Alain Loukaka1
and Shawon S. M. Rahman, Ph.D. 2
1
Ph.D. Candidate,Information Security Assurance,
Capella University, Minneapolis, MN, USA
2Associate Professor, Department of Computer Science
Majmaah University, Majmaah, Kingdom of Saudi Arabia
ABSTRACT
Cybersecurity has become a very hot topic due to high profile breaches that occurred in the past years.
Despite the implementation of current known pre-emptive methods such as intrusion detection systems,
anti-viruses, and the use of firewalls, hackers still find sophisticated means to steal data or impair an
organization by targeting their assets. It is important that security professionals need to “think outside the
box” and use new tools and techniques to mitigate threats beyond current known detections and prevention
technologies. It is imperative that our infrastructure and assets are impermeable from domestic and foreign
attackers. Our best line of defense is the detection of any threats or vulnerability to prevent or minimize
damages of our assets from domestic and foreign attackers.
KEYWORDS
Cybersecurity; Information Security; Intrusion Detection; Information Systems;Vulnerability; Security
Professional; Exploits.
No comments:
Post a Comment