dc.contributor.author |
Kasim, Maharazu. |
|
dc.contributor.author |
Utulu, Samuel C. Avemaria. |
|
dc.date.accessioned |
2024-09-15T16:57:23Z |
|
dc.date.available |
2024-09-15T16:57:23Z |
|
dc.date.issued |
2023 |
|
dc.identifier.issn |
3027-0650 |
|
dc.identifier.uri |
http://hdl.handle.net/123456789/628 |
|
dc.description |
Information and communication technology (ICT) use has grown significantly through time, taking on many different forms that have had a significant influence on both human existence and the environment. The way people connect, participate, and conduct themselves has fundamentally changed as a result of this ubiquitous shift, which has also transformed the way businesses produce goods and services, obtain an edge over competitors, and pursue their strategic objectives. |
en_US |
dc.description.abstract |
The fourth industrial revolution, with its numerous advantages, has brought up a number of cyber security issues that prevent it from reaching its full potential. The internet lays the groundwork for its expansion of the fourth industrial revolution. In the future, it will be possible for people to control the contents of their refrigerators through their mobile devices. If an unwanted attacker obtains access to these devices, the consequence is dire. As a result, researchers and industry professionals have suggested a number of cybersecurity protection methods. Adopting proactive security measures against cyber-attacks is an important strategy. Organizations are more often using ethical hacking as a preventative strategy to spot vulnerabilities early and keep one step ahead of prospective attackers by applying upgrades and cybersecurity protections as soon as possible. It's important to note that social ethical hacking's significance in identifying delicate actions and activities connected to cybersecurity threats has only been acknowledged in a small number of studies. We did a conceptual review through an extensive literature review of papers in this area. Our study has highlighted the necessity for an integrated framework that incorporates both technical ethical hacking and social ethical hacking methods in order to close this gap. To do this, we created an extensive model that fully explains our idea and provides insightful recommendations for enhancing cybersecurity throughout the fourth industrial revolution. Since the study was not done using empirical data, we suggest that future studies should look into the cybersecurity issues in the fourth industrial by collecting empirical data. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
[American University of Nigeria] |
en_US |
dc.relation.ispartofseries |
American University of Nigeria, 1st International Conference Proceeding; |
|
dc.title |
Understanding the Defensive Approaches to Organization Cybersecurity Threats in the Fourth Industrial Revolution |
en_US |
dc.type |
Article |
en_US |