Abstract

Objectives(1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4) What are the ways to detect digital threats? (5) What measures can be taken to prevent and avoid these attacks? (6) What does the cyber security management process consist of? (7) What cybersecurity evidence and trends can be selected?Methodsdocument analysis; data selection and assambly; synthesis; conceptualization; interpretation.ResultsThe research results are: a presentation of the hacker community and the main vulnerable industries; a brief definition of the types of digital threats; presentation of various vulnerabilities and damages caused by cyber-attacks; a selection of the ways to detect digital threats; a selection of the main measures to prevent and avoid these attacks; cybersecurity management process and a selection of evidence and trends regarding cyber security. Also, two conceptualizations are proposed: the approach to cyber risk management and 10 basic actions to prevent and avoid cyber risks.ConclusionsThe current and future situation is not encouraging for the management of organizations in terms of the risks caused by cyber-attacks, which are increasing significantly. The solution to prevent and avoid these threats is for civil and military organizations to implement Cybersecurity risk management.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.