University of Wisconsin-Madison, ISM Information security management, cybersecurity, business, strategy, prevention, technological factors, cyberattacks, computer, cybersecurity defenses
In this digital age, cyber safety is an absolute necessity for individuals, organizations, and governments worldwide. Aside from that, the continuous emergence of new technology, which is the starting point of progress and convenience, makes hackers vulnerable almost everywhere, allowing malicious actors to resort to evil (Erondu et al., 2023). Cybersecurity, therefore, emerges not merely as a technical necessity but as a critical pillar in upholding digital information's integrity, confidentiality, and availability (Möller, 2023). At the heart of cybersecurity concerns are cyberattacks—deliberate attempts by external entities to breach the information system of a user or organization, often with harmful intentions. These attacks vary widely in method and motive, ranging from data theft and financial gain to espionage and sabotage.
[...] K., Gupta, B. B., Singh, A. K., & Saraswat, V. K. (2023). Advanced Persistent Threats evolution, anatomy, attribution, and countermeasures. Journal of Ambient Intelligence and Humanized Computing, 9355-9381. https://doi.org/10.1007/s12652-023-04603-y Tahmasebi, M. (2024). Cyberattack ramifications, the hidden cost of a security breach. Journal of Information Security, 15(02), 87-105. https://doi.org/10.4236/jis.2024.152007 Thu, K. M. [...]
[...] Malware has also seen significant advancements. Originally simple self-replicating viruses, today's malware includes advanced ransomware that uses robust encryption algorithms to lock users out of their data or systems (Alam, 2022). Cybercriminals leverage exploit kits-pre-packaged sets of exploits-to automate the discovery and exploitation of vulnerabilities in software, making malware deployment more efficient and difficult to trace. DDoS attacks have evolved from basic bandwidth exhaustion to sophisticated multi-vector attacks, combining volumetric attacks with application-layer attacks. Nowadays, cybercriminals exploit botnets of millions of compromised machines to carry out DDoS attacks that will result in overwhelming traffic and the disruption of services (Alam, 2022). [...]
[...] (2023). Types of cyberattacks and incident responses. CUNY Academic Works. https://academicworks.cuny.edu/ny_pubs/1055/ Verma, A., & Shri, C. (2022). Cyber Security: A review of cyber crimes, security challenges and measures to control. Vision https://doi.org/10.1177/09722629221074760 Zaini, M. K., Masrek, M. N., & Sani, M. K. J. A. (2020). [...]
[...] When the cyberattacks began, the methods were easy and grounded, using flat, simple viruses or worms that spread through floppy disks or general internet connections. Some of the initial threats were meant for disturbance or arrogance. At the same time, the development of the internet and the higher value of digital assets took attackers only a short time to update and innovate. Phishing, one of the oldest forms of cyber deception, has evolved from basic email scams to sophisticated spear-phishing campaigns (Rebovich & Byrne, 2022). [...]
[...] https://doi.org/10.47772/ijriss.2023.7011121 Jayarao, G. B., Ray, S., & Panigrahi, P. K. (2024). Information security threats and organizational readiness in nWFH scenarios. Computers & Security https://doi.org/10.1016/j.cose.2024.103745 Khan, M. J. (2023). Securing network infrastructure with cyber security. World Journal of Advanced Research and Reviews, 803-813. https://doi.org/10.30574/wjarr.2023.17.2.0308 Liu, Y., Chen, R., Zhou, F., Zhang, S., & Wang, J. (2021). Analysis of the influencing factors of organizational resilience in the ISM Framework: an exploratory study based on multiple cases. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee