Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure
An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that n...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSNS
2021
|
Online Access: | http://eprints.utem.edu.my/id/eprint/25763/2/IJCSNS%20-%20WOS.PDF http://eprints.utem.edu.my/id/eprint/25763/ https://www.koreascience.or.kr/article/JAKO202127452931439.pdf https://doi.org/10.22937/IJCSNS.2021.21.8.1 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknikal Malaysia Melaka |
Language: | English |
id |
my.utem.eprints.25763 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.257632022-03-16T16:20:49Z http://eprints.utem.edu.my/id/eprint/25763/ Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure Selamat, Siti Rahayu Syafrizal, Melwin Zakaria, Nurul Azma An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future. IJCSNS 2021-08 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/25763/2/IJCSNS%20-%20WOS.PDF Selamat, Siti Rahayu and Syafrizal, Melwin and Zakaria, Nurul Azma (2021) Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure. International Journal of Computer Science and Network Security, 21 (8). pp. 1-12. ISSN 1738-7906 https://www.koreascience.or.kr/article/JAKO202127452931439.pdf https://doi.org/10.22937/IJCSNS.2021.21.8.1 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
description |
An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future. |
format |
Article |
author |
Selamat, Siti Rahayu Syafrizal, Melwin Zakaria, Nurul Azma |
spellingShingle |
Selamat, Siti Rahayu Syafrizal, Melwin Zakaria, Nurul Azma Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure |
author_facet |
Selamat, Siti Rahayu Syafrizal, Melwin Zakaria, Nurul Azma |
author_sort |
Selamat, Siti Rahayu |
title |
Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure |
title_short |
Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure |
title_full |
Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure |
title_fullStr |
Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure |
title_full_unstemmed |
Avoiditals: Enhanced Cyber-Attack Taxonomy In Securing Information Technology Infrastructure |
title_sort |
avoiditals: enhanced cyber-attack taxonomy in securing information technology infrastructure |
publisher |
IJCSNS |
publishDate |
2021 |
url |
http://eprints.utem.edu.my/id/eprint/25763/2/IJCSNS%20-%20WOS.PDF http://eprints.utem.edu.my/id/eprint/25763/ https://www.koreascience.or.kr/article/JAKO202127452931439.pdf https://doi.org/10.22937/IJCSNS.2021.21.8.1 |
_version_ |
1728055214672445440 |