• editor.aipublications@gmail.com
  • Track Your Paper
  • Contact Us
  • ISSN: 2456-2319

International Journal Of Electrical, Electronics And Computers(IJEEC)

Cultivating Proactive Cybersecurity Culture among IT Professional to Combat Evolving Threats

Dr Sivaraju Kuraku , Dinesh Kalla , Fnu Samaah , Nathan Smith


International Journal of Electrical, Electronics and Computers (IJECC), Vol-8,Issue-6, November - December 2023, Pages 1-7, 10.22161/eec.86.1

Download | Downloads : 2 | Total View : 419

Article Info: Received: 18 Oct 2023; Accepted: 20 Nov 2023; Date of Publication: 02 Dec 2023

Share

In the current digital landscape, cybercriminals continually evolve their techniques to execute successful attacks on businesses, thus posing a great challenge to information technology (IT) professionals. While traditional cybersecurity approaches like layered defense and reactive security have helped IT professionals cope with traditional threats, they are ineffective in dealing with evolving cyberattacks. This paper focuses on the need for a proactive cybersecurity culture among IT professionals to enable them combat evolving threats. The paper emphasis that building a proactive security approach and culture can help among IT professionals anticipate, identify, and mitigate latent threats prior to them exploiting existing vulnerabilities. This paper also points out that as IT professionals use reactive security when dealing with traditional attacks, they can use it collaboratively with proactive security to effectively protect their networks, data, and systems and avoid heavy costs of dealing with cyberattack’s aftermaths and business recovery.

Digital landscape, cybercriminals, information technology (IT) professionals, cybersecurity, layered defense, reactive security, traditional threats, cyberattacks, proactive cybersecurity culture, reactive security, and proactive security.

[1] Sharif, M. H. U., & Mohammed, M. A. (2022). A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews, 15(1), 138-156. https://doi.org/10.30574/wjarr.2022.15.1.0573
[2] Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., & Zhang, J. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new
perspectives. IEEE Communications Surveys & Tutorials,1-1. https://doi.org/10.1109/comst.2023.3273282
[3] Dhayanidhi, G. (2022). Research on IoT Threats & Implementation of AI/ML to Address Emerging Cybersecurity Issues in IoT with Cloud Computing. file:///C:/Users/user/Downloads/1b076ecd-286f-4020-b1da-490b6f088036.pdf
[4] Kalla, D., Samaah, F., Kuraku, S. & Smith, N. Phishing Detection Implementation Using Databricks and Artificial Intelligence. SSRN Electronic Journal 185, doi: 10.2139/ssrn.4452780 (2023).
[5] Bhuyan, S. S., Kabir, U. Y., Escareno, J. M., Ector, K., Palakodeti, S., Wyant, D., Kumar, S., Levy, M., Kedia, S., Dasgupta, D., & Dobalian, A. (2020). Transforming healthcare cybersecurity from reactive to proactive: Current status and future recommendations. Journal of Medical Systems, 44(5). https://doi.org/10.1007/s10916-019-1507-y
[6] Xu, S. (2020). The cybersecurity dynamics way of thinking and landscape. Proceedings of the 7th ACM Workshop on Moving Target Defense. https://doi.org/10.1145/3411496.3421225
[7] Kuraku, S., & Kalla, D. (2023). Impact of phishing on users with different online browsing hours and spending habits. International Journal of Advanced Research in Computer and Communication Engineering, 12(10), 34–41. https://doi.org/10.17148/IJARCCE.2023.121005
[8] Lee, C., & Ahmed, G. (2021). Improving IoT privacy, data protection and security concerns. International Journal of Technology, Innovation and Management
(IJTIM), 1(1),18-33. https://doi.org/10.54489/ijtim.v1i1.12
[9] Benz, M., & Chatterjee, D. (2020). Calculated risk? A cybersecurity evaluation tool for SMEs. Business Horizons, 63(4), 531-540. https://doi.org/10.1016/j.bushor.2020.03.010
[10] Selvan, C. A. J. A., & Fonceca, C. M. (2023). Cyber security culture in an IT company: An empirical study. https://www.researchgate.net/profile/Clayton- Fonceca/publication/370059163_Cyber_security_culture_in_an_IT_company_An_empirical_study/links/643cc5df2eca706c8b64b5a6/Cyber-security-culture-in-an-IT-company- An-empirical-study.pdf
[11] Branley-Bell, D., Coventry, L., & Sillence, E. (2021). Promoting cybersecurity culture change in
healthcare. The 14th PErvasive Technologies Related to Assistive Environments Conference. https://doi.org/10.1145/3453892.3461622
[12] Kuraku, S., and Kalla, D. (2020). Emotet Malware—A Banking Credentials Stealer. Iosr
J. Comput. Eng, 22, 31-41. https://doi.org/10.9790/0661-2204023140
[13] McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017).Individual Differences and Information Security Awareness. Computers in HumanBehavior, 69, 151-156.
(PDF) A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Available from: https://www.researchgate.net/publication/321349520_A_Reliable_Measure_of_Information_Security_Awareness_and_the_Identification_of_Bias_in_Responses [accessed Nov 17 2023].
[14] Corradini, I. (2020). Building a cybersecurity culture. Studies in Systems, Decision and Control, 63-86. https://doi.org/10.1007/978-3-030-43999-6_4