Publikace UTB
Repozitář publikační činnosti UTB

Analysis of current preventive approaches in the context of cybersecurity

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Analysis of current preventive approaches in the context of cybersecurity en
dc.contributor.author Oka, Mimi Enakome
dc.contributor.author Hromada, Martin
dc.relation.ispartof Proceedings - International Carnahan Conference on Security Technology
dc.identifier.issn 1071-6572 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-1-6654-9363-5
dc.date.issued 2022
utb.relation.volume 2022-September
dc.event.title 2022 IEEE International Carnahan Conference on Security Technology, ICCST 2022
dc.event.location Valeč u Hrotovic
utb.event.state-en Czech Republic
utb.event.state-cs Česká republika
dc.event.sdate 2022-09-07
dc.event.edate 2022-09-09
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers Inc.
dc.identifier.doi 10.1109/ICCST52959.2022.9896499
dc.relation.uri https://ieeexplore.ieee.org/document/9896499
dc.relation.uri https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9896499
dc.subject cyber-attacks en
dc.subject cyber-crimes en
dc.subject cyber-risks en
dc.subject cybersecurity en
dc.subject data breaches en
dc.subject prevention en
dc.description.abstract Reliance on information technology and computer network solutions is on the increase, so are the activities of cyber criminals, the number of cyber-attacks and the impact. According to Identity theft Resource Centre, the number of data breaches jumped 68% over what was reported in 2020.IT Governance recorded 1,243 security incidents in 2021 representing an 11% increase compared to 2020 that recorded 1,120. Governments and companies continue to invest in preventing these cyber-attacks from occurring by adopting various methods such as patch management, end point protection, installation of fire walls, backup of data, security policies, access control and privileges, Wi-Fi security access, and most importantly security awareness training. According to Info Guard cybersecurity, 95% of security breach is caused by human error.This review paper evaluated the findings from various articles on methods used to prevent cyber-attacks in a simplified format. © 2022 IEEE. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1011176
utb.identifier.obdid 43884078
utb.identifier.scopus 2-s2.0-85139871230
utb.source d-scopus
dc.date.accessioned 2022-10-26T13:40:44Z
dc.date.available 2022-10-26T13:40:44Z
utb.ou Department of Security Engineering
utb.contributor.internalauthor Oka, Mimi Enakome
utb.contributor.internalauthor Hromada, Martin
utb.fulltext.affiliation Mimi Enakome Oka Deparment of Security Engineering Faculty of Applied Informatics Tomas Bata University in Zlin Zlin, Czech Republic [email protected] Martin Hromada Department of Security Engineering Faculty of Applied Informatics Tomas Bata University in Zlin, Zlin, Czech Republic [email protected]
utb.fulltext.dates -
utb.fulltext.references [1] Barbora Kotkova and Martin Hromada “Cybersecurity and social engineering” in 2021 25th International conference on circuits, systems, communications and computers (CSCC), Crete Island Greece, 2021 pp.134- 140. [2] Benoit Dupont, “Enhancing the effectiveness of cybercrime prevention through policy monitoring” Journal of Crime and Justice, pp.500–515. [3] Benjamin D Cone, Cynthia E Irvine*, Michael F. Thompson, Thuy D Nguyen “A video game for cybersecurity training and awareness” Science Direct Computer & security 26 (2007) 63-72. [4] Adedapo Ojowuni The role of cybersecurity updates and patches in addressing cybersecurity threats and vulnerabilities. A case study of recent cybersecurity attacks January 2022. (Unpublished) [5] Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji “Network Access Control Technology- Proposition to contain new security challenges” International Journal of communication, network and system sciencese Vol.5 No.8 2012. [6] Mrs Ashwini Sheth, Mr Sachin Bhosale, Mr Farish Kurupkar “Reasearch paper on cybersecurity” Contemporary research in India ISSN 2231-2137. Special Issue April 2021. [7] Adam M Bossler, Tamar Berenblum “New directions in cybercrime research” Journal of crime and justice Vol 42 Issue 5 2019. [8] Dr. Kunwar Sign Vaisla “Analyzing of zero-day attck and its identification techniques” First international conference on advances in computing and communication engineering (ICACCE_2014). [9] Riza Azmi, William Tibben, Khin Than Win “Review of cybersecurityframeworks: Context and shared concepts” Journal of cyber policy DOI: 10.1090123738871.2018.1520271. [10] Martin Eling, Michael Mcshane, Trung Nguyen “Cyber risk management: History and future research directions” Wiley online library Vol 24 Issue 1 spring 2021 pp93-125. [11] Accenture- 2019-cost of cybercrime-study-final.pdf [12] https://www.wikipedia.org/ [13] https://www.ey.com/en_ca/cybersecurity/your-employees-are-theweakest-link-in-your-cybersecurity-chain [14] https://www.infoguardsecurity.com/people-the-weakest-link-incybersecurity/ [15] https://www.reuters.com/article/us-equifax-breachidUSKCN1C71VY [16] https://www.citrix.com/solutions/secure-access/what-is-accesscontrol.html [17] http://www.idtheftcenter.org [18] www.kaspersky.com [19] https://www.itgovernance.co.uk/what-is-cybersecurity [20] https://jumpcloud.com/blog/top-5-security-breaches-of-2021 [21] https://expertinsights.com/insights/the-top-5-biggest-cyber-securitythreats-that-small-businesses-face-and-how-to-stop-them/ [22] National Institutite of Standards and Technolgogy Cybersecurity Framework 2014. [23] John Jamison, Lucas Morris and Christopher Wilkinson “The future of cybersecurity in internal audit” a joint research report by the internal audit foundation and Crowe.
utb.fulltext.sponsorship -
utb.scopus.affiliation Tomas Bata University in Zlin, Faculty of Applied Informatics, Deparment of Security Engineering, Zlin, Czech Republic
utb.fulltext.projects -
utb.fulltext.faculty Faculty of Applied Informatics
utb.fulltext.faculty Faculty of Applied Informatics
utb.fulltext.ou Department of Security Engineering
utb.fulltext.ou Department of Security Engineering
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam