z-logo
open-access-imgOpen Access
Advanced Cyber Exploitation and Mitigation Methodology
Author(s) -
Oghene Augustine Onome
Publication year - 2022
Publication title -
international journal of emerging science and engineering
Language(s) - English
Resource type - Journals
ISSN - 2319-6378
DOI - 10.35940/ijese.c2525.0310422
Subject(s) - computer security , order (exchange) , phishing , cyber threats , business , computer science , emerging technologies , the internet , finance , artificial intelligence , world wide web
The aim of this article looks into the comprehensive methods in re-architecting a security operations centre (SOC) to protect corporate computing frameworks. Through persistent exploitation using advanced technologies, cyber threat infiltration has caused financial losses to enterprises all over the world. No progress has been made yet in terms of technological improvements, particularly in combining cybersecurity equipment. Cybercriminals, on the other hand, are constantly improving their tools and methodologies in order to breach any business. Multiple exploitations through networks, systems, and phishing emails have resulted in incoming dangers, threats, and vulnerabilities in areas such as data privacy and security due to rapid technological advancement. To protect their working environment, several firms in many sectors have resorted outmoded technologies which are ineffective in the face of advanced persistent threats (APT). Cybersecurity actors are well-equipped groups with extensive knowledge that can infiltrate even the most secure of organizations. Cyber security is seen as a major issue around the world. As a result, dedicated cyber security researchers are analysing both existing dangers and emerging threat approach patterns in order to develop a technique that can be integrated with cybersecurity management.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here