Object

Title: Actual and future digital threats and their impact on civil and military cybersecurity management

Abstract:

(1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4) What are the ways to detect digital threats? (5) What measures can be taken to prevent and avoid these attacks? (6) What does the cyber security management process consist of? (7) What cybersecurity evidence and trends can be selected? ; document analysis; data selection and assambly; synthesis; conceptualization; interpretation. ; The research results are: a presentation of the hacker community and the main vulnerable industries; a brief definition of the types of digital threats; presentation of various vulnerabilities and damages caused by cyber-attacks; a selection of the ways to detect digital threats; a selection of the main measures to prevent and avoid these attacks; cybersecurity management process and a selection of evidence and trends regarding cyber security. Also, two conceptualizations are proposed: the approach to cyber risk management and 10 basic actions to prevent and avoid cyber risks. ; The current and future situation is not encouraging for the management of organizations in terms of the risks caused by cyber-attacks, which are increasing significantly. The solution to prevent and avoid these threats is for civil and military organizations to implement Cybersecurity risk management.

Date issued:

2022-11-29

Electronic Issue Date:

2023-01-05

Identifier:

oai:ribes-88.man.poznan.pl:2181 ; doi:10.37055/pno/158811 ; oai:editorialsystem.com:article-158811

Electronic ISSN:

2719-6763

Print ISSN:

2450-6869

Publisher ID:

158811

License:

click here to follow the link

Starting page:

60

Ending page:

84

Issue:

15

Journal:

PNO

Keywords:

hackers ; cyber-attacks ; digital threats ; cyber vulnerabilities and damages ; cybersecurity risk management

Object collections:

Last modified:

May 20, 2025

In our library since:

May 20, 2025

Number of object content hits:

0

All available object's versions:

https://ribes-88.man.poznan.pl/publication/2401

Show description in RDF format:

RDF

Show description in OAI-PMH format:

OAI-PMH

×

Citation

Citation style:

This page uses 'cookies'. More information