| Peer-Reviewed

Emerging Cyber Security Threats in Organization

Received: 27 December 2019     Accepted: 29 April 2020     Published: 27 August 2020
Views:       Downloads:
Abstract

Background Cyber-security is a preventive preparation of protecting sensitive information, information systems, computers, servers, critical infrastructure, mobile devices, and computer networks from unauthorized access or hackers. Now a day digital technology takes the most significant role in growth effectiveness and efficiency in the organization. However, new technologies like mobile technologies (5G), IoT and cloud computing are Coming with new information security threats. Study design qualitative, survey, case study and an in-depth literature review were conducted. Employees still using the old software, they didn’t update the software (operating system), they use a permanent password, they are still using weak and default password (Wife name or her phone number) information security literacy and behavior end users or IT staff. They don’t have awareness about proactive cyber-attacks prevention policies and procedures. Because they have not took short and long term training on most serious cyber-attacks like ransom ware, social engineering, malware, DDoS, and phishing. This study aims to assess the most common and emerging cyber security threats. That the organizations are facing. The main objective of these investigations is to create awareness about the emerging and the most serious cyber-attacks occurring in the organization. The findings/results demonstrate that cyber security preparations and trained employees are very low; hackers becoming more sophisticated. Conclusion based the findings we conclude that cyber security protection using current method is not sufficient; employees have no idea about security threats due to lack of awareness and training.

Published in International Journal of Information and Communication Sciences (Volume 5, Issue 2)
DOI 10.11648/j.ijics.20200502.12
Page(s) 12-16
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2020. Published by Science Publishing Group

Keywords

Cyber Security, Sensitive Information, Threats, Information Security

References
[1] Yang Lu, "Cybersecurity Research: A Review of Current Research Topics," Journal of Industrial Integration and Management, vol. Vol. 3, no. No. 4, p. 25, Octobe 2018.
[2] Bilal Khan, "Effectiveness of information security awareness methods based on psychological theories," African Journal of Business Managemen, vol. Vol. 5 (26, no. pp. 10862-10868, p. 8, October 2011.
[3] Hussain Aldawood, "Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues," MDPI, p. 16, March 2019.
[4] Ibrahim Ghafir, "Security threats to critical infrastructure: the human factor," doi.org, p. 17, March 2018.
[5] Michele De Donno, "Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era," MDPI, p. 30, June 2019.
[6] Mrs. M. Kundalakesi, "Network Security with Cryptography," International Journal for Scientific Research & Development, vol. Vol. 6, no. Issue 01, p. 3, September 2018.
[7] Shilpa Pareek, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.
[8] Adnan Rizal, "Information Security Challenges: A Malaysian Context," International Journal of Academic Research in Business and Social Sciences, vol. Vol. 7, no. No. 9, p. 8, September 2017.
[9] Tooska Dargah, "ACyber-Kill-Chain based taxonomy of crypto-ransomware features," Journal of Computer Virology and HackingTechniques, p. 29, July 2019.
[10] Shilpa Pareek1, "Different Type Network Security Threats and Solutions, A Review," International Journal of Computer Science, vol. Volume 5, no. Issue 4, p. 11, April 2017.
[11] Tadas Limba¹, "CYBER SECURITY MANAGEMENT MODEL FOR CRITICAL INFRASTRUCTURE," The International Journal ENTREPRENEURSHIP AND SUSTAINABILITY ISSUES, vol. Volume 4, no. Number 4, p. 16, June 2017.
[12] Yeshwanth Rao, "Artificial Intelligence and Big Data for Computer Cyber Security Systems," Journal of Advances in Science and Technology, vol. Vol. 12, no. Issue No. 24, p. 9, November 2016.
Cite This Article
  • APA Style

    Hailye Tekleselase Woldemichael. (2020). Emerging Cyber Security Threats in Organization. International Journal of Information and Communication Sciences, 5(2), 12-16. https://doi.org/10.11648/j.ijics.20200502.12

    Copy | Download

    ACS Style

    Hailye Tekleselase Woldemichael. Emerging Cyber Security Threats in Organization. Int. J. Inf. Commun. Sci. 2020, 5(2), 12-16. doi: 10.11648/j.ijics.20200502.12

    Copy | Download

    AMA Style

    Hailye Tekleselase Woldemichael. Emerging Cyber Security Threats in Organization. Int J Inf Commun Sci. 2020;5(2):12-16. doi: 10.11648/j.ijics.20200502.12

    Copy | Download

  • @article{10.11648/j.ijics.20200502.12,
      author = {Hailye Tekleselase Woldemichael},
      title = {Emerging Cyber Security Threats in Organization},
      journal = {International Journal of Information and Communication Sciences},
      volume = {5},
      number = {2},
      pages = {12-16},
      doi = {10.11648/j.ijics.20200502.12},
      url = {https://doi.org/10.11648/j.ijics.20200502.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijics.20200502.12},
      abstract = {Background Cyber-security is a preventive preparation of protecting sensitive information, information systems, computers, servers, critical infrastructure, mobile devices, and computer networks from unauthorized access or hackers. Now a day digital technology takes the most significant role in growth effectiveness and efficiency in the organization. However, new technologies like mobile technologies (5G), IoT and cloud computing are Coming with new information security threats. Study design qualitative, survey, case study and an in-depth literature review were conducted. Employees still using the old software, they didn’t update the software (operating system), they use a permanent password, they are still using weak and default password (Wife name or her phone number) information security literacy and behavior end users or IT staff. They don’t have awareness about proactive cyber-attacks prevention policies and procedures. Because they have not took short and long term training on most serious cyber-attacks like ransom ware, social engineering, malware, DDoS, and phishing. This study aims to assess the most common and emerging cyber security threats. That the organizations are facing. The main objective of these investigations is to create awareness about the emerging and the most serious cyber-attacks occurring in the organization. The findings/results demonstrate that cyber security preparations and trained employees are very low; hackers becoming more sophisticated. Conclusion based the findings we conclude that cyber security protection using current method is not sufficient; employees have no idea about security threats due to lack of awareness and training.},
     year = {2020}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Emerging Cyber Security Threats in Organization
    AU  - Hailye Tekleselase Woldemichael
    Y1  - 2020/08/27
    PY  - 2020
    N1  - https://doi.org/10.11648/j.ijics.20200502.12
    DO  - 10.11648/j.ijics.20200502.12
    T2  - International Journal of Information and Communication Sciences
    JF  - International Journal of Information and Communication Sciences
    JO  - International Journal of Information and Communication Sciences
    SP  - 12
    EP  - 16
    PB  - Science Publishing Group
    SN  - 2575-1719
    UR  - https://doi.org/10.11648/j.ijics.20200502.12
    AB  - Background Cyber-security is a preventive preparation of protecting sensitive information, information systems, computers, servers, critical infrastructure, mobile devices, and computer networks from unauthorized access or hackers. Now a day digital technology takes the most significant role in growth effectiveness and efficiency in the organization. However, new technologies like mobile technologies (5G), IoT and cloud computing are Coming with new information security threats. Study design qualitative, survey, case study and an in-depth literature review were conducted. Employees still using the old software, they didn’t update the software (operating system), they use a permanent password, they are still using weak and default password (Wife name or her phone number) information security literacy and behavior end users or IT staff. They don’t have awareness about proactive cyber-attacks prevention policies and procedures. Because they have not took short and long term training on most serious cyber-attacks like ransom ware, social engineering, malware, DDoS, and phishing. This study aims to assess the most common and emerging cyber security threats. That the organizations are facing. The main objective of these investigations is to create awareness about the emerging and the most serious cyber-attacks occurring in the organization. The findings/results demonstrate that cyber security preparations and trained employees are very low; hackers becoming more sophisticated. Conclusion based the findings we conclude that cyber security protection using current method is not sufficient; employees have no idea about security threats due to lack of awareness and training.
    VL  - 5
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Information Systems, School of Informatics, Addis Ababa University, Addis Ababa, Ethiopia

  • Sections