Journal Section

Advances in Machine Learning, IoT and Data Security

Open Access

Cite Score: 0.8        Impact Factor: 1.4

Cybersecurity Strategies for Businesses: Protecting Data in a Digital World
Authors
Affiliations

1 Department of Electronics and Communications Engineering, East West University, Jahurul Islam Avenue Jahurul Islam City, Aftabnagar, Dhaka-1212, Bangladesh

2 Department of Business Administration, International American University, 10th Floor, #1000 ​Los Angeles, CA 90010, USA

Author's Details

Name: Md. Mehedi Hasan

Email: mehedihasan281295@gmail.com

Department: Department of Electronics and Communications Engineering

Affiliation Number: 1

Address: Jahurul Islam Avenue Jahurul Islam City, Aftabnagar, Dhaka-1212, Bangladesh

Abstract
As more companies and organizations continue to shift their operations online and store crucial data electronically, the exposure of their information to cyber threats becomes even higher. The upward trend in the use of Information, Communication, and Technology (ICT) has led to the creation of major cybersecurity risks and openings. Unfortunate incidences have such as hacking the information, communication, and infrastructure networks of several organizations have continued to pose serious risks to organizations. Hacker and intruders nowadays have the equipment and means with which they can penetrate an organization’s information systems using the easiest methods. This work brings out various internet security threats: in fact, it casts light on the numerous internet security threats as viewed by business enterprises. It also examines the preventive approaches and methods for improving security to counter these risks. In this particular study, the researchers conducted a systematic review of secondary sources, to establish how organizations should acquire and implement IT security management tools that are consistent with best practice. They pointed out that this has been made possible through the use of a particular framework called the Security Incident Event Management (SIEM) framework. SIEM tools have significant benefits as a source of data for the security analysts, who can hence effectively respond to the threats more efficiently.

Keywords: 

https://doi10.1061/(C5K)JITMBH.1943-5533.0002519

Citation

Share

This article is Open Access CC BY-NC
Centered Image 1.4k

Total Views

Centered Image 0.5k

Downloads

Centered Image 0

Citations

This tab lists articles citing this work.