Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3102304.3109812acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A state of the art survey - Impact of cyber attacks on SME's

Published: 19 July 2017 Publication History

Abstract

Corporations and end users are finding it hard to keep their devices safe from the ever evolving and complicated threat of cyber attacks. Currently, with the widespread adoption of the Internet of Things (IoT), cyber threat is becoming an even greater challenge for both technology providers and consumers. This paper presents a review of the recent and significant cyber security issues affecting many areas of digital technology. From IoT devices and smart automobiles to commonly used computers and typical corporate servers, we focus our analysis on current attack trends and the effects of intrusion on Small and Medium sized Enterprises(SMEs). This paper helps to build awareness among non-technical experts, practitioners and researchers about attack and defense strategies in the current digital market. We have created a guide with input from our in-house security researchers and information gathered from the literature to help the reader understand the challenges faced by the IT industry in the future.

References

[1]
Allianz. 2016. Two thirds of large UK businesses hit by cyber breach or attack in past year. http://www.agcs.allianz.com/global-offices/united-kingdom/news-press-uk/allianz-risk-barometer-2016-press-uk/. (2016). {Online; accessed 8-June-2017}.
[2]
Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, and Xiuzhen Cheng. 2017. Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Computing 21, 2 (2017), 34-42.
[3]
Kevin Ashton. 2009. That 'internet of things' thing. RFiD Journal 22, 7 (2009), 97-114.
[4]
Andrew Carlin, Mohammad Hammoudeh, and Omar Aldabbas. 2015. Defence for Distributed Denial of Service Attacks in Cloud Computing. Procedia Computer Science 73 (2015), 490-497.
[5]
Andrew Carlin, Mohammad Hammoudeh, and Omar Aldabbas. 2015. Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. International Journal of Advanced Computer Science and Applications 6, 6 (2015).
[6]
Abdullahi Chowdhury. 2017. Cyber attacks in mechatronics systems based on Internet of Things. In Mechatronics (ICM), 2017 IEEE International Conference on. IEEE, 476-481. {Online; accessed 8-June-2017}.
[7]
Louis Columbus. 2015. Roundup Of Internet of Things Forecasts And Market Estimates, 2015. =https://goo.gl/I90ewy. (2015). {Online; accessed 8-June-2017}.
[8]
Dell. 2016. Dell Security Annual Threat Report 2016. =http://www.netthreat.co.uk/assets/assets/dell-security-annual-threat-report-2016-white-paper-197571.pdf,. (2016). {Online; accessed 8-June-2017}.
[9]
FBI. 2016. Public Service Announcement. =https://www.ic3.gov/media/2016/160317.aspx,. (2016). {Online; accessed 8-June-2017}.
[10]
FDA. 2016. Cybersecurity Vulnerabilities Identified in St. Jude Medical's Implantable Cardiac Devices and Merlin. =https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm535843.htm. (2016). {Online; accessed 8-June-2017}.
[11]
FireEye. 2017. M-Trends 2017 Cyber Security Trends. =https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html,. (2017). {Online; accessed 8-June-2017}.
[12]
Gartner. 2016. Gartner Says Organizations Must Update Their Network Access Policy to Address Attack of IoT Devices. =http://www.gartner.com/newsroom/id/3436717. (2016). {Online; accessed 8-June-2017}.
[13]
Ibrahim Ghafir, Vaclav Prenosil, Ahmad Alhejailan, and Mohammad Hammoudeh. 2016. Social engineering attack strategies and defence approaches. In Future Internet of Things and Cloud (FiCloud), 2016 IEEE 4th International Conference on. IEEE, 145-149.
[14]
Ibrahim Ghafir, Vaclav Prenosil, and Mohammad Hammoudeh. 2016. Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution. (2016).
[15]
Gov.co.uk. 2016. Two thirds of large UK businesses hit by cyber breach or attack in past year. =https://www.gov.uk/government/news/two-thirds-of-large-ukbusinesses-hit-by-cyber-breach-or-attack-in-past-year. (2016). {Online; accessed 8-June-2017}.
[16]
McAfee. 2014. Estimating the global cost of cybercrime. https://www.mcafee.com/de/resources/reports/rp-economic-impact-cybercrime2.pdf. (2014). {Online; accessed 19-July-2017}.
[17]
Navigant. 2014. Cyber Security Trends for 2014. =http://www.navigant.com/insights/hot-topics/technology-solutions-expertscorner/ cyber-security- trends-2014-part-1/,. (2014). {Online; accessed 8-June-2017}.
[18]
Infosecurity Magazine Phil Muncaster UK / EMEA News Reporter. 2015. Hackers Spend Over 200 Days Inside Systems Before Discovery. =https://www.infosecurity-magazine.com/news/hackers-spend-over-200-daysinside/,. (2015). {Online; accessed 8-June-2017}.
[19]
Naked Security. 2016. Mirai, Mirai, on the wall – through the looking glass of the attack on Dyn. =https://nakedsecurity.sophos.com/2016/10/24/mirai-miraion-the-wall-through-the-looking-glass-of-the-attack-on- dyn/. (2016). {Online; accessed 8-June-2017}.
[20]
Financial Times. 2016. Connected devices create millions of cyber security weak spots. =https://www.ft.com/content/a63b2de8-992c-11e6-8f9b-70e3cabccfae. (2016). {Online; accessed 8-June-2017}.
[21]
Cybersecurity Ventures. 2016. Hackerpocalypse Cybercrime Report. =http://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/. (2016). {Online; accessed 8-June-2017}.
[22]
Wikipedia. 2017. Vault 7: CIA Hacking Tools Revealed. =https://wikileaks.org/ciav7p1/index.html,. (2017). {Online; accessed 8-June-2017}.

Cited By

View all
  • (2024)Artificial Intelligence Applications in the Context of the Security Framework for the Logistics IndustryAdvances in Explainable AI Applications for Smart Cities10.4018/978-1-6684-6361-1.ch011(297-316)Online publication date: 18-Jan-2024
  • (2024)An Educational Escape Room Game to Develop Cybersecurity SkillsComputers10.3390/computers1308020513:8(205)Online publication date: 19-Aug-2024
  • (2024)A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research DirectionsTsinghua Science and Technology10.26599/TST.2023.901008029:4(1152-1180)Online publication date: Aug-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
July 2017
325 pages
ISBN:9781450348447
DOI:10.1145/3102304
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • LABSTICC: Labsticc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 July 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Computer Security
  2. Cyber Threats
  3. IoT
  4. Penetration Testing
  5. Privacy
  6. Security Analysis
  7. Security Audit

Qualifiers

  • Research-article

Conference

ICFNDS '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)144
  • Downloads (Last 6 weeks)16
Reflects downloads up to 17 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Artificial Intelligence Applications in the Context of the Security Framework for the Logistics IndustryAdvances in Explainable AI Applications for Smart Cities10.4018/978-1-6684-6361-1.ch011(297-316)Online publication date: 18-Jan-2024
  • (2024)An Educational Escape Room Game to Develop Cybersecurity SkillsComputers10.3390/computers1308020513:8(205)Online publication date: 19-Aug-2024
  • (2024)A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research DirectionsTsinghua Science and Technology10.26599/TST.2023.901008029:4(1152-1180)Online publication date: Aug-2024
  • (2024)Navigating Cybersecurity GovernanceComputers and Security10.1016/j.cose.2024.103852142:COnline publication date: 1-Jul-2024
  • (2024)Cost-Effective Cybersecurity Framework for Small and Medium-Sized EnterprisesDeep Learning and Visual Artificial Intelligence10.1007/978-981-97-4533-3_11(133-155)Online publication date: 18-Sep-2024
  • (2023)Small and Medium-Sized Enterprises’ Perceptions of the Use of Cloud ServicesInterdisciplinary Description of Complex Systems10.7906/indecs.21.2.121:2(131-140)Online publication date: 2023
  • (2023)A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication NetworksJournal of Network and Systems Management10.1007/s10922-023-09747-y31:3Online publication date: 30-Jun-2023
  • (2023)Digitalizing Process Assessment Approach: An Illustration with GDPR Compliance Self-assessment for SMEsSystems, Software and Services Process Improvement10.1007/978-3-031-42310-9_9(125-138)Online publication date: 30-Aug-2023
  • (2023)I Just Want to Help: SMEs Engaging with Cybersecurity TechnologyHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-35822-7_23(338-352)Online publication date: 23-Jul-2023
  • (2022)Cybersecurity Issues and Challenges for E-Government During COVID-19Cybersecurity Measures for E-Government Frameworks10.4018/978-1-7998-9624-1.ch012(187-222)Online publication date: 11-Mar-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media