patches in addressing cybersecurity threats and vulnerabilities. A case study of recent cybersecurity attacks January 2022. (Unpublished) [5] Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji “Network Access Control Technology- Proposition to contain new security challenges” International Journal of communication, network and system sciencese Vol.5 No.8 2012. [6] Mrs Ashwini Sheth, Mr Sachin Bhosale, Mr Farish Kurupkar “Reasearch paper on cybersecurity” Contemporary research in India ISSN 2231-2137. Special Issue April 2021. [7] Adam M Bossler, Tamar Berenblum “New directions in cybercrime research” Journal of crime and justice Vol 42 Issue 5 2019. [8] Dr. Kunwar Sign Vaisla “Analyzing of zero-day attck and its identification techniques” First international conference on advances in computing and communication engineering (ICACCE_2014). [9] Riza Azmi, William Tibben, Khin Than Win “Review of cybersecurityframeworks: Context and shared concepts” Journal of cyber policy DOI: 10.1090123738871.2018.1520271. [10] Martin Eling, Michael Mcshane, Trung Nguyen “Cyber risk management: History and future research directions” Wiley online library Vol 24 Issue 1 spring 2021 pp93-125. [11] Accenture- 2019-cost of cybercrime-study-final.pdf [12] https://www.wikipedia.org/ [13] https://www.ey.com/en_ca/cybersecurity/your-employees-are-theweakest-link-in-your-cybersecurity-chain [14] https://www.infoguardsecurity.com/people-the-weakest-link-incybersecurity/ [15] https://www.reuters.com/article/us-equifax-breachidUSKCN1C71VY [16] https://www.citrix.com/solutions/secure-access/what-is-accesscontrol.html [17] http://www.idtheftcenter.org [18] www.kaspersky.com [19] https://www.itgovernance.co.uk/what-is-cybersecurity [20] https://jumpcloud.com/blog/top-5-security-breaches-of-2021 [21] https://expertinsights.com/insights/the-top-5-biggest-cyber-securitythreats-that-small-businesses-face-and-how-to-stop-them/ [22] National Institutite of Standards and Technolgogy Cybersecurity Framework 2014. [23] John Jamison, Lucas Morris and Christopher Wilkinson “The future of cybersecurity in internal audit” a joint research report by the internal audit foundation and Crowe. | |
utb.fulltext.sponsorship | - | |
utb.scopus.affiliation | Tomas Bata University in Zlin, Faculty of Applied Informatics, Deparment of Security Engineering, Zlin, Czech Republic | |
utb.fulltext.projects | - | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.ou | Department of Security Engineering | |
utb.fulltext.ou | Department of Security Engineering |