Object structure
Title:

Actual and future digital threats and their impact on civil and military cybersecurity management

Creator:

Negulescu Oriana Helena ; Doval Elena ; Stefanescu Ana Roxana

Abstract:

(1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4) What are the ways to detect digital threats? (5) What measures can be taken to prevent and avoid these attacks? (6) What does the cyber security management process consist of? (7) What cybersecurity evidence and trends can be selected? ; document analysis; data selection and assambly; synthesis; conceptualization; interpretation. ; The research results are: a presentation of the hacker community and the main vulnerable industries; a brief definition of the types of digital threats; presentation of various vulnerabilities and damages caused by cyber-attacks; a selection of the ways to detect digital threats; a selection of the main measures to prevent and avoid these attacks; cybersecurity management process and a selection of evidence and trends regarding cyber security. Also, two conceptualizations are proposed: the approach to cyber risk management and 10 basic actions to prevent and avoid cyber risks. ; The current and future situation is not encouraging for the management of organizations in terms of the risks caused by cyber-attacks, which are increasing significantly. The solution to prevent and avoid these threats is for civil and military organizations to implement Cybersecurity risk management.

Date issued:

2022-11-29

Electronic Issue Date:

2023-01-05

Identifier:

doi:10.37055/pno/158811 ; oai:editorialsystem.com:article-158811

Electronic ISSN:

2719-6763

Print ISSN:

2450-6869

Publisher ID:

158811

License:

click here to follow the link

Starting page:

60

Ending page:

84

Issue:

15

Journal:

PNO

Keywords:

hackers ; cyber-attacks ; digital threats ; cyber vulnerabilities and damages ; cybersecurity risk management

×

Citation

Citation style: