Assessing Cyber Security Awareness And Preparedness: A Survey Study
Assessing Cyber Security Awareness And Preparedness: A Survey Study
Vol 8 , Issue 1 , December 2023 | Pages: 20-26
DOI: 10.61691/IPEM_CA.8.2023.20-26
Published Online: December, 2023
- Author Affiliations
- Abstract
- References
- Citation
Author Details
The rapid growth of technology and the increasing reliance on digital systems have highlighted the need for effective cyber security measures. This survey study aims to assess the level of cyber security awareness and preparedness among individuals and organizations. By collecting data through a survey questionnaire, this study seeks to identify gaps in knowledge, identify common vulnerabilities, and understand the current practices in place to mitigate cyber threats. The findings of this study will provide insights into the effectiveness of existing cyber security awareness programs and inform strategies for enhancing cyber security education and preparedness.
Keywords
cyber security awareness, cyber security preparedness, survey study, gaps in knowledge, common vulnerabilities, current practices, cyber threats- Jitendra Jain et al, International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 791-793
- International Journal of Computer Applications (0975 – 8887) Volume 111 – No 7, February 2015
- Recent Trends in Programming Languages ISSN: 2455-1821 (Online) Volume 4, Issue 2 www.stmjournals.com
- © The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License
- Cabaj et al. EURASIP Journal on Information Security (2018) 2018:10
- https://doi.org/10.1186/s13635-018-0080
- Bhutada and P. Bhutada, Application of Artificial
- Intelligence in Cyber Security: in IJERCSE, 2018, 5(4): 214-219
- V. Alberto, lecture, Topic: Application of Artificial Intelligence (AI) to Network Security‖, ITEC 625, University of Maryland, University College, Maryland, Mar. 2018.
- Avira, The Application of AI to Cybersecurity – An Avira White Paper, Germany, Avira Operation, 2017.
- A Panimalar, U.G. Pai and K.S. Khan, ―AI Techniques for Cyber Security‖, International Research Journal of Engineering and Technology, vol. 5, 3, pp. 122-124, Mar. 2018. Available: https://www.irjet.net [assessed May. 29, 2020]
- S. Tuang. Diep.Q. B, and Zelinka. I, Artificial Intelligence in the Cyber Domain: Offense and Defense: Symmetry, 2020, 12,410 available: www.mdp.com/journal/symmetry on [assessed Apr. 20, 2020]
- Kanal, Machine Learning in Cybersecurity: Carnegie Mellon University Software Engineering Institute, available
- onhttp://insights.sei.cnu.edu./sei_blog/2017/06/mac hine _learning_in_cybersecurity.html
- Selma, C. Huseyin and A. Mustafa, Application of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review, International Journal of Artificial Intelligence &Applications, vol. 6, issue 1, pp. 21-39, January 2015.
- Enn, ―Artificial Intelligence in Cyber Defense‖, in Proceedings of 3rd International Conference on Cyber Conflicts [ICCC], 7-10 June, 2011 Tallin Estonia.
- Dennis, A. Stuart, ―Global Challenges: Twelve risks that threaten human civilization, Global Challenges Foundation‖: 2015,Available: http://globalchallenges.org /wp-content/ uploads/12-Risks-with-infinite-impact.pdf [accessed Jun. 3, 2020]
- Stuart, D. Daniel, T. Max, ‗‗Research Priorities for Robust and Beneficial Artificial Intelligence‘‘, AI Magazine, vol. 36, issue 4, pp. 105-114, Winter 2015
- National Science & Technology Council,
- Artificial Intelligence and Cybersecurity: Opportunities and Challenges‖ Net. & Info.Tech R&D Sub-comtt and the ML & AI Sub-comtt, 2020.
- M. Shamiulla, Role of Artificial Intelligence in Cyber Security, International Journal of Innovative Technology and Exploring Engineering, vol. 9 issue 1 pp. 4628-4630, November 2019
- Pranav, ―Artificial Intelligence in cyber security‖, International Journal of Research in Computer Applications & Robotics, vol 4, 1, pp.1- 5, May 2016
- Kivimaa, A. Ojamaa, E. Tyugu. Graded Security Expert System. Lecture Notes in Computer Science, v. 5508. Springer, 2009, 279-286.
- Christain, D.A. Elizondo and T. Watson,
- Application of artificial neural networks and related techniques to intrusion detection‖, World Congress on Computation Intelligence, pp 949- 954, 2010
- Tyugu, ―Artificial Intelligence in Cyber Defense‖, International conference on Cyber Conflict, vol. 3, pp. 95-105, Tallinn, Estonia, Jan. 2011
- Nadine and K. Hadas, ―Artificial Intelligence in Cybersecurity‖, Cyber, Intelligence, and Security, vol. 1, 1, pp. 103-119, Jan. 2017
- Dima, M. Robert, B. Zvi, S. Shahar and E. Yuval, ―Using Artificial Neural Network to Detect Unknown Computer Worms‖, Neural Computing and Applications, vol.18, 7, pp. 663- 674, Oct. 2009
- H. Geoffrey, O. Simon and T. Yee-Whye, ―A Fast Learning Algorithm for Deep Belief Nets‖, Neural Computation, vol. 18, no. 7, pp. 1527-1554, 2006
- Thomson, ―Cyber Attacks Could be Predicted with Artificial Intelligence‖, iTechPost, www.itechpost.com/articles/1734 7/cyberattacks- predicted-artificial-intelligence-help.htm, Apr. 21, 2016 [Jun. 2, 2020]
- Franklin and A. Graesser, ―Is It an Agent, or Just a Program? A Taxonomy for Autonomous Agents‖, Third International Workshop on Agent Theories, Architectures, and Languages, no. 3, pp. 21-35, 1997
- Xia and L. Junshan, ―A Security Architecture Based on Immune Agents for MANET‖, International Conference on Wireless Communication and Sensor Computing, no. , pp. 1- 5, 2010
Sivaguru R , et.al (2003); Assessing cyber security awareness and preparedness: a survey study, IPEM JOURNAL OF COMPUTER APPLICATION & RESEARCH, 8(1) , 20-26