Cybersecurity Infrastructure adoption Model for Malware Mitigation in Small Medium Enterprises (SME)

Adnan Bin Amanat Ali, R. Ayyasamy, R. Akbar, V. Ponnusamy, Lim Ean Heng
{"title":"Cybersecurity Infrastructure adoption Model for Malware Mitigation in Small Medium Enterprises (SME)","authors":"Adnan Bin Amanat Ali, R. Ayyasamy, R. Akbar, V. Ponnusamy, Lim Ean Heng","doi":"10.1109/ROMA55875.2022.9915696","DOIUrl":null,"url":null,"abstract":"Malware is the most critical threat among other cybersecurity threats because it could be a disaster for any organization, its resources, and operations. Due to non-compliance with adequate cybersecurity, SMEs are more vulnerable to malware attacks. Malware attacks can be known or unknown. SMEs must comply with adequate cybersecurity infrastructure to detect and mitigate these malware attacks. To the best of our knowledge, there is a limited study in the literature on finding the limitations of adopting cybersecurity infrastructure for malware detection and mitigation in Malaysian SMEs. In this paper, the factors have reviewed that influence the implementation of the cybersecurity infrastructure. These factors are further categorized into organizational, technical, and environmental challenges. A conceptual model for malware mitigation is designed based on the literature review findings. Furthermore, to design the proposed model, the most relevant theories, TOE (Technology, Organization, and Environment) and TAM (Technology Acceptance Model), are incorporated based on the literature review finding. This paper aims to propose a preliminary model for adopting technical cybersecurity infrastructure and mitigating malware threats in SMEs.","PeriodicalId":121458,"journal":{"name":"2022 IEEE 5th International Symposium in Robotics and Manufacturing Automation (ROMA)","volume":"48 18","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 5th International Symposium in Robotics and Manufacturing Automation (ROMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ROMA55875.2022.9915696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Malware is the most critical threat among other cybersecurity threats because it could be a disaster for any organization, its resources, and operations. Due to non-compliance with adequate cybersecurity, SMEs are more vulnerable to malware attacks. Malware attacks can be known or unknown. SMEs must comply with adequate cybersecurity infrastructure to detect and mitigate these malware attacks. To the best of our knowledge, there is a limited study in the literature on finding the limitations of adopting cybersecurity infrastructure for malware detection and mitigation in Malaysian SMEs. In this paper, the factors have reviewed that influence the implementation of the cybersecurity infrastructure. These factors are further categorized into organizational, technical, and environmental challenges. A conceptual model for malware mitigation is designed based on the literature review findings. Furthermore, to design the proposed model, the most relevant theories, TOE (Technology, Organization, and Environment) and TAM (Technology Acceptance Model), are incorporated based on the literature review finding. This paper aims to propose a preliminary model for adopting technical cybersecurity infrastructure and mitigating malware threats in SMEs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
针对中小企业(SME)恶意软件缓解的网络安全基础设施采用模型
恶意软件是其他网络安全威胁中最严重的威胁,因为它可能对任何组织、其资源和运营造成灾难。由于不遵守足够的网络安全,中小企业更容易受到恶意软件的攻击。恶意软件攻击可以是已知的,也可以是未知的。中小企业必须遵守足够的网络安全基础设施,以检测和减轻这些恶意软件攻击。据我们所知,文献中对马来西亚中小企业采用网络安全基础设施进行恶意软件检测和缓解的局限性进行了有限的研究。本文综述了影响网络安全基础设施实施的因素。这些因素进一步分为组织、技术和环境方面的挑战。基于文献综述的结果,设计了恶意软件缓解的概念模型。此外,为了设计提出的模型,根据文献综述的发现,结合了最相关的理论,TOE(技术,组织和环境)和TAM(技术接受模型)。本文旨在为中小企业采用技术网络安全基础设施和减轻恶意软件威胁提出一个初步模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cybersecurity Infrastructure adoption Model for Malware Mitigation in Small Medium Enterprises (SME) Interference Mitigation Techniques For The Operation Of Unmanned Aerial Vehicle (Uav) Depth Map Information from Stereo Image Pairs using Deep Learning and Bilateral Filter for Machine Vision Application Vehicle Anti-theft Face Recognition System, Speed Control and Obstacle Detection using Raspberry Pi Remote Patient Monitoring System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1