Conquering the cyber attacks: analysis and protecting the enterprise resources
Emmanuel U. Opara and
Ahmed Y. Mahfouz
International Journal of Business Continuity and Risk Management, 2016, vol. 6, issue 4, 314-329
Abstract:
Security breaches of all kinds are growing in complexity, sophistication, and impact. Hacktivists are bypassing conventional security deployments at will by breaching network systems. Security professionals have invested billions of dollars into conventional defenses. Yet attackers are compromising networks at an alarming rate. Regardless of what vendor or combination of typical defense-in-depth tools an organisation deploys, attackers are bypassing these with ease. This study addresses these developments and creates awareness among security practitioners so that they can be prepared to defend their enterprise systems.
Keywords: hacking; vulnerability exploitation; vulnerabilities; cyber security; malware; cyber attacks; network security. (search for similar items in EconPapers)
Date: 2016
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=81255 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijbcrm:v:6:y:2016:i:4:p:314-329
Access Statistics for this article
More articles in International Journal of Business Continuity and Risk Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().