Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study

被引:0
|
作者
Mamoona Humayun
Mahmood Niazi
NZ Jhanjhi
Mohammad Alshayeb
Sajjad Mahmood
机构
[1] Jouf University,Department of Information systems, College of Computer and Information Sciences
[2] King Fahd University of Petroleum and Minerals (KFUPM),Information and Computer Science Department
[3] Taylor’s University,SoCIT
来源
Arabian Journal for Science and Engineering | 2020年 / 45卷
关键词
Cyber security; Threats; Vulnerabilities; Attack;
D O I
暂无
中图分类号
学科分类号
摘要
There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it.
引用
收藏
页码:3171 / 3189
页数:18
相关论文
共 50 条
  • [1] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Humayun, Mamoona
    Niazi, Mahmood
    Jhanjhi, N. Z.
    Alshayeb, Mohammad
    Mahmood, Sajjad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3171 - 3189
  • [2] Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
    Essa, Areej
    Al-Shoura, Tariq
    Al Nabulsi, Ahmad
    Al-Ali, A. R.
    Aloul, Fadi
    2018 2ND INTERNATIONAL CONFERENCE ON SMART GRID AND SMART CITIES (ICSGSC 2018), 2018, : 62 - 67
  • [3] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)
  • [4] A Systematic Mapping Study on Cyber Security Indicator Data
    Meland, Per Hakon
    Tokas, Shukun
    Erdogan, Gencer
    Bernsmed, Karin
    Omerovic, Aida
    ELECTRONICS, 2021, 10 (09)
  • [5] Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study
    Alanezi, Mohammed Ateeq
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (02): : 153 - 158
  • [6] Internet vulnerabilities and cyber-threats
    Department of Information Technology Management, School of Business, University at Albany, 1400 Washington Avenue, Albany, NY 12222, United States
    不详
    Proc. Annu. Hawaii Int. Conf. Syst. Sci., 2006, (128):
  • [7] Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study
    Rafique, Sajjad
    Humayun, Mamoona
    Hamid, Bushra
    Abbas, Ansar
    Akhtar, Muhammad
    Iqbal, Kamil
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 469 - 474
  • [8] Web API Security Vulnerabilities and Mitigation Mechanisms: A Systematic Mapping Study
    Alejandro Diaz-Rojas, Josue
    Octavio Ocharan-Hernandez, Jorge
    Carlos Perez-Arriaga, Juan
    Limon, Xavier
    2021 9TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION (CONISOFT 2021), 2021, : 207 - 218
  • [9] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [10] A Systematic Mapping on Security Threats in Mobile Devices
    Lacerda, Anselmo
    de Queiroz, Ruy
    Barbosa, Marcio
    2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 286 - 291