Abstract

Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39% of security risks are related to the human factor, and 95% of successful cyber-attacks are caused by human error, with most of them being insider threats. The major human factor issue in cybersecurity is a lack of user awareness of cyber threats. This study focuses on the human factor by surveying the vulnerabilities and reducing the risk by focusing on human nature and reacting to different situations. This study highlighted that most of the participants are not experienced with cybersecurity threats and how to protect their personal information. Moreover, the lack of awareness of the top three vulnerabilities related to the human factor in cybersecurity, such as phishing attacks, passwords, attacks, and social engineering, are major problems that need to be addressed and reduced through proper awareness and training.

Highlights

  • In today’s world, the whole world is highly dependent on technology, leading to an excess of digital data formation

  • The lack of awareness of the top three vulnerabilities related to the human factor in cybersecurity, such as phishing attacks, passwords, attacks, and social engineering, are major problems that need to be addressed and reduced through proper awareness and training

  • The first step in this study focuses on the main human vulnerabilities such as passwords, social engineering, and phishing, and assesses the current environment and controls related to these cybersecurity vulnerabilities by creating a questionnaire

Read more

Summary

Introduction

In today’s world, the whole world is highly dependent on technology, leading to an excess of digital data formation. Cybersecurity consists of an evolving set of devices, risk management technologies, training approaches, and specific measures designed to protect the networks, programs, and data from any unauthorized access [3], with the tremendous development of the internet and its use in the delivery of services by the private sector to improve their services and reach more customers locally, and globally. Cybersecurity is implementing systems or networks and various programs that protect the software and computer system from any digital attacks These attacks aim to access, manipulate, dismantle sensitive information of companies, extort money from various interested parties, or penetrate a company’s work. Traditional security methods and employee training are not enough to protect classified data from sophisticated cyber-attacks based on human vulnerabilities Traditional technologies such as sandboxes, antivirus controls, secure email, and others were designed to fend off attacks that directly target the network.

Related Work
Research Methodology
Awareness Related to Information and Cybersecurity-Related Questions
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call