Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Oshodin, O. G (2024).  CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems. PeerJ Computer Science. 12 (5)
Exportar Referência (IEEE)
O. G. Oshodin,  " CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems.", in PeerJ Computer Science, vol. 12, no. 5, 2024
Exportar BibTeX
@article{oshodin2024_1778081819149,
	author = "Oshodin, O. G",
	title = " CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems.",
	journal = "PeerJ Computer Science",
	year = "2024",
	volume = "12",
	number = "5",
	doi = "2320-9186",
	url = "https://www.globalscientificjournal.com"
}
Exportar RIS
TY  - JOUR
TI  -  CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems.
T2  - PeerJ Computer Science
VL  - 12
IS  - 5
AU  - Oshodin, O. G
PY  - 2024
SN  - 2376-5992
DO  - 2320-9186
UR  - https://www.globalscientificjournal.com
AB  - IT security incidents have evolved over the past few decades from isolated information system attacks to deliberate, focused and complex cyber dangers at even national, institutional or individual level. Digital technology's interconnectedness has many advantages, but it also creates a number of new risks that have broad ramifications. Even though the phrases are sometimes used synonymously, information security and cyber security are not the same. The transition from information security to cyber security was covered in this study, primarily as a paradigm shift in the defense against persistent threats. While it was sufficient to undertake basic defense against "common" attacks in the information security era, organizations now need to develop clever, creative, and effective controls to identify and stop sophisticated and emerging cyber-attacks. Cyber security initiatives should now involve the entire organization, including participation from all staff members, rather than just IT departments or designated persons. Cyber security should be strategically connected with corporate strategy, just as digital technologies are. We have carried out preliminary research on the level of maturity of security measures in Nigerian large firms that are associated with vital or significant national infrastructure. We concluded that while basic protection works well, there is still space for improvement when it comes to implementing more sophisticated controls and pursuing a shared goal of comprehensive cyber security governance.
ER  -