Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic...
Saved in:
| Published in: | Arabian journal for science and engineering (2011) Vol. 45; no. 4; pp. 3171 - 3189 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.04.2020
Springer Nature B.V |
| Subjects: | |
| ISSN: | 2193-567X, 1319-8025, 2191-4281 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it. |
|---|---|
| AbstractList | There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it. There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The goal of this study is to identify and analyze the common cyber security vulnerabilities. To achieve this goal, a systematic mapping study was conducted, and in total, 78 primary studies were identified and analyzed. After a detailed analysis of the selected studies, we identified the important security vulnerabilities and their frequency of occurrence. Data were also synthesized and analyzed to present the venue of publication, country of publication, key targeted infrastructures and applications. The results show that the security approaches mentioned so far only target security in general, and the solutions provided in these studies need more empirical validation and real implementation. In addition, our results show that most of the selected studies in this review targeted only a few common security vulnerabilities such as phishing, denial-of-service and malware. However, there is a need, in future research, to identify the key cyber security vulnerabilities, targeted/victimized applications, mitigation techniques and infrastructures, so that researchers and practitioners could get a better insight into it. |
| Author | Jhanjhi, NZ Mahmood, Sajjad Alshayeb, Mohammad Niazi, Mahmood Humayun, Mamoona |
| Author_xml | – sequence: 1 givenname: Mamoona surname: Humayun fullname: Humayun, Mamoona organization: Department of Information systems, College of Computer and Information Sciences, Jouf University – sequence: 2 givenname: Mahmood surname: Niazi fullname: Niazi, Mahmood organization: Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM) – sequence: 3 givenname: NZ orcidid: 0000-0001-8116-4733 surname: Jhanjhi fullname: Jhanjhi, NZ email: noorzaman.jhanjhi@taylors.edu.my organization: SoCIT, Taylor’s University – sequence: 4 givenname: Mohammad surname: Alshayeb fullname: Alshayeb, Mohammad organization: Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM) – sequence: 5 givenname: Sajjad surname: Mahmood fullname: Mahmood, Sajjad organization: Information and Computer Science Department, King Fahd University of Petroleum and Minerals (KFUPM) |
| BookMark | eNp9UMtOwzAQtFCRKKU_wMkS54AdJ47Nrap4SUUcWhA3y3E2xahNgu0c8veYBgmJQw_7kHZmdjTnaNK0DSB0Sck1JaS48ZQxLhNCY2Us9vQETVMqaZKlgk4OO0tyXryfobn3tiSZYDKnlE3R_XIoweE1mN7ZMODNhwMdPNZNhd_6XQNOl3ZngwV_ixd4PfgAex2swc-662yzxevQV8MFOq31zsP8d87Q6_3dZvmYrF4enpaLVWKir5CkFUCZUyOFEAXVRIMBkrKcZzkYwwnJOBUpLUsuNRVSMsmhqotas7ysUybYDF2Nup1rv3rwQX22vWviSxXPXGZ51IgoMaKMa713UCtjQzTdNsFpu1OUqJ_g1BicisGpQ3BRY4bSf9TO2b12w3ESG0k-gpstuD9XR1jf09OBjA |
| CitedBy_id | crossref_primary_10_1002_int_23088 crossref_primary_10_1007_s43621_024_00754_w crossref_primary_10_1007_s11042_021_11350_9 crossref_primary_10_1177_00195561241257388 crossref_primary_10_1145_3768582 crossref_primary_10_1007_s11276_023_03436_z crossref_primary_10_1007_s10462_024_10823_1 crossref_primary_10_3390_electronics12061333 crossref_primary_10_3390_computation13020030 crossref_primary_10_1007_s42001_024_00269_4 crossref_primary_10_1016_j_techfore_2023_123028 crossref_primary_10_1007_s41125_021_00076_2 crossref_primary_10_3390_info13040192 crossref_primary_10_1007_s13369_021_06484_9 crossref_primary_10_1007_s13369_022_06954_8 crossref_primary_10_1016_j_ssaho_2024_101234 crossref_primary_10_4018_IJSEUS_309953 crossref_primary_10_1016_j_procs_2024_06_060 crossref_primary_10_1109_ACCESS_2022_3204051 crossref_primary_10_1109_ACCESS_2023_3235900 crossref_primary_10_3390_fi15070231 crossref_primary_10_3390_computers11090137 crossref_primary_10_1109_ACCESS_2022_3221434 crossref_primary_10_3390_computers11120181 crossref_primary_10_1109_ACCESS_2024_3477979 crossref_primary_10_1007_s10586_024_04422_6 crossref_primary_10_1057_s41283_020_00063_2 crossref_primary_10_3390_electronics12173610 crossref_primary_10_3390_app15073898 crossref_primary_10_1007_s12652_020_02804_3 crossref_primary_10_3390_s23177541 crossref_primary_10_1002_smr_2346 crossref_primary_10_1007_s42452_022_05019_7 crossref_primary_10_3390_electronics10243065 crossref_primary_10_1108_ICS_12_2022_0195 crossref_primary_10_1016_j_adhoc_2020_102096 crossref_primary_10_1109_ACCESS_2025_3551887 crossref_primary_10_3390_info14090485 crossref_primary_10_3390_fi15080256 crossref_primary_10_1109_ACCESS_2022_3207272 crossref_primary_10_1109_ACCESS_2021_3094517 crossref_primary_10_1038_s41598_025_10291_9 crossref_primary_10_1002_spe_3175 crossref_primary_10_1002_ase_2385 crossref_primary_10_1016_j_cose_2023_103128 crossref_primary_10_1007_s11416_021_00414_x crossref_primary_10_59395_ijadis_v6i2_1404 crossref_primary_10_1016_j_apenergy_2025_125317 crossref_primary_10_32604_cmc_2021_017199 crossref_primary_10_3390_s20215997 crossref_primary_10_1142_S0219649220500173 crossref_primary_10_22201_dgtic_ctud_2024_2_4_71 crossref_primary_10_1016_j_chb_2022_107376 crossref_primary_10_3390_electronics12173629 crossref_primary_10_1016_j_future_2024_06_050 crossref_primary_10_3390_electronics10091092 crossref_primary_10_1080_08874417_2021_2004566 crossref_primary_10_3390_cryptography9020026 crossref_primary_10_3390_healthcare13070817 crossref_primary_10_1093_iwc_iwae048 crossref_primary_10_1007_s11235_023_01039_9 crossref_primary_10_1016_j_csa_2023_100031 crossref_primary_10_1109_ACCESS_2023_3251354 crossref_primary_10_1016_j_compeleceng_2022_107868 crossref_primary_10_32604_cmc_2022_019289 crossref_primary_10_1016_j_asoc_2024_112663 crossref_primary_10_1109_ACCESS_2021_3055209 crossref_primary_10_1007_s11042_022_14036_y crossref_primary_10_1007_s10791_025_09543_z crossref_primary_10_1016_j_matpr_2021_03_417 crossref_primary_10_1365_s43439_024_00120_6 crossref_primary_10_1007_s13369_023_08016_z crossref_primary_10_1111_risa_14004 |
| Cites_doi | 10.1016/j.infsof.2016.11.004 10.1109/ICSE.2009.5070521 10.14236/ewic/EASE2010.4 10.1007/s13369-015-1586-0 10.1177/1049731509351988 10.1016/j.comnet.2018.07.028 10.1007/s13198-012-0125-6 10.1016/j.cose.2011.08.004 10.4324/9780429500084 10.1109/ISADS.2013.6513420 10.1007/978-3-642-33018-6_18 10.1016/S1361-3723(12)70007-6 10.1016/j.csi.2016.10.001 10.1145/3184898 10.1016/j.cose.2014.06.008 10.1145/1134285.1134500 10.4018/978-1-5225-4053-3.ch016 10.1111/j.1468-2478.2009.00572.x 10.4018/978-1-5225-5634-3.ch032 10.13052/jcsm2245-1439.414 10.1016/j.jss.2004.06.004 10.1145/1368088.1368112 10.1007/978-3-319-70290-2_7 10.1108/ICS-04-2017-0025 10.1016/j.infsof.2015.03.007 10.1016/j.infsof.2014.07.010 10.1016/j.cose.2006.10.009 10.1080/01402390.2014.977382 10.1016/j.compind.2018.04.017 10.1108/K-12-2014-0283 10.1109/ACCESS.2018.2840322 10.1109/ASONAM.2016.7752338 10.1016/j.cose.2013.04.004 10.1016/j.jss.2015.06.005 10.1109/TSG.2016.2570546 10.1145/2897053.2897069 10.1109/TAC.2015.2409905 |
| ContentType | Journal Article |
| Copyright | King Fahd University of Petroleum & Minerals 2020 King Fahd University of Petroleum & Minerals 2020. |
| Copyright_xml | – notice: King Fahd University of Petroleum & Minerals 2020 – notice: King Fahd University of Petroleum & Minerals 2020. |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s13369-019-04319-2 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2191-4281 |
| EndPage | 3189 |
| ExternalDocumentID | 10_1007_s13369_019_04319_2 |
| GrantInformation_xml | – fundername: King Fahd University of Petroleum and Minerals grantid: IN161024 funderid: http://dx.doi.org/10.13039/501100004055 |
| GroupedDBID | -EM 0R~ 203 2KG 406 AAAVM AACDK AAHNG AAIAL AAJBT AANZL AARHV AASML AATNV AATVU AAUYE AAYTO AAYZH ABAKF ABDBF ABDZT ABECU ABFTD ABFTV ABJNI ABJOX ABKCH ABMQK ABQBU ABSXP ABTEG ABTKH ABTMW ABXPI ACAOD ACBXY ACDTI ACHSB ACMDZ ACMLO ACOKC ACPIV ACUHS ACZOJ ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEJRE AEMSY AEOHA AESKC AEVLU AEXYK AFBBN AFLOW AFQWF AGAYW AGJBK AGMZJ AGQEE AGQMX AGRTI AHAVH AHBYD AHSBF AIAKS AIGIU AILAN AITGF AJBLW AJRNO AJZVZ ALFXC ALMA_UNASSIGNED_HOLDINGS AMXSW AMYLF AOCGG AXYYD BGNMA CSCUP DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESX FERAY FIGPU FINBP FNLPD FSGXE GGCAI GQ6 GQ7 H13 HG6 I-F IKXTQ IWAJR J-C JBSCW JZLTJ L8X LLZTM M4Y MK~ NPVJJ NQJWS NU0 O9J PT4 ROL RSV SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE TSG TUS UOJIU UTJUX UZXMN VFIZW Z5O Z7R Z7V Z7X Z7Y Z7Z Z81 Z83 Z85 Z88 ZMTXR ~8M AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION 06D 0VY 23M 29~ 2KM 30V 408 5GY 96X AAJKR AARTL AAYIU AAYQN AAZMS ABTHY ACGFS ACKNC ADHHG ADHIR AEGNC AEJHL AENEX AEPYU AETCA AFWTZ AFZKB AGDGC AGWZB AGYKE AHYZX AIIXL AMKLP AMYQR ANMIH AYJHY ESBYG FFXSO FRRFC FYJPI GGRSB GJIRD GX1 HMJXF HRMNR HZ~ I0C IXD J9A KOV O93 OVT P9P R9I RLLFE S27 S3B SEG SHX T13 U2A UG4 VC2 W48 WK8 ~A9 |
| ID | FETCH-LOGICAL-c319t-2deeb51c988871a0aece0235645ecc600461821bb69a1899396edf7fa35bf2383 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 97 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000524444000051&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2193-567X 1319-8025 |
| IngestDate | Mon Jun 30 09:05:55 EDT 2025 Tue Nov 18 21:29:46 EST 2025 Sat Nov 29 02:51:30 EST 2025 Fri Feb 21 02:36:50 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Threats Attack Vulnerabilities Cyber security |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-2deeb51c988871a0aece0235645ecc600461821bb69a1899396edf7fa35bf2383 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-8116-4733 |
| PQID | 2386945004 |
| PQPubID | 2044268 |
| PageCount | 19 |
| ParticipantIDs | proquest_journals_2386945004 crossref_citationtrail_10_1007_s13369_019_04319_2 crossref_primary_10_1007_s13369_019_04319_2 springer_journals_10_1007_s13369_019_04319_2 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-04-01 |
| PublicationDateYYYYMMDD | 2020-04-01 |
| PublicationDate_xml | – month: 04 year: 2020 text: 2020-04-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
| PublicationTitle | Arabian journal for science and engineering (2011) |
| PublicationTitleAbbrev | Arab J Sci Eng |
| PublicationYear | 2020 |
| Publisher | Springer Berlin Heidelberg Springer Nature B.V |
| Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
| References | RamakiAARasoolzadeganABafghiAGA systematic mapping study on intrusion alert analysis in intrusion detection systemsACM Comput. Surv. (CSUR)20185135510.1145/3184898 ChooK-KRThe cyber threat landscape: challenges and future research directionsComput. Secur.201130871973110.1016/j.cose.2011.08.004 BenedicktMCyberspace: First Steps1991CambridgeMIT Press GunkelDJHacking Cyberspace2018AbingdonRoutledge10.4324/9780429500084 SharmaPJohariRSarmaSIntegrated approach to prevent SQL injection attack and reflected cross site scripting attackInt. J. Syst. Assur. Eng. Manag.20123434335110.1007/s13198-012-0125-6 MohammedNMExploring software security approaches in software development lifecycle: a systematic mapping studyComput. Stand. Interfaces20175010711510.1016/j.csi.2016.10.001 KuehlDTFrom cyberspace to cyberpower: Defining the problemCyberpower and National Security2009Washington, D.CNational Defense University Press DodgeRCJrCarverCFergusonAJPhishing for user security awarenessComput. Secur.2007261738010.1016/j.cose.2006.10.009 ZhangHOptimal denial-of-service attack scheduling with energy constraintIEEE Trans. Autom. Control2015601130233028341959310.1109/TAC.2015.2409905 EnochSYA systematic evaluation of cybersecurity metrics for dynamic networksComput. Netw.201814421622910.1016/j.comnet.2018.07.028 HydaraICurrent state of research on cross-site scripting (XSS)—a systematic literature reviewInf. Softw. Technol.20155817018610.1016/j.infsof.2014.07.010 AlguliyevRImamverdiyevYSukhostatLCyber-physical systems and their security issuesComput. Ind.201810021222310.1016/j.compind.2018.04.017 Chong, R.: Quick reference guide to endnote (2018) AbomharaMKøienGMCyber security and the internet of things: vulnerabilities, threats, intruders and attacksJ. Cyber Secur.201541658810.13052/jcsm2245-1439.414 Kustarz, C.: et al.: System and method for denial of service attack mitigation using cloud services. Google Patents (2016) LewisGLagoPArchitectural tactics for cyber-foraging: results of a systematic literature reviewJ. Syst. Softw.201510715818610.1016/j.jss.2015.06.005 Niemelä, J.; Hyppönen, M.; Kangas, S.: Malware protection. Google Patents (2016) Chockalingam, S.; et al.: Bayesian network models in cyber security: a systematic review. In: Nordic Conference on Secure IT Systems. Springer (2017) Budgen, D.; Brereton, P.: Performing systematic literature reviews in software engineering. In: Proceedings of the 28th International Conference on Software Engineering. ACM (2006) Ron, M.: Situational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for ecuador. In: Developments and Advances in Defense and Security: Proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018). Springer (2018) Lun, Y.Z.; et al.: Cyber-physical systems security: a systematic mapping study. arXiv:1605.09641 (2016) Von SolmsRVan NiekerkJFrom information security to cyber securityComput. Secur.2013389710210.1016/j.cose.2013.04.004 MuftiYA readiness model for security requirements engineeringIEEE Access20186286112863110.1109/ACCESS.2018.2840322 RahimNHAA systematic review of approaches to assessing cybersecurity awarenessKybernetes2015444606622333752110.1108/K-12-2014-0283 Mittal, S.; et al.: Cybertwitter: using twitter to generate alerts for cybersecurity threats and vulnerabilities. In: Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE Press (2016) Kitchenham, B.A.; Budgen, D.; Brereton, O.P.: The value of mapping studies-A participant-observer case study. In: EASE (2010) JohnsonCGuide to cyber threat information sharingNIST Spec. Publ.2016800150 Muccini, H.; Sharaf, M.; Weyns, D.:. Self-adaptation for cyber-physical systems: a systematic literature review. In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-managing Systems. ACM (2016) TahaAFRisk mitigation for dynamic state estimation against cyber attacks and unknown inputsIEEE Trans. Smart Grid20189288689910.1109/TSG.2016.2570546 RidTBuchananBAttributing cyber attacksJ. Strateg. Stud.2015381–243710.1080/01402390.2014.977382 Al MazariACyber terrorism taxonomies: definition, targets, patterns, risk factors, and mitigation strategiesCyber Security and Threats: Concepts, Methodologies, Tools, and Applications2018HersheyIGI Global60862110.4018/978-1-5225-5634-3.ch032 BrarHSKumarGCybercrimes: a proposed taxonomy and challengesJ. Comput. Netw. Commun.20182018 PetersenKVakkalankaSKuzniarzLGuidelines for conducting systematic mapping studies in software engineering: an updateInf. Softw. Technol.20156411810.1016/j.infsof.2015.03.007 Floyd, D.H.; Shelton, J.W.; Bush, J.E.: Systems and methods for detecting a security breach in an aircraft network. Google Patents (2018) NguyenPHAliSYueTModel-based security engineering for cyber-physical systems: a systematic mapping studyInf. Softw. Technol.20178311613510.1016/j.infsof.2016.11.004 Wassermann, G.; Su, Z.: Static detection of cross-site scripting vulnerabilities. In: Proceedings of the 30th International Conference on Software Engineering. ACM (2008) FrankeUBrynielssonJCyber situational awareness—a systematic review of the literatureComput. Secur.201446183110.1016/j.cose.2014.06.008 Kieyzun, A.; et al.: Automatic creation of SQL injection and cross-site scripting attacks. In: Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society (2009) ParmarBProtecting against spear-phishingComput. Fraud Secur.20122012181110.1016/S1361-3723(12)70007-6 Choraś, M.; et al.: Correlation approach for SQL injection attacks detection. In: International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Springer (2013) BanksWCCyber espionage and electronic surveillance: beyond the media coverageEmory L. J.201666513 NiaziMDo systematic literature reviews outperform informal literature reviews in the software engineering domain? An initial case studyArab. J. Sci. Eng.201540384585510.1007/s13369-015-1586-0 ValerianoBManessRCBrownCEckersleyRInternational relations theory and cyber securityThe Oxford Handbook of International Political Theory2018OxfordOxford University Press259 Razzaq, A.; et al.: Cyber security: threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE (2013) MishnaFInterventions to prevent and reduce cyber abuse of youth: a systematic reviewRes. Soc. Work Pract.201121151410.1177/1049731509351988 BeechamSUsing an expert panel to validate a requirements process improvement modelJ. Syst. Softw.200576325127510.1016/j.jss.2004.06.004 Gill, R.S.; Smith, J.; Looi, M.H.; Clark, A.J.: Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In: Clark, A.J., Kerr, K., Mohay, G.M. (eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22–26 May 2005, Gold Coast, Australia (2005) von SolmsBvon SolmsRCybersecurity and information security—what goes where?Inf. Comput. Secur.20182612910.1108/ICS-04-2017-0025 Bada, M.; Sasse, A.M.; Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv:1901.02672 (2019) HansenLNissenbaumHDigital disaster, cyber security, and the Copenhagen SchoolInt. Stud. Q.20095341155117510.1111/j.1468-2478.2009.00572.x BensonVMcAlaneyJFrumkinLAEmerging threats for the human element and countermeasures in current cyber security landscapePsychological and Behavioral Examinations in Cyber Security2018HersheyIGI Global26627110.4018/978-1-5225-4053-3.ch016 C Johnson (4319_CR18) 2016; 800 B Parmar (4319_CR25) 2012; 2012 B von Solms (4319_CR9) 2018; 26 Y Mufti (4319_CR51) 2018; 6 4319_CR32 4319_CR30 S Beecham (4319_CR49) 2005; 76 4319_CR31 4319_CR35 U Franke (4319_CR43) 2014; 46 DT Kuehl (4319_CR13) 2009 L Hansen (4319_CR12) 2009; 53 K Petersen (4319_CR46) 2015; 64 RC Dodge Jr (4319_CR26) 2007; 26 SY Enoch (4319_CR39) 2018; 144 M Benedickt (4319_CR14) 1991 P Sharma (4319_CR27) 2012; 3 V Benson (4319_CR4) 2018 4319_CR22 DJ Gunkel (4319_CR15) 2018 I Hydara (4319_CR34) 2015; 58 4319_CR23 PH Nguyen (4319_CR33) 2017; 83 NHA Rahim (4319_CR38) 2015; 44 AA Ramaki (4319_CR40) 2018; 51 T Rid (4319_CR19) 2015; 38 H Zhang (4319_CR21) 2015; 60 4319_CR28 4319_CR6 R Alguliyev (4319_CR42) 2018; 100 4319_CR5 M Niazi (4319_CR47) 2015; 40 AF Taha (4319_CR7) 2018; 9 4319_CR2 4319_CR1 K-KR Choo (4319_CR24) 2011; 30 A Al Mazari (4319_CR11) 2018 WC Banks (4319_CR20) 2016; 66 4319_CR10 4319_CR17 HS Brar (4319_CR29) 2018; 2018 F Mishna (4319_CR36) 2011; 21 M Abomhara (4319_CR16) 2015; 4 NM Mohammed (4319_CR50) 2017; 50 4319_CR44 4319_CR41 4319_CR48 4319_CR45 B Valeriano (4319_CR8) 2018 R Von Solms (4319_CR3) 2013; 38 G Lewis (4319_CR37) 2015; 107 |
| References_xml | – reference: GunkelDJHacking Cyberspace2018AbingdonRoutledge10.4324/9780429500084 – reference: ZhangHOptimal denial-of-service attack scheduling with energy constraintIEEE Trans. Autom. Control2015601130233028341959310.1109/TAC.2015.2409905 – reference: NguyenPHAliSYueTModel-based security engineering for cyber-physical systems: a systematic mapping studyInf. Softw. Technol.20178311613510.1016/j.infsof.2016.11.004 – reference: AlguliyevRImamverdiyevYSukhostatLCyber-physical systems and their security issuesComput. Ind.201810021222310.1016/j.compind.2018.04.017 – reference: BensonVMcAlaneyJFrumkinLAEmerging threats for the human element and countermeasures in current cyber security landscapePsychological and Behavioral Examinations in Cyber Security2018HersheyIGI Global26627110.4018/978-1-5225-4053-3.ch016 – reference: Kieyzun, A.; et al.: Automatic creation of SQL injection and cross-site scripting attacks. In: Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society (2009) – reference: Wassermann, G.; Su, Z.: Static detection of cross-site scripting vulnerabilities. In: Proceedings of the 30th International Conference on Software Engineering. ACM (2008) – reference: Muccini, H.; Sharaf, M.; Weyns, D.:. Self-adaptation for cyber-physical systems: a systematic literature review. In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-managing Systems. ACM (2016) – reference: RahimNHAA systematic review of approaches to assessing cybersecurity awarenessKybernetes2015444606622333752110.1108/K-12-2014-0283 – reference: MohammedNMExploring software security approaches in software development lifecycle: a systematic mapping studyComput. Stand. Interfaces20175010711510.1016/j.csi.2016.10.001 – reference: JohnsonCGuide to cyber threat information sharingNIST Spec. Publ.2016800150 – reference: Budgen, D.; Brereton, P.: Performing systematic literature reviews in software engineering. In: Proceedings of the 28th International Conference on Software Engineering. ACM (2006) – reference: HydaraICurrent state of research on cross-site scripting (XSS)—a systematic literature reviewInf. Softw. Technol.20155817018610.1016/j.infsof.2014.07.010 – reference: FrankeUBrynielssonJCyber situational awareness—a systematic review of the literatureComput. Secur.201446183110.1016/j.cose.2014.06.008 – reference: Kitchenham, B.A.; Budgen, D.; Brereton, O.P.: The value of mapping studies-A participant-observer case study. In: EASE (2010) – reference: MuftiYA readiness model for security requirements engineeringIEEE Access20186286112863110.1109/ACCESS.2018.2840322 – reference: Chong, R.: Quick reference guide to endnote (2018) – reference: EnochSYA systematic evaluation of cybersecurity metrics for dynamic networksComput. Netw.201814421622910.1016/j.comnet.2018.07.028 – reference: Lun, Y.Z.; et al.: Cyber-physical systems security: a systematic mapping study. arXiv:1605.09641 (2016) – reference: ParmarBProtecting against spear-phishingComput. Fraud Secur.20122012181110.1016/S1361-3723(12)70007-6 – reference: DodgeRCJrCarverCFergusonAJPhishing for user security awarenessComput. Secur.2007261738010.1016/j.cose.2006.10.009 – reference: Chockalingam, S.; et al.: Bayesian network models in cyber security: a systematic review. In: Nordic Conference on Secure IT Systems. Springer (2017) – reference: BanksWCCyber espionage and electronic surveillance: beyond the media coverageEmory L. J.201666513 – reference: MishnaFInterventions to prevent and reduce cyber abuse of youth: a systematic reviewRes. Soc. Work Pract.201121151410.1177/1049731509351988 – reference: LewisGLagoPArchitectural tactics for cyber-foraging: results of a systematic literature reviewJ. Syst. Softw.201510715818610.1016/j.jss.2015.06.005 – reference: BeechamSUsing an expert panel to validate a requirements process improvement modelJ. Syst. Softw.200576325127510.1016/j.jss.2004.06.004 – reference: BenedicktMCyberspace: First Steps1991CambridgeMIT Press – reference: SharmaPJohariRSarmaSIntegrated approach to prevent SQL injection attack and reflected cross site scripting attackInt. J. Syst. Assur. Eng. Manag.20123434335110.1007/s13198-012-0125-6 – reference: Razzaq, A.; et al.: Cyber security: threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS). IEEE (2013) – reference: ValerianoBManessRCBrownCEckersleyRInternational relations theory and cyber securityThe Oxford Handbook of International Political Theory2018OxfordOxford University Press259 – reference: Niemelä, J.; Hyppönen, M.; Kangas, S.: Malware protection. Google Patents (2016) – reference: Gill, R.S.; Smith, J.; Looi, M.H.; Clark, A.J.: Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In: Clark, A.J., Kerr, K., Mohay, G.M. (eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22–26 May 2005, Gold Coast, Australia (2005) – reference: Von SolmsRVan NiekerkJFrom information security to cyber securityComput. Secur.2013389710210.1016/j.cose.2013.04.004 – reference: RamakiAARasoolzadeganABafghiAGA systematic mapping study on intrusion alert analysis in intrusion detection systemsACM Comput. Surv. (CSUR)20185135510.1145/3184898 – reference: Ron, M.: Situational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for ecuador. In: Developments and Advances in Defense and Security: Proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018). Springer (2018) – reference: Al MazariACyber terrorism taxonomies: definition, targets, patterns, risk factors, and mitigation strategiesCyber Security and Threats: Concepts, Methodologies, Tools, and Applications2018HersheyIGI Global60862110.4018/978-1-5225-5634-3.ch032 – reference: ChooK-KRThe cyber threat landscape: challenges and future research directionsComput. Secur.201130871973110.1016/j.cose.2011.08.004 – reference: HansenLNissenbaumHDigital disaster, cyber security, and the Copenhagen SchoolInt. Stud. Q.20095341155117510.1111/j.1468-2478.2009.00572.x – reference: Kustarz, C.: et al.: System and method for denial of service attack mitigation using cloud services. Google Patents (2016) – reference: NiaziMDo systematic literature reviews outperform informal literature reviews in the software engineering domain? An initial case studyArab. J. Sci. Eng.201540384585510.1007/s13369-015-1586-0 – reference: TahaAFRisk mitigation for dynamic state estimation against cyber attacks and unknown inputsIEEE Trans. Smart Grid20189288689910.1109/TSG.2016.2570546 – reference: von SolmsBvon SolmsRCybersecurity and information security—what goes where?Inf. Comput. Secur.20182612910.1108/ICS-04-2017-0025 – reference: Mittal, S.; et al.: Cybertwitter: using twitter to generate alerts for cybersecurity threats and vulnerabilities. In: Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE Press (2016) – reference: RidTBuchananBAttributing cyber attacksJ. Strateg. Stud.2015381–243710.1080/01402390.2014.977382 – reference: Bada, M.; Sasse, A.M.; Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv:1901.02672 (2019) – reference: Choraś, M.; et al.: Correlation approach for SQL injection attacks detection. In: International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions. Springer (2013) – reference: Floyd, D.H.; Shelton, J.W.; Bush, J.E.: Systems and methods for detecting a security breach in an aircraft network. Google Patents (2018) – reference: PetersenKVakkalankaSKuzniarzLGuidelines for conducting systematic mapping studies in software engineering: an updateInf. Softw. Technol.20156411810.1016/j.infsof.2015.03.007 – reference: AbomharaMKøienGMCyber security and the internet of things: vulnerabilities, threats, intruders and attacksJ. Cyber Secur.201541658810.13052/jcsm2245-1439.414 – reference: BrarHSKumarGCybercrimes: a proposed taxonomy and challengesJ. Comput. Netw. Commun.20182018 – reference: KuehlDTFrom cyberspace to cyberpower: Defining the problemCyberpower and National Security2009Washington, D.CNational Defense University Press – volume: 83 start-page: 116 year: 2017 ident: 4319_CR33 publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2016.11.004 – ident: 4319_CR6 – ident: 4319_CR32 doi: 10.1109/ICSE.2009.5070521 – ident: 4319_CR45 doi: 10.14236/ewic/EASE2010.4 – ident: 4319_CR30 – volume: 40 start-page: 845 issue: 3 year: 2015 ident: 4319_CR47 publication-title: Arab. J. Sci. Eng. doi: 10.1007/s13369-015-1586-0 – volume: 21 start-page: 5 issue: 1 year: 2011 ident: 4319_CR36 publication-title: Res. Soc. Work Pract. doi: 10.1177/1049731509351988 – volume: 144 start-page: 216 year: 2018 ident: 4319_CR39 publication-title: Comput. Netw. doi: 10.1016/j.comnet.2018.07.028 – volume: 3 start-page: 343 issue: 4 year: 2012 ident: 4319_CR27 publication-title: Int. J. Syst. Assur. Eng. Manag. doi: 10.1007/s13198-012-0125-6 – volume: 30 start-page: 719 issue: 8 year: 2011 ident: 4319_CR24 publication-title: Comput. Secur. doi: 10.1016/j.cose.2011.08.004 – volume-title: Hacking Cyberspace year: 2018 ident: 4319_CR15 doi: 10.4324/9780429500084 – ident: 4319_CR2 doi: 10.1109/ISADS.2013.6513420 – volume-title: Cyberpower and National Security year: 2009 ident: 4319_CR13 – ident: 4319_CR28 doi: 10.1007/978-3-642-33018-6_18 – volume: 2012 start-page: 8 issue: 1 year: 2012 ident: 4319_CR25 publication-title: Comput. Fraud Secur. doi: 10.1016/S1361-3723(12)70007-6 – ident: 4319_CR48 – volume: 50 start-page: 107 year: 2017 ident: 4319_CR50 publication-title: Comput. Stand. Interfaces doi: 10.1016/j.csi.2016.10.001 – ident: 4319_CR23 – volume: 51 start-page: 55 issue: 3 year: 2018 ident: 4319_CR40 publication-title: ACM Comput. Surv. (CSUR) doi: 10.1145/3184898 – volume: 46 start-page: 18 year: 2014 ident: 4319_CR43 publication-title: Comput. Secur. doi: 10.1016/j.cose.2014.06.008 – ident: 4319_CR44 doi: 10.1145/1134285.1134500 – start-page: 266 volume-title: Psychological and Behavioral Examinations in Cyber Security year: 2018 ident: 4319_CR4 doi: 10.4018/978-1-5225-4053-3.ch016 – volume: 53 start-page: 1155 issue: 4 year: 2009 ident: 4319_CR12 publication-title: Int. Stud. Q. doi: 10.1111/j.1468-2478.2009.00572.x – start-page: 608 volume-title: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications year: 2018 ident: 4319_CR11 doi: 10.4018/978-1-5225-5634-3.ch032 – volume: 4 start-page: 65 issue: 1 year: 2015 ident: 4319_CR16 publication-title: J. Cyber Secur. doi: 10.13052/jcsm2245-1439.414 – volume: 76 start-page: 251 issue: 3 year: 2005 ident: 4319_CR49 publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2004.06.004 – start-page: 259 volume-title: The Oxford Handbook of International Political Theory year: 2018 ident: 4319_CR8 – ident: 4319_CR31 doi: 10.1145/1368088.1368112 – ident: 4319_CR41 doi: 10.1007/978-3-319-70290-2_7 – volume: 26 start-page: 2 issue: 1 year: 2018 ident: 4319_CR9 publication-title: Inf. Comput. Secur. doi: 10.1108/ICS-04-2017-0025 – volume: 64 start-page: 1 year: 2015 ident: 4319_CR46 publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2015.03.007 – volume: 58 start-page: 170 year: 2015 ident: 4319_CR34 publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2014.07.010 – volume: 800 start-page: 150 year: 2016 ident: 4319_CR18 publication-title: NIST Spec. Publ. – volume: 26 start-page: 73 issue: 1 year: 2007 ident: 4319_CR26 publication-title: Comput. Secur. doi: 10.1016/j.cose.2006.10.009 – ident: 4319_CR22 – volume: 38 start-page: 4 issue: 1–2 year: 2015 ident: 4319_CR19 publication-title: J. Strateg. Stud. doi: 10.1080/01402390.2014.977382 – volume: 100 start-page: 212 year: 2018 ident: 4319_CR42 publication-title: Comput. Ind. doi: 10.1016/j.compind.2018.04.017 – volume: 44 start-page: 606 issue: 4 year: 2015 ident: 4319_CR38 publication-title: Kybernetes doi: 10.1108/K-12-2014-0283 – volume: 66 start-page: 513 year: 2016 ident: 4319_CR20 publication-title: Emory L. J. – volume: 6 start-page: 28611 year: 2018 ident: 4319_CR51 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2840322 – ident: 4319_CR1 – ident: 4319_CR17 doi: 10.1109/ASONAM.2016.7752338 – volume-title: Cyberspace: First Steps year: 1991 ident: 4319_CR14 – volume: 38 start-page: 97 year: 2013 ident: 4319_CR3 publication-title: Comput. Secur. doi: 10.1016/j.cose.2013.04.004 – ident: 4319_CR5 – volume: 107 start-page: 158 year: 2015 ident: 4319_CR37 publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2015.06.005 – volume: 9 start-page: 886 issue: 2 year: 2018 ident: 4319_CR7 publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2016.2570546 – ident: 4319_CR10 – volume: 2018 year: 2018 ident: 4319_CR29 publication-title: J. Comput. Netw. Commun. – ident: 4319_CR35 doi: 10.1145/2897053.2897069 – volume: 60 start-page: 3023 issue: 11 year: 2015 ident: 4319_CR21 publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2015.2409905 |
| SSID | ssib048395113 ssj0001916267 ssj0061873 |
| Score | 2.4887614 |
| Snippet | There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 3171 |
| SubjectTerms | Cybersecurity Empirical analysis Engineering Humanities and Social Sciences Malware Mapping multidisciplinary Phishing Research Article - Computer Engineering and Computer Science Science |
| Title | Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study |
| URI | https://link.springer.com/article/10.1007/s13369-019-04319-2 https://www.proquest.com/docview/2386945004 |
| Volume | 45 |
| WOSCitedRecordID | wos000524444000051&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: Springer Journals New Starts & Take-Overs Collection customDbUrl: eissn: 2191-4281 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001916267 issn: 2193-567X databaseCode: RSV dateStart: 20110101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA8yPejBb3E6JQdvGmjaJG28jeHwoEPYHLuVpE1VGJ2sm7D_3rysXVVU0HPTkLx8vPfLe-_3ELrQkYkUVyGhymeEhUoSxakiXBkmfC8TLHVVS-7CXi8ajeRDmRRWVNHulUvS3dR1slsQCIjtgcd8SL2xF-86BwokwOj9YbWLmFX51ooI6pcWawH5rpSsPZ0B4SIcldkz33f7WUPVZucXT6lTQN2d_w19F22XBiduL3fIHloz-T7a-kBDeIC6nYU2U9wvS9nhwTNYkgVWeYqH8zHwUrsQWguqr3Eb91fkz_heAb3DE4ZoxMUheuzeDDq3pKyvQBI7iBnxU2M0p4m0KDikylMmMUB_Ixi3CysAOlv0QbUWUlGLywIpTJqFmQq4zqyqD45QI5_k5hhhRr3MpJ7mUoGDmGrnHjRRYiS4Cr0mopVM46QkH4caGOO4pk0GGcVWRrGTUew30eXqn9cl9cavrVvVUsXlMSxiO0ghGbczaaKramnqzz_3dvK35qdo0wcc7iJ6Wqgxm87NGdpI3mYvxfTcbc93PGzaAw |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA8yBfXBb3E6NQ--aaBpk7TxbQzHxG0Im2NvIWlTFUaVfQj7702ydlVRQZ-bhuTycffL3f0OgAsV6UhSGSIsfYJIKDmSFEtEpSbM91JGEle1pB12u9FwyO_zpLBJEe1euCTdTV0muwUBs7E99jHfpt6Yi3eVWKJti9F7g2IXEaPyjRURlC8txgLyXSlZczoDRFk4zLNnvu_2s4Yqzc4vnlKngJrb_xv6DtjKDU5YX-yQXbCisz2w-YGGcB80G3Olx7CXl7KD_SdrSU6gzBI4mI0sL7ULoTWg-hrWYW9J_gw70tI7PEIbjTg_AA_Nm36jhfL6Cig2g5giP9FaURxzg4JDLD2pY23pbxihZmGZhc4GfWClGJfY4LKAM52kYSoDqlKj6oNDUMleMn0EIMFeqhNPUS6tgxgr5x7UUay5dRV6VYALmYo4Jx-3NTBGoqRNtjISRkbCyUj4VXC5_Od1Qb3xa-tasVQiP4YTYQbJOKFmJlVwVSxN-fnn3o7_1vwcrLf6nbZo33bvTsCGbzG5i-6pgcp0PNOnYC1-mz5Pxmduq74DfXXc5w |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3fS8MwEA6iIvrgb3E6NQ--aVnTJmnr25gWxTmGm2NvJW1TFUYdWyfsv_eStesUFcTnpiG5uzT39e6-Q-g8dKUrmHAMIixqUEd4hmBEGExIyi0z4TTWXUuaTqvl9vtee6GKX2e7FyHJWU2DYmlKs9owTmpl4Zttc5Xno37sqzIc-AivUEAyysYfO73Coihc_-BR2OVfF_CGLN1WFk6qbTDu9PNKmu-n_XxblS7ol6ipvoz8rf9vYxtt5o4ors8sZwctyXQXbSzQE-4hvzEN5Qh38hZ3uPuiPMwxFmmMe5OB4qvWqbUAtq9wHXfmpND4QSjah2esshSn--jJv-k2bo2874IRwSIyw4qlDBmJPEDHDhGmkJFUtDicMlA4V5AaUAkJQ-4JAnjN9riMEycRNgsTcAHsA7ScvqXyEGHQSSJjM2SeUIFjEuqwoXQj6akQollBpJBvEOWk5Ko3xiAo6ZSVjAKQUaBlFFgVdDF_Zzij5Ph1dLVQW5Afz3EAi-QeZbCTCros1FQ-_nm2o78NP0Nr7Ws_aN617o_RuqWguk76qaLlbDSRJ2g1es9ex6NTbbUf7FHlyw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Security+Threats+and+Vulnerabilities%3A+A+Systematic+Mapping+Study&rft.jtitle=Arabian+journal+for+science+and+engineering+%282011%29&rft.au=Humayun%2C+Mamoona&rft.au=Niazi%2C+Mahmood&rft.au=Jhanjhi%2C+NZ&rft.au=Alshayeb%2C+Mohammad&rft.date=2020-04-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=2193-567X&rft.eissn=2191-4281&rft.volume=45&rft.issue=4&rft.spage=3171&rft.epage=3189&rft_id=info:doi/10.1007%2Fs13369-019-04319-2&rft.externalDocID=10_1007_s13369_019_04319_2 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2193-567X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2193-567X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2193-567X&client=summon |