Please enable JavaScript.
Coggle requires JavaScript to display documents.
Post-Sim Registration: Emerging Cybersecurity Challenges and Protection…
Post-Sim Registration: Emerging Cybersecurity Challenges and Protection Measures
Cybersecurity
Cyberattack detection model using community detection and text analysis on social media
Detention of cyberattacks on social media
Research Problem
Textual similarity analysis was used to identify cyberattack-related tweets, even when not explicitly stated in abstracts. This method, leveraging advanced linguistic models, detected implicit references, enhancing accuracy and providing a more comprehensive understanding of the online discourse on cyberattacks.
Objective(s) / Research Question(s) / Hypotheses
Park, J. H., & Kwon, H. Y. (2022, December 1). Cyberattack detection model using community detection and text analysis on social media. ICT Express.
https://doi.org/10.1016/j.icte.2021.12.003
End-of-Text Citation
(APA 7th Edition)
Cyber Attack As A National Security Threat: South Asian Perspective.
The evolving landscape of national security has witnessed the emergence of "cyber attacks" as a significant factor, posing threats to countries' interests. The increasing reliance on cyber infrastructure across various sectors exposes nations to new vulnerabilities in terms of national security.
Research Problem
To examine the nature of cyber attacks between India, Pakistan, and Bangladesh and demonstrate their impact on national security.
Objective(s) / Research Question(s) / Hypotheses
Ullah, R. (2016, October 5). CYBER ATTACK AS A NATIONAL SECURITY THREAT: SOUTH ASIAN PERSPECTIVE.
https://www.euroasiajournal.com/index.php/eurssh/article/view/162
End-of-Text Citation
(APA 7th Edition)
Botching Human Factors in Cybersecurity in Business Organizations
Despite the increasing number of cyberattacks, data breaches, and ransomware incidents, the role of human-enabled errors in these incidents is not sufficiently addressed. The lack of consideration and understanding of human factors in information security.
Research Problem
The research objective of this paper is to highlight the complexity of managing human factors in information security.
Objective(s) / Research Question(s) / Hypotheses
Nobles, C. (2018). Botching Human Factors in Cybersecurity in Business Organizations. DOAJ (DOAJ: Directory of Open Access Journals), 9(3), 71–88.
https://doi.org/10.2478/hjbpa-2018-0024
End-of-Text Citation
(APA 7th Edition)
Data Analysis of Cybercrimes in Businesses
Balan et al, (2017). Data Analysis of Cybercrimes in Businesses.
https://itms-journals.rtu.lv/article/viewFile/itms-2017-0011/2799
End-of-Text Citation
(APA 7th Edition)
Unethical conduct has been brought about by the internet. "The exploitation of cyberspace for the purpose of" is the definition of cyberattack, for the aim of gaining access to private or protected data,data theft, network disablement, and spying financial resources”. Attacks of this nature have only becoming more frequent during the last several years. Insufficient information exists about these assaults that turn several people and organizations into
sensitive to them.
Research Problem
The aim of this study is to examine cyberattacks in order to raise awareness of the different kinds of cyber events in order to start the proper defense mechanisms organizations in defense of these assaults.
Objective(s) / Research Question(s) / Hypotheses
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
A significant portion of the economy of many nations are made up of small-to-medium-sized enterprises (SMBs). However, SMBs are not adopting cyber security effectively enough, leaving them vulnerable to cyberattacks.
Research Problem
In this study, recent research on SMB cyber security is reviewed, with an emphasis on how well it aligns with the widely used NIST Cyber Security Framework (CSF). The literature is also used to summarize the main obstacles SMBs encounter when putting excellent cyber security into practice, and it ends with important suggestions.
Objective(s) / Research Question(s) / Hypotheses
Chidukwani, A., Zander, S., & Koutsakis, P. (2022, August 10). A survey on the cyber security of small-to-medium businesses ...
https://www.researchgate.net/publication/362628150_A_Survey_on_the_Cyber_Security_of_Small-to-Medium_Businesses_Challenges_Research_Focus_and_Recommendations
End-of-Text Citation
(APA 7th Edition)
Economic and National Security Effects of Cyber Attacks
Against Small Business Communities
Research aims to illustrate that cyberattacks on vulnerable small to medium-sized businesses pose significant national security and economic threats to the U.S. by targeting critical infrastructure and the economy. Small businesses, integral to sectors like power generation and defense, are persistently at risk, providing cybercriminals a cost-effective and low-risk environment. The study highlights how attacks on these businesses support adversaries' operations and can potentially compromise the supply chains of critical infrastructure sectors indirectly.
Research Problem
Gordon, M.(2018). ECONOMIC AND NATIONAL SECURITY EFFECTS OF CYBER ATTACKS AGAINST SMALL BUSINESS COMMUNITIES.
https://www.proquest.com/openview/31721111391a67b024436603b525a79b/1?pq-origsite=gscholar&cbl=18750
End-of-Text Citation
(APA 7th Edition)
This research seeks to evaluate the economic impact of cyberattacks on small to medium-sized businesses (SMBs), estimating costs at local and national levels. It also aims to understand the financial value cyberattacks provide to criminal organizations and how stolen SMB data is used in adversarial attacks on critical infrastructure and high-value targets.
Objective(s) / Research Question(s) / Hypotheses
Smart Devices Threats, Vulnerabilities and Malware Detection Approaches
Different malicious applications are created by malware authors with the chances to attack the rising number of users
Research Problem
The security objectives, like confidentiality and integrity will suffer in most of the situations in which the data is not secured and their data is accessible and modifiable. Since when mobile devices are taken over by hackers, the availability functionality is also compromised. These assailants did not only read the data on the memory card, but additionally attempts to
use these cards to distribute malware, like WinCE. A malware found in Windows Mobile devices
Objective(s) / Research Question(s) / Hypotheses
BalaGanesh, D., Chakrabarti, A., & Midhunchakkaravarthy, D. (2018). Smart devices threats, vulnerabilities and malware detection approaches: a survey. European Journal of Engineering and Technology Research, 3(2), 7-12.
End-of-Text Citation
(APA 7th Edition)
SIM CARD
A Study of the Emerging Trends in SIM Swapping Crime and Effective Countermeasures
SIM swapping, a rising criminal trend, involves seizing control of mobile subscriptions to access sensitive data. The COVID-19 era has seen a surge in such crimes. This study analyzes global cases, categorizes methods, and suggests preventative measures. SIM swapping comprises personal data theft, fraudulent SIM duplication, and exploiting fraudulently obtained mobile service.
Research Problem
The objective of the study is to examine the emerging trends in SIM swapping crime and propose effective countermeasures.The research aims to categorize SIM swapping cases based on their specific modi operandi and analyze the initial responses of national authorities to this emerging crime.The study seeks to identify the three main steps involved in SIM swapping crime: personal data theft, fraudulent copying of SIM cards, and exploitation of falsely-obtained mobile service for perpetration.
Objective(s) / Research Question(s) / Hypotheses
Myounghoon et al, (2022). A Study of the Emerging Trends in SIM Swapping Crime and Effective Countermeasures.
https://ieeexplore.ieee.org/abstract/document/9900510/metrics#metrics
End-of-Text Citation
(APA 7th Edition)
SIM Swapping Attacks for Digital Identity Theft: A threat to financial services and beyond
Hallman, Roger (2019) SIM Swapping Attacks for Digital Identity Theft: A threat to financial services and beyond
https://www.researchgate.net/publication/376612643_SIM_Swapping_Attacks_for_Digital_Identity_Theft_A_threat_to_financial_services_and_beyond
Cybercriminals have found their target with the increased use of cellphones and reliance on money apps. Sim Swap attacks occur when criminals duplicate a person's sim card, causing significant financial losses.
Research Problem
This paper will take a close look at SIM Swap attacks, specifically how they are linked to money theft using financial and cryptocurrency methods. It also investigates the potential risks of people using their own devices for work . Furthermore, the paper investigates how people are currently attempting to stop SIM Swap attacks.
Threats and Protection on E-sim: A Prospective Study
Mathew, A. (2022). Threats and Protection on E-SIM: A prospective study.
https://stm.bookpi.org/NPER-V8/article/view/6112
End-of-Text Citation
(APA 7th Edition)
The paper focuses on identifying the various risks and threats associated with e-SIM, such as SIM-jacking, personal data leakage, false information provision, identity fraud, and device poisoning.
Research Problem
The study emphasizes the need for advanced threat detection and prediction systems to enhance security measures for e-SIM technology. It suggests that service providers should strengthen their security measures, educate subscribers about potential scams, and regularly assess and enhance their security protocols to prevent information theft and fraud.
Objective(s) / Research Question(s) / Hypotheses
A Fraud Preventation and Secure Cognitive SIM Card Registration Model
"Boateng et al (2022) A Fraud Prevention and Secure Cognitive SIM Card Registration Model
https://sciresol.s3.us-east-2.amazonaws.com/IJST/Articles/2022/Issue-46/IJST-2021-1658.pdf
"
End-of-Text Citation
(APA 7th Edition)
The country's current way of registering SIM cards has problems with different types of SIMs and too many registrations. A suggested research problem is creating a single, central system for SIM registration to solve these issues. This new system wants to register all SIM cards from major telecom companies in Nigeria, making things stable and flexible with just one platform.
Research Problem
to know the existing SIM Registration weakness after the registration process, investigates how fraudsters take advantage of these gaps and proposes an automated theoretical model to improve the security of SIM registration.
Objective(s) / Research Question(s) / Hypotheses
User Experiences with Third-Party SIM Card and ID Registrations in Kenya and Tanzania
Typically, this process requires presenting personal identification documents in order to confirm the SIM card owner's identity. Although the goal of these legislation is to improve national security and lessen crimes like fraud and terrorism, users are worried about their privacy, security, and convenience because of the introduction of third-party registrations.
Research Problem
Luhanga, E., Sowon, K., Cranor, L. F., Fanti, G., Tucker, C., & Gueye, A. (2023). User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania. ArXiv.org.
https://arxiv.org/abs/2311.00830
End-of-Text Citation
(APA 7th Edition)
The SIM card regestration have mostly focused on the pros and downsides for both MNOs and mobile Several Users have complained on the privacy and security effect
Objective(s) / Research Question(s) / Hypotheses
80% of Filipinos believe SIM registration will reduce PH cybercrime
80% of Filipinos believe SIM registration will reduce PH cybercrime – survey. (2023, January 27). Manila Bulletin.
https://mb.com.ph/2023/01/27/80-of-filipinos-believe-sim-registration-will-reduce-ph-cybercrime-survey/?fbclid=IwAR2EtuLuBcSpdrOacWtK55nON-7muLLHIkndlopSvK_qzlevyTmj98J-AWQ
End-of-Text Citation
(APA 7th Edition)
By connecting certain mobile numbers to specific persons, SIM registration aims to help law enforcement authorities investigate and punish cybercriminals more successfully. It is hypothesised that the implementation of SIM registration in the Philippines will result in a decrease in cybercrime.To what extent do Filipinos believe that SIM card registration can effectively reduce cybercrime in the Philippines?
Objective(s) / Research Question(s) / Hypotheses
The research problem which this study addressed was the limited ability of small businesses to mitigate cyber threats, which leads to significant losses from cyber-attacks or data breaches.
Research Problem
Criminal Liability Of Misuse Personal Identiity Number For Cellphone Cards Registration Illegaly
Aziz U,K & Hidayat, N,Z (2022) Criminal Liability Of Misuse Personal Identity Number of Cellphone Card Registration Illegaly
https://e-journal.fh.unmul.ac.id/index.php/mulrev/article/view/790
End-of-Text Citation
(APA 7th Edition)
Misuse of somene else's ID card in registrating phone SIM cards resulting to illegal sales and ethical challenges
Research Problem
To demonstrate that registering a cellphone SIM card using an individual's Personal Identity Number and Family Identity Number without permission is a crime. To investigate the legal implications of using someone else's Personal Identity Number and Family Identity Number to register SIM cards
Objective(s) / Research Question(s) / Hypotheses
Security system of Internet of Things based on Subscriber
Identity Module (SIM)
Qiaoming, R., Zuhui , Y., & Zheng , L. (2021). Security system of internet of things based on Subscriber Identity Module.
https://www.researchgate.net/publication/363351078_Security_system_of_Internet_of_Things_based_on_Subscriber_Identity_Module
End-of-Text Citation
(APA 7th Edition)
The Internet of Things (IoT) has several security risks, and the security solutions available today are unable to offer both high-security levels and cost-effectiveness.
Research Problem
This paper describes the structure of the Internet of Things security service, which is based on the Subscriber Identity Module (SIM) card. It also covers the main technologies of the service, such as secure data transfer, local secure storage, and bi-directional authentication.
Objective(s) / Research Question(s) / Hypotheses
Preventive Strategies
Successful Operational Cyber
Security Strategies for Small Businesses
Barosy, Wileen. (2019). Successful Operational Cyber Security Strategies
for Small Businesses.
https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=8248&context=dissertations
"
End-of-Text Citation
(APA 7th Edition)
The overarching research question for this study was: What strategies do CISOs
of high-technology companies use to protect their businesses from cyberattacks?
Objective(s) / Research Question(s) / Hypotheses
Cyberattacks are a major concern for businesses, jeopardizing their operations and customer trust. Organizational leaders face the challenge of protecting data without sufficient resources, while CISOs in high-tech firms lack effective strategies to combat these threats.
Research Problem
Cybersecurity Readiness and
Resilience in Small Businesses
The research problem which this study addressed was the limited ability of small businesses to mitigate cyber threats, which leads to significant losses from cyber-attacks or data breaches.
Research Problem
Darrell Eilts. 2020. An Empirical Assessment of Cybersecurity Readiness and Resilience in Small Businesses. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, College of Computing and Engineering. (1106)
https://nsuworks.nova.edu/gscis_etd/
End-of-Text Citation
(APA 7th Edition)
What cybersecurity preparedness activities may be used to develop a small business cybersecurity preparedness-risk taxonomy (CyPRisT) to assess small businesses’ cybersecurity postures (readiness & resilience) empirically, then benchmark for a cybersecurity strategy planning program to improve risk management in small businesses?
Objective(s) / Research Question(s) / Hypotheses
Effective Cyber Security
Strategies for Small Businesses
Cook, Kimberly Diane. (2017). Effective Cyber Security Strategies for Small Businesses.
https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?referer&httpsredir=1&article=4974&context=dissertations&fbclid=IwAR1j8JjFpoFqflQIHkejZxq65VqJ2UzflbIjlqVt25nTuML-iqwUiDJ-g5o
."
End-of-Text Citation
(APA 7th Edition)
" What effective strategies do
SME owners use to protect their businesses from cyber attacks?"
Objective(s) / Research Question(s) / Hypotheses
The increasing frequency of cyber attacks targeting individuals, businesses, and governments. It cites various sources indicating significant financial losses due to cybercrime, with SMEs being particularly vulnerable. Despite this, many SME owners underestimate the risk and fail to implement sufficient cybersecurity measures, posing a specific challenge in combating cyber threats.
Research Problem
Managerial Strategies Small Businesses
Use to Prevent Cybercrime
Small manufacturing businesses face a significant problem as they lack adequate measures to prevent cybercrime, leading to financial losses and compromised data. Specifically, some business owners lack effective strategies to protect their financial assets, data, and intellectual property from cyber threats. This highlights the urgent need for tailored solutions to enhance cybersecurity in these businesses.
Research Problem
Maahs, D. (n.d.). ScholarWorks Managerial Strategies Small Businesses Use to Prevent Cybercrime Part of the Business Administration, Management, and Operations Commons, Management Sciences and Quantitative Methods Commons, and the Other Communication Commons. Retrieved February 3, 2024, from
https://core.ac.uk/download/pdf/217231254.pdf
End-of-Text Citation
(APA 7th Edition)
The objective of this study is to investigate how small manufacturing business owners in the midwestern U.S. protect their finances, data, and intellectual property from cybercrime.
Objective(s) / Research Question(s) / Hypotheses
Effective Cyber Security Strategies for Small
Businesses
What effective strategies do
SME owners use to protect their businesses from cyber attacks?
Objective(s) / Research Question(s) / Hypotheses
Cook, Kimberly Diane. (2017). Effective Cyber Security Strategies for Small
Businesses.
https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?referer&httpsredir=1&article=4974&context=dissertations&fbclid=IwAR1j8JjFpoFqflQIHkejZxq65VqJ2UzflbIjlqVt25nTuML-iqwUiDJ-g5o
.
End-of-Text Citation
(APA 7th Edition)
The increasing frequency of cyber attacks targeting individuals, businesses, and governments. It cites various sources indicating significant financial losses due to cybercrime, with SMEs being particularly vulnerable. Despite this, many SME owners underestimate the risk and fail to implement sufficient cybersecurity measures, posing a specific challenge in combating cyber threats.
Research Problem
End-of-Text Citation
(APA 7th Edition)
Objective(s) / Research Question(s) / Hypotheses