A state of the art survey - Impact of cyber attacks on SME's

被引:20
|
作者
Saleem, Jibran [1 ]
Adebisi, Bamidele [2 ]
Ande, Ruth [1 ]
Hammoudeh, Mohammad [3 ]
机构
[1] Cyraatek, Unit 17,Waters Edge Business Pk,Modwen Rd, Salford M5 3EZ, Lancs, England
[2] Manchester Metropolitan Univ, Sch Engn, Manchester, Lancs, England
[3] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester, Lancs, England
基金
“创新英国”项目;
关键词
Cyber Threats; Computer Security; IoT; Privacy; Security Audit; Penetration Testing; Security Analysis;
D O I
10.1145/3102304.3109812
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Corporations and end users are finding it hard to keep their devices safe from the ever evolving and complicated threat of cyber attacks. Currently, with the widespread adoption of the Internet of Things (IoT), cyber threat is becoming an even greater challenge for both technology providers and consumers. This paper presents a review of the recent and significant cyber security issues affecting many areas of digital technology. From IoT devices and smart automobiles to commonly used computers and typical corporate servers, we focus our analysis on current attack trends and the effects of intrusion on Small and Medium sized Enterprises(SMEs). This paper helps to build awareness among non-technical experts, practitioners and researchers about attack and defense strategies in the current digital market. We have created a guide with input from our in-house security researchers and information gathered from the literature to help the reader understand the challenges faced by the IT industry in the future.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Cyber Attacks, Countermeasures, and Protection Schemes- A State of the Art Survey
    Shabut, Antesar M.
    Lwin, K. T.
    Hossain, M. A.
    PROCEEDINGS OF 2016 10TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT & APPLICATIONS (SKIMA), 2016, : 37 - 44
  • [2] Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art
    Aldauiji, Fatimah
    Batarfi, Omar
    Bayousef, Manal
    IEEE ACCESS, 2022, 10 : 61695 - 61706
  • [3] A Survey of the State-of-the-Art Fault Attacks
    Breier, Jakub
    Jap, Dirmanto
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 152 - 155
  • [4] A survey on secure state estimation of cyber-physical systems under cyber attacks
    Yang G.-H.
    Lu A.-Y.
    An L.-W.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (08): : 2093 - 2105
  • [5] Speeding up Planning of Cyber Attacks Using AI Techniques: State of the art
    Grant, Tim
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 235 - 244
  • [6] A survey on various cyber attacks and their classification
    Uma, M.
    Padmavathi, G.
    Uma, M. (uma.phdresearch@gmail.com), 2013, Femto Technique Co., Ltd. (15) : 390 - 396
  • [7] SOVEREIGNTY AND CYBER ATTACKS: TECHNOLOGY'S CHALLENGE TO THE LAW OF STATE RESPONSIBILITY
    Margulies, Peter
    MELBOURNE JOURNAL OF INTERNATIONAL LAW, 2014, 14 (02)
  • [8] Modelling Physical Impact of Cyber Attacks
    Lemay, Antoine
    Fernandez, Jose
    Knight, Scott
    2014 WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS (MSCPES), 2014,
  • [9] Evaluating the Impact of Cyber Attacks on Missions
    Musman, Scott
    Temin, Aaron
    Tanner, Mike
    Fox, Dick
    Pridemore, Brian
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 446 - 456
  • [10] A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities
    Wang, Jingxuan
    Hui, Lucas C. K.
    Yiu, S. M.
    Wang, Eric Ke
    Fang, Junbin
    PERVASIVE AND MOBILE COMPUTING, 2017, 39 : 52 - 64