CYBERSECURITY: EMERGING TRENDS AND CHALLENGES

ავტორი: Habib Badawi
ორგანიზაცია: Lebanese University

კატეგორია:

საკვანძო სიტყვები: Cybersecurity, Threat Intelligence, Human Factors, Ethics, International Cooperation, Critical Infrastructure, Cyber Resilience
აბსტრაქტი. This comprehensive study explores the multifaceted landscape of cybersecurity, integrating technical, human, ethical, and international perspectives. Drawing on a robust theoretical framework, we examine emerging trends in threat intelligence, critical infrastructure protection, the human factor in cybersecurity, ethical considerations, and international cooperation. Our findings highlight the need for a holistic approach to cybersecurity that balances technological solutions with human-centric strategies, ethical considerations, and global collaboration. The study provides insights for policymakers, cybersecurity professionals, and researchers, offering a roadmap for navigating the complex and evolving cybersecurity terrain.

ბიბლიოგრაფია

Aloul, F. A. (2012). The need for effective information security awareness. Journal of Advances in Information Technology, 1(4), 176-183. https://doi.org/10.4304/jait.1.4.176-183
Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society, 11(3), 1-11.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731. https://doi.org/10.1016/j.cose.2011.08.004
Conklin, A. (2006). Cyber defense competitions and information security education: An active learning solution for a capstone course. Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 9, 220b-220b. https://doi.org/10.1109/HICSS.2006.110
Council of Europe. (2001). Convention on Cybercrime. European Treaty Series, 185. https://rm.coe.int/1680081561
Council of Europe. (2001). Convention on Cybercrime. European Treaty Series, 185. https://rm.coe.int/1680081561
Cyber Threat Alliance. (2017). Cyber Threat Alliance expands mission through appointment of President, formal incorporation as not-for-profit and launch of new threat intelligence sharing platform. https://cyberthreatalliance.org/cyber-threat-alliance-expands-mission-appointment-president-formal-incorporation-not-profit-launch-new-threat-intelligence-sharing-platform
Cybersixgill. (n.d.). Threat intelligence solutions. https://www.cybersixgill.com/solutions/
Denning, D. E. (2012). Stuxnet: What has changed? Future Internet, 4(3), 672-687. https://doi.org/10.3390/fi4030672
French Ministry for Europe and Foreign Affairs. (2018). Paris Call for Trust and Security in Cyberspace. https://pariscall.international/en/
Furnell, S., & Thomson, K. L. (2009). From culture to disobedience: Recognising the varying user acceptance of IT security. Computer Fraud & Security, 2009(2), 5-10. https://doi.org/10.1016/S1361-3723(09)70019-9
Greitzer, F. L., Strozer, J., Cohen, S., Bergey, J., Cowley, J., Moore, A., & Mundie, D. (2014). Unintentional insider threat: Contributing factors, observables, and mitigation strategies. 2014 47th Hawaii International Conference on System Sciences, 2025-2034. https://doi.org/10.1109/HICSS.2014.256
Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346. https://doi.org/10.1016/j.heliyon.2017.e00346
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). Routledge
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. https://doi.org/10.1016/j.cose.2011.10.007
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113-122. https://doi.org/10.1016/j.jisa.2014.09.005
Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248. https://doi.org/10.1016/j.cose.2021.102248
Luo, X., Brody, R., Seazzu, A., & Burd, S. (2011). Social engineering: The neglected human factor for information security management. Information Resources Management Journal, 24(3), 1-8. https://doi.org/10.4018/irmj.2011070101
National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cybersecurity, Version 1.1. https://doi.org/10.6028/NIST.CSWP.04162018
National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cybersecurity, Version 1.1. https://doi.org/10.6028/NIST.CSWP.04162018
Nurse, J. R. C., Creese, S., & De Roure, D. (2017). Security risk assessment in Internet of Things systems. IT Professional, 19(5), 20-26. https://doi.org/10.1109/MITP.2017.3680959
Oltramari, A., Henshel, D. S., Cains, M., & Hoffman, L. J. (2015). Towards a human factors ontology for cyber security. STIDS, 26-33.
Pfleeger, S. L., Sasse, M. A., & Furnham, A. (2014). From weakest link to security hero: Transforming staff security behavior. Journal of Homeland Security and Emergency Management, 11(4), 489-510. https://doi.org/10.1515/jhsem-2014-0035
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006
SANS Security Insights, SANS Institute, & Petersen, M. (2020). 2020 SANS Cyber Threat Intelligence (CTI) Survey. https://www.sans.org/reading-room/whitepapers/analyst/2020-cyber-threat-intelligence-cti-survey-39395
Schneier, B. (2000). Secrets and lies: Digital security in a networked world. John Wiley & Sons.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225. https://doi.org/10.1016/j.ijinfomgt.2015.11.009
Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race. Nature, 556(7701), 296-298. https://doi.org/10.1038/d41586-018-04602-6
Torten, R., Reaiche, C., & Boyle, S. (2018). The impact of security awareness on information technology professionals' behavior. Computers & Security, 79, 68-79. https://doi.org/10.1016/j.cose.2018.07.012
U.S. Department of Energy. (2014). Cybersecurity Capability Maturity Model (C2M2). https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2
U.S. Department of Energy. (2014). Cybersecurity Capability Maturity Model (C2M2). https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2
U.S. Department of Homeland Security. (2016). National Cyber Incident Response Plan. https://www.us-cert