Open Access
Subscription Access
Network Security Awareness and Prevention of Cyberattacks
This paper tries to give a general overview of network security awareness and avoidance of cyber-attacks. This paper covered the many types of cyberattacks, current developments in cyberattacks, prevention tips, and the awareness of cyberattacks among students. We will first discuss the many forms of cyberattacks, the current trend, the effects of cyberattacks, and protection. The method involved contrasting and examining the findings of 15+ separate articles. The survey's findings would show the conclusions drawn from an analysis of the information gathered from respondents who answered a questionnaire after seeing a movie about cyberattack awareness to raise students’ understanding of such attacks. Depending on the results of this survey, we will have a better understanding of the familiarity and awareness of current students with cyber-attacks, enabling us to enhance kids' knowledge of online dangers and the value of cyber security.
Keywords
Awareness, Cyber Security, Cyber-Attack, Internet, Network Security, Prevention.
User
Font Size
Information
- M. Zwilling, G. Klien, D. Lesjak, L. Wiechetek, F. Cetin, and H. N. Basım, “Cyber security awareness, knowledge and behaviour: A comparative study,” Journal of Computer Information Systems, vol. 62, no. 1, pp. 82-97, 2020, doi:10.1080/08874417.2020.1712269.
- H. Teymourlouei, “Quick reference: Cyber-attacks awareness and prevention method for home users,” World Academy of Science, Engineering and Technology International Journal of Computer and Systems Engineering, vol. 9, no. 3, pp. 678-684, 2015, Digital Object Identifier: 10.5281/zenodo.1338144.
- A. Garba, M. B. Sirat, S. Hajar, and I. B. Dauda, “Cyber security awareness among University students: A case study,” Science Proceedings Series, vol. 2, no. 1, pp. 82-86, 2020, Digital Object Identifier: 10.31580/SPS. v2i1.1320.
- J. Müller, “Malaysia: Internet penetration rate,” Statista, 11-Aug-2021. [Online]. Available: https://www.statista.com/statistics/975058/internet-penetration-rate-in-malaysia/ (Accessed: 16-Feb-2022).
- M. D. Elradi, A. A. A. Altigani, and O. I. Abaker, “Cyber security awareness among students and faculty members in a Sudanese college,” Electrical Science & Engineering, vol. 2, no. 2, pp. 24- 28, 2020 Digital Object Identifier: 10.30564/ v2i2.2477.
- N. A. Khan, S. N. Brohiand, N. Zaman, “Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic,” TechRxiv,12-May-2020, doi:10.36227/v. 12278792.v1.
- J. Chigada and R. Madzinga, “Cyberattacks and threats during COVID-19: A systematic literature review,” South African Journal of Information Management, vol. 23, no. 1, pp. 1-11, 2021, Digital Object Identifier: 10.4102/sajim. v23i1.1277.
- L. Tawalbeh, F. Muheidat, M. Tawalbeh, M. Quwaider, and G. Saldamli, "Predicting and preventing cyber-attacks during COVID-19 time using data analysis and proposed secure IoT layered model," 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA), 2020, pp. 113-118, Digital Object Identifier: 10.1109/MCNA50957.2020.9264301.
- S. S. Tirumala, A. Sarrafzadeh, and P. Pang, "A survey on internet usage and cybersecurity awareness in students," 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, pp. 223-228, Digital Object Identifier: 10.1109/PST.2016.7906931.
- R. A. Ramadan, B. W. Aboshosha, J. S. Alshudukhi, A. J. Alzahrani, A. El-Sayed, and M. M. Dessouky, “Cybersecurity and countermeasures at the time of the pandemic,” Journal of Advanced Transportation, vol. 2021, pp. 1–19, 2021, Digital Object Identifier: 10.1155/2021/6627264.
- S. Kok, A. Abdullah, N. Jhanjhi, and M. Supramaniam, “Ransomware, threat and detection techniques: A review,” IJCSNS International Journal of Computer Science and Network Security, vol. 19, no. 2, pp. 136-146, 2019.
- M. Kravchik and A. Shabtai, “Detecting cyber-attacks in industrial control systems using convolutional neural networks,” in Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy - CPS-SPC ’18, 2018, pp. 72-83, Digital Object Identifier: 10.1145/3264888.3264896.
- A. Bendovschi, “Cyber-attacks – trends, patterns and security countermeasures,” Procedia Economics and Finance, vol. 28, pp. 24–31, 2015, Digital Object Identifier: 10.1016/S2212-5671(15)01077-1.
- R. Renu and P. Pawan, “Impact of cyber-crime: Issues and challenges,” International Journal of Trend in Scientific Research and Development, vol. 3, no. 3, pp. 1569–1572, 2019, Digital Object Identifier: 10.31142/ijtsrd23456.
- M. Bada and J. R. C. Nurse, “Chapter 4 - The social and psychological impact of cyberattacks,” in Emerging Cyber Threats and Cognitive Vulnerabilities, Elsevier, 2020, pp. 73–92.
- S. Kamiya, J.-K. Kang, J. Kim, A. Milidonis, and R. M. Stulz, “Risk management, firm reputation, and the impact of successful cyberattacks on target firms,” Journal of Financial Economics, vol. 139, no. 3, pp. 719–749, 2021, Digital Object Identifier: 10.1016/j.jfineco.2019.05.019.
- A. Chowdhury, “Recent cyber security attacks and their mitigation approaches – an overview,” in Applications and Techniques in Information Security, Singapore: Springer Singapore, 2016, pp. 54–65, Digital Object Identifier: 10.1007/978-981-10- 2741-3_5.
- P. G Shah, “Detection and prevention of system against cyber-attacks,” International Journal for Scientific Research and Development, vol. 5, no. 9, pp. 576-578, 2017.
- V. Farhat, B. McCarthy, R. Raysman, J. Canale, Holland, and K. LLP, “Cyber Attacks: Prevention and Proactive Responses,” in Practical Law Company, 2017, pp. 1-12. [Online]. Available: https://articles.jmbm.com/files/2017/05/Farhat.Article.CyberAttacks.pdf
- G. A. Abdalrahman and H. Varol, "Defending against cyber-attacks on the Internet of things," 2019 7th International Symposium on Digital Forensics and Security (ISDFS), 2019, pp. 1-6, Digital Object Identifier: 10.1109/ISDFS.2019.8757478.
- Y. K. Peker, L. Ray, S. D. Silva, N. Gibson, and C. Lamberson, “Raising cybersecurity awareness among college students,” Journal of The Colloquium for Information System Security Education (CISSE), vol. 4, no. 1, pp. 1-17, 2016.
Abstract Views: 203
PDF Views: 0