EconPapers    
Economics at your fingertips  
 

Conquering the cyber attacks: analysis and protecting the enterprise resources

Emmanuel U. Opara and Ahmed Y. Mahfouz

International Journal of Business Continuity and Risk Management, 2016, vol. 6, issue 4, 314-329

Abstract: Security breaches of all kinds are growing in complexity, sophistication, and impact. Hacktivists are bypassing conventional security deployments at will by breaching network systems. Security professionals have invested billions of dollars into conventional defenses. Yet attackers are compromising networks at an alarming rate. Regardless of what vendor or combination of typical defense-in-depth tools an organisation deploys, attackers are bypassing these with ease. This study addresses these developments and creates awareness among security practitioners so that they can be prepared to defend their enterprise systems.

Keywords: hacking; vulnerability exploitation; vulnerabilities; cyber security; malware; cyber attacks; network security. (search for similar items in EconPapers)
Date: 2016
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=81255 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijbcrm:v:6:y:2016:i:4:p:314-329

Access Statistics for this article

More articles in International Journal of Business Continuity and Risk Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijbcrm:v:6:y:2016:i:4:p:314-329