Assessing Cyber Security Awareness And Preparedness: A Survey Study

Assessing Cyber Security Awareness And Preparedness: A Survey Study

Author Details

1. Sivaguru R, Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem
2. Malarvizhi P, Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem
3. Saranya R, Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem
4. Babu G, Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem
5. Saranya K, Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem

The rapid growth of technology and the increasing reliance on digital systems have highlighted the need for effective cyber security measures. This survey study aims to assess the level of cyber security awareness and preparedness among individuals and organizations. By collecting data through a survey questionnaire, this study seeks to identify gaps in knowledge, identify common vulnerabilities, and understand the current practices in place to mitigate cyber threats. The findings of this study will provide insights into the effectiveness of existing cyber security awareness programs and inform strategies for enhancing cyber security education and preparedness.

Keywords

cyber security awareness, cyber security preparedness, survey study, gaps in knowledge, common vulnerabilities, current practices, cyber threats
  1. Jitendra Jain et al, International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 791-793
  2. International Journal of Computer Applications (0975 – 8887) Volume 111 – No 7, February 2015
  3. Recent Trends in Programming Languages ISSN: 2455-1821 (Online) Volume 4, Issue 2 www.stmjournals.com
  4. © The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License
  5. Cabaj et al. EURASIP Journal on Information Security (2018) 2018:10
  6. https://doi.org/10.1186/s13635-018-0080
  7. Bhutada and P. Bhutada, Application of Artificial
  8. Intelligence in Cyber Security: in IJERCSE, 2018, 5(4): 214-219
  9. V. Alberto, lecture, Topic: Application of Artificial Intelligence (AI) to Network Security‖, ITEC 625, University of Maryland, University College, Maryland, Mar. 2018.
  10. Avira, The Application of AI to Cybersecurity – An Avira White Paper, Germany, Avira Operation, 2017.
  11. A Panimalar, U.G. Pai and K.S. Khan, ―AI Techniques for Cyber Security‖, International Research Journal of Engineering and Technology, vol. 5, 3, pp. 122-124, Mar. 2018. Available: https://www.irjet.net [assessed May. 29, 2020]
  12. S. Tuang. Diep.Q. B, and Zelinka. I, Artificial Intelligence in the Cyber Domain: Offense and Defense: Symmetry, 2020, 12,410 available: www.mdp.com/journal/symmetry on [assessed Apr. 20, 2020]
  13. Kanal, Machine Learning in Cybersecurity: Carnegie Mellon University Software Engineering Institute, available
  14. onhttp://insights.sei.cnu.edu./sei_blog/2017/06/mac hine _learning_in_cybersecurity.html
  15. Selma, C. Huseyin and A. Mustafa, Application of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review, International Journal of Artificial Intelligence &Applications, vol. 6, issue 1, pp. 21-39, January 2015.
  16. Enn, ―Artificial Intelligence in Cyber Defense‖, in Proceedings of 3rd International Conference on Cyber Conflicts [ICCC], 7-10 June, 2011 Tallin Estonia.
  17. Dennis, A. Stuart, ―Global Challenges: Twelve risks that threaten human civilization, Global Challenges Foundation‖: 2015,Available: http://globalchallenges.org /wp-content/ uploads/12-Risks-with-infinite-impact.pdf [accessed Jun. 3, 2020]
  18. Stuart, D. Daniel, T. Max, ‗‗Research Priorities for Robust and Beneficial Artificial Intelligence‘‘, AI Magazine, vol. 36, issue 4, pp. 105-114, Winter 2015
  19. National Science & Technology Council,
  20. Artificial Intelligence and Cybersecurity: Opportunities and Challenges‖ Net. & Info.Tech R&D Sub-comtt and the ML & AI Sub-comtt, 2020.
  21. M. Shamiulla, Role of Artificial Intelligence in Cyber Security, International Journal of Innovative Technology and Exploring Engineering, vol. 9 issue 1 pp. 4628-4630, November 2019
  22. Pranav, ―Artificial Intelligence in cyber security‖, International Journal of Research in Computer Applications & Robotics, vol 4, 1, pp.1- 5, May 2016
  23. Kivimaa, A. Ojamaa, E. Tyugu. Graded Security Expert System. Lecture Notes in Computer Science, v. 5508. Springer, 2009, 279-286.
  24. Christain, D.A. Elizondo and T. Watson,
  25. Application of artificial neural networks and related techniques to intrusion detection‖, World Congress on Computation Intelligence, pp 949- 954, 2010
  26. Tyugu, ―Artificial Intelligence in Cyber Defense‖, International conference on Cyber Conflict, vol. 3, pp. 95-105, Tallinn, Estonia, Jan. 2011
  27. Nadine and K. Hadas, ―Artificial Intelligence in Cybersecurity‖, Cyber, Intelligence, and Security, vol. 1, 1, pp. 103-119, Jan. 2017
  28. Dima, M. Robert, B. Zvi, S. Shahar and E. Yuval, ―Using Artificial Neural Network to Detect Unknown Computer Worms‖, Neural Computing and Applications, vol.18, 7, pp. 663- 674, Oct. 2009
  29. H. Geoffrey, O. Simon and T. Yee-Whye, ―A Fast Learning Algorithm for Deep Belief Nets‖, Neural Computation, vol. 18, no. 7, pp. 1527-1554, 2006
  30. Thomson, ―Cyber Attacks Could be Predicted with Artificial Intelligence‖, iTechPost, www.itechpost.com/articles/1734 7/cyberattacks- predicted-artificial-intelligence-help.htm, Apr. 21, 2016 [Jun. 2, 2020]
  31. Franklin and A. Graesser, ―Is It an Agent, or Just a Program? A Taxonomy for Autonomous Agents‖, Third International Workshop on Agent Theories, Architectures, and Languages, no. 3, pp. 21-35, 1997
  32. Xia and L. Junshan, ―A Security Architecture Based on Immune Agents for MANET‖, International Conference on Wireless Communication and Sensor Computing, no. , pp. 1- 5, 2010

Sivaguru R , et.al (2003); Assessing cyber security awareness and preparedness: a survey study,  IPEM JOURNAL OF COMPUTER APPLICATION & RESEARCH, 8(1) , 20-26

X