AUN Digital Repository

Understanding the Defensive Approaches to Organization Cybersecurity Threats in the Fourth Industrial Revolution

Show simple item record

dc.contributor.author Kasim, Maharazu.
dc.contributor.author Utulu, Samuel C. Avemaria.
dc.date.accessioned 2024-09-15T16:57:23Z
dc.date.available 2024-09-15T16:57:23Z
dc.date.issued 2023
dc.identifier.issn 3027-0650
dc.identifier.uri http://hdl.handle.net/123456789/628
dc.description Information and communication technology (ICT) use has grown significantly through time, taking on many different forms that have had a significant influence on both human existence and the environment. The way people connect, participate, and conduct themselves has fundamentally changed as a result of this ubiquitous shift, which has also transformed the way businesses produce goods and services, obtain an edge over competitors, and pursue their strategic objectives. en_US
dc.description.abstract The fourth industrial revolution, with its numerous advantages, has brought up a number of cyber security issues that prevent it from reaching its full potential. The internet lays the groundwork for its expansion of the fourth industrial revolution. In the future, it will be possible for people to control the contents of their refrigerators through their mobile devices. If an unwanted attacker obtains access to these devices, the consequence is dire. As a result, researchers and industry professionals have suggested a number of cybersecurity protection methods. Adopting proactive security measures against cyber-attacks is an important strategy. Organizations are more often using ethical hacking as a preventative strategy to spot vulnerabilities early and keep one step ahead of prospective attackers by applying upgrades and cybersecurity protections as soon as possible. It's important to note that social ethical hacking's significance in identifying delicate actions and activities connected to cybersecurity threats has only been acknowledged in a small number of studies. We did a conceptual review through an extensive literature review of papers in this area. Our study has highlighted the necessity for an integrated framework that incorporates both technical ethical hacking and social ethical hacking methods in order to close this gap. To do this, we created an extensive model that fully explains our idea and provides insightful recommendations for enhancing cybersecurity throughout the fourth industrial revolution. Since the study was not done using empirical data, we suggest that future studies should look into the cybersecurity issues in the fourth industrial by collecting empirical data. en_US
dc.language.iso en en_US
dc.publisher [American University of Nigeria] en_US
dc.relation.ispartofseries American University of Nigeria, 1st International Conference Proceeding;
dc.title Understanding the Defensive Approaches to Organization Cybersecurity Threats in the Fourth Industrial Revolution en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search AUN Digital Repository


Advanced Search

Browse

My Account