End Users Security Awareness Campaign from Information Security Threats, Vulnerabilities and Concurrent Cyber-Attacks

Download Article

DOI: 10.21522/TIJAR.2014.04.02.Art020

Authors : Francis Kwesi Aidoo

Abstract:

The intent study of this article is to fortify the protection of sensitive data and information from breach any means necessary from attack either an insider or an outsider in the organizations. In every firm, the core achievement of its information security is to entrust the CIA-Trid; Confidentiality, Integrity and Availability of all of their resources and the liable personnel to disclose confidential information from breach is the end users of the system, having them in their respective field of assignment accordingly. This year 2017, research and analysis information gathered on the incident which took event on May/June ransomware cyber-attacks “WannaCry and Petya” affected many organizations such as companies and government agencies in different countries around the world demanding a ransomware bitcoin $300 method of payment, failure to comply will be subject to accumulate in double every day repeatedly. The breadth of study is to introduce the End User Security Awareness Campaign in the Organizations as a routine practice to stay awake from numerous information security threats, vulnerabilities and concurrent cyber-attacks circulating in different organizations around the global countries. To achieve the objectives, end users will partake in continuous awareness training and assessment through social engineering practices and procedures on how to stay vigilant to prevent every user from such attacks. The organizational IT function will also partake the involvement of hardware and software firewall applications, regular windows updates and patches, consistent antivirus updates, which will restrain the vulnerabilities to risk and any associate attacks to that effect.

Keywords: End user security awareness from information security threats, vulnerabilities and cyber-attacks.

References:

[1]. Adam L. Young, M. Y. (27 June 2017.). The Birth, Neglect, and Explosion of Ransomware. Communications of the ACM, Vol. 60 No. 7, Pages 24-26.

[2]. Anderson, J. M. (2003). Why we need a new definition of information security: Computers & Security. ISBN.

[3]. B., M. E. (2001). Information security is information risk management. ACM.

[4]. Evans, M. (2 July 2017.). Business News: Hospital Is Forced To Scrap Computers. The Wall Street Journal.

[5]. Henley, J., & Solon, O. (27 June 2017). Petya ransomware attack strikes companies across Europe and US. The Guardian.

[6]. Jannsen, C. (9 October 2014). "Security Architecture". Janalta Interactive Inc.

[7]. Kiountouzis, E., & Kokolakis, S. (n.d.). Information systems security facing the information society of the 21st century. London: Chapman & Hall, Ltd. ISBN 0-412-78120-4.

[8]. Perrin, C. (31 May 2012.). "The CIA Triad". ISDN.

[9]. Pipkin, D. (2000). Information security: Protecting the global enterprise. New York: Hewlett-Packard Company.

[10].  Schofield, J. (28 March 2016). How can I remove a ransomware infection. The Guardian.

[11].  Uchill, J. (28 June 2017). Overnight Cybersecurity: New questions about 'ransomware' attack – Tensions between NSA chief, Trump over Russia – Senate panel asks states to publicize election hacks. The hill.

[12].  Young, A. (2006). Cryptoviral Extortion Using Microsoft's Crypto API. International Journal of Information Security. Springer-Verlag.

[13].  Young, A. M. (1996). Threats and Countermeasures. ISBN.

[14].  https://en.wikipedia.org/wiki/Information_security.

[15].  https://en.wikipedia.org/wiki/Computer_security.

[16].  https://en.wikipedia.org/wiki/Network_security.

[17].  https://en.wikipedia.org/wiki/Ransomware.

[18].  https://en.wikipedia.org/wiki/Social_engineering_ (security).