2021
DOI: 10.18280/ijsse.110111
|View full text |Cite
|
Sign up to set email alerts
|

Business Organization Security Strategies to Cyber Security Threats

Abstract: It is argued that the advancement of Information, Communication and Technology went hand in hand with the emergence of certain threats and vulnerabilities to cybersecurity. In several cases, cyber attacks have targeted the information, communication and infrastructure networks of numerous organizations. Today, hackers and intruders have advanced technology within their scope that lets them access the organizational information system. The present study highlights numerous internet security related problems, it… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 11 publications
1
7
0
Order By: Relevance
“…Ensuring security for engineering enterprises is also impossible without resource provision. Therefore, we agree with the opinions of scientists [8][9][10] that the importance of resources for this process.…”
Section: Literature Reviewsupporting
confidence: 87%
See 1 more Smart Citation
“…Ensuring security for engineering enterprises is also impossible without resource provision. Therefore, we agree with the opinions of scientists [8][9][10] that the importance of resources for this process.…”
Section: Literature Reviewsupporting
confidence: 87%
“…At the same time, the opinion of Fakiha [9] is interesting, which notes that countering any threats to the control system should be accompanied by appropriate resource support.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is very popular to form an anti-crisis management model for the policy of Eastern Europe to counter negative factors [19][20][21][22], but in practice, the problems of European integration are not taken into account.…”
Section: Discussionmentioning
confidence: 99%
“…Ayub et al, Perform Ransomware detection on artificial neural networks (ANN) through monitoring of I/O Request Packet (IRP) logs by obtaining the lowest level data [19]. These logs can further describe Ransomware activity [20].…”
Section: Literature Reviewmentioning
confidence: 99%