We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Aggregate Analysis of Security Surveys

by Bindu Dodiya, Umesh Kumar Singh, Vivaan Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 33
Year of Publication: 2021
Authors: Bindu Dodiya, Umesh Kumar Singh, Vivaan Gupta
10.5120/ijca2021921717

Bindu Dodiya, Umesh Kumar Singh, Vivaan Gupta . Aggregate Analysis of Security Surveys. International Journal of Computer Applications. 183, 33 ( Oct 2021), 16-22. DOI=10.5120/ijca2021921717

@article{ 10.5120/ijca2021921717,
author = { Bindu Dodiya, Umesh Kumar Singh, Vivaan Gupta },
title = { Aggregate Analysis of Security Surveys },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2021 },
volume = { 183 },
number = { 33 },
month = { Oct },
year = { 2021 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number33/32144-2021921717/ },
doi = { 10.5120/ijca2021921717 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:18:36.774751+05:30
%A Bindu Dodiya
%A Umesh Kumar Singh
%A Vivaan Gupta
%T Aggregate Analysis of Security Surveys
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 33
%P 16-22
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

IT environment is becoming more complex, cybercriminals are getting better at identifying and targeting the intrinsic weaknesses. In 2020 criminals have taken advantage of the disruption caused by the pandemic. While organizations were vulnerable and distracted, hackers developed new ransomware samples and advanced existing tools to attack critical infrastructure including vital research labs and health care organizations. In this regard analysis of emerging vulnerability, attack trends can be helpful in planning proper counter measures to ensure security. There are various surveys and reports available which provide statistical information on security trend and issues and also studies are available which provides information about defence mechanism and tools to protect an organization .Better understanding of Current information and security trends and issues can be gained by doing comparative and aggregate analysis of these reports. In order to have a holistic picture of current state of information security landscape, In this paper data from NVD, and seven other sources which conducted survey in last two years has been analysed .Results are obtained by analysing recent survey reports to present a comprehensive view of current information security landscape.

References
  1. Chowdhury A. “Recent cyber security attacks and their mitigation approaches–An Overview”. In International conference on applications and techniques in information security, Springer, Singapore. 2016; pp 54-65.
  2. National Vulnerability Database (NVD), [Online] Available: http://nvd.nist.gov/scap.cfm (Accessed on 05-03-2021).
  3. The MITRE Corporation. “Common Vulnerabilities and Exposures (CVE),” [Online] Available: http://www.cve.mitre.org/, (Accessed on 27-05-2021).
  4. Sky box research report “Vulnerability and threat trends 2020” [Online] Available :https://www.skyboxsecurity.com/blog/2020-vulnerability-and-threat-trends-report-mid-year-update-key-findings/(Accessed on 25-06-2021).
  5. Flexera ”Vulnerability Review 2020 Global trends” [Online] Available: https://info.flexera.com/SVM-REPORT-Vulnerability-Review-2020. (Accessed on 25-06-2021).
  6. Microsoft Digital Defense Report,September 2020, [Online] Available: https://www.microsoft.com/enin/security/business/security-intelligence-report. (Accessed on 25-06-2021).
  7. FBI IC3 “Internet Crime Report 2020”, [Online] Available: https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf. (Accessed on 25-06-2021).
  8. Verizon 2020 Data Breach Investigations Report, [Online] Available :https://enterprise.verizon.com/content/verizonenterprise/us/en/index/resources/reports/2020-data-breach-investigations-report.pdf, (Accessed on 25-05-2021).
  9. IBM X-Force Threat Intelligence Index 2021,[Online] Available: https://www.ibm.com/security/data-breach/threat-intelligence. (Accessed on 25-05-2021).
  10. https://owasp.org/www-project-top-ten/
  11. https://cwe.mitre.org/top25/archive/2020/ 2020_cwe_top25.html.
  12. Internet world Stats ,”Usage And Population statistics” [Online] Available: https://www.internetworldstats.com/stats.htm.
  13. Trend Micro Cloud App Security Threat Report 2020[Online] Available: https://www.trendmicro.com/vinfo/in/security/research-and-analysis/threat-reports/roundup/trend-micro-cloud-app-security-threat-report-2020.(Accessed on 10-06-2021)
  14. Common Vulnerability Scoring System v3.0: Specification Document (Qualitative Severity Rating Scale)". First.org (accessed on 10-07-2021).
  15. Cybersecurity Resource Allocation & Efficiency Index Q2-2020 Report [Online] Available: https://www.cyberriskalliance.com/wp-content/uploads/2020/08/CRAE-Index.pdf
  16. A. Tripathi and U.K. Singh,” Aggregate Analysis of Security Surveys in Quest of Current Information Security Landscape” International Journal of Computer Applications • Volume 51– No.17, August 2012
Index Terms

Computer Science
Information Sciences

Keywords

Security survey Vulnerability trends Attack trends Security countermeasures.