Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
The exponential growth in the interconnectedness of people and devices, as well as the upward trend in cyberspace usage will continue to lead to a greater reliance on the internet. Most people’s daily activities are dependent on their ability to navigate the internet to access and manage...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9998178/ |
_version_ | 1797974428975366144 |
---|---|
author | Olufunsho I. Falowo Saheed Popoola Josette Riep Victor A. Adewopo Jacob Koch |
author_facet | Olufunsho I. Falowo Saheed Popoola Josette Riep Victor A. Adewopo Jacob Koch |
author_sort | Olufunsho I. Falowo |
collection | DOAJ |
description | The exponential growth in the interconnectedness of people and devices, as well as the upward trend in cyberspace usage will continue to lead to a greater reliance on the internet. Most people’s daily activities are dependent on their ability to navigate the internet to access and manage information. There are usually real risks associated with managing or accessing information, and these risks when exploited by threat actors, often lead to cybersecurity incidents. It is a common knowledge that a major cybersecurity incident is likely to result in significant financial losses, legal liability, privacy violations, reputational damage, sensitive data compromises, as well as national security implications. Threat actors usually employ various attack techniques to cause these incidents. After we identified the major cybersecurity incident report that is consolidated by the Center for Strategic & International Studies (CSIS) from which we derived the data of about the 803 major incidents that we analyzed, we then verified its (CSIS) credibility, non-partisan, global outreach and cybersecurity attack coverage by cross-referencing it with Data Breach Investigation Report (DBIR). We also through the lens of the Global Cybersecurity Index (GCI) ensured that this study is conducted within the context of cybersecurity principles. In reference to these attack techniques employed by threat actors, we conducted an exploratory investigation of 803 major cybersecurity incidents that were reported over the last decade. From a group of 244 of these major security incidents that happened and were reported between 2005 and 2021, this study reports that malware attack techniques were employed by threat actors to cause 48 percent of them and phishing attack techniques account for 19.7 percent of them. As many sources have confirmed the fact that major incidents will always happen, we echo the importance of readiness of organizations to conduct cybersecurity incident triage and or thorough investigation as necessary. Given the relevance of the guidelines outlined in the National Institute of Standards and Technology (NIST) incident response framework, we also recommend that organizations should adopt it or at least embrace similar guidelines as best as possible. |
first_indexed | 2024-04-11T04:19:49Z |
format | Article |
id | doaj.art-a9ec4f8cbabf477084e0720e5d8b3baa |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-04-11T04:19:49Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-a9ec4f8cbabf477084e0720e5d8b3baa2022-12-31T00:01:25ZengIEEEIEEE Access2169-35362022-01-011013403813405110.1109/ACCESS.2022.32318479998178Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity IncidentsOlufunsho I. Falowo0https://orcid.org/0000-0002-4460-0986Saheed Popoola1https://orcid.org/0000-0002-9602-6322Josette Riep2Victor A. Adewopo3https://orcid.org/0000-0002-1700-5241Jacob Koch4School of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH, USAThe exponential growth in the interconnectedness of people and devices, as well as the upward trend in cyberspace usage will continue to lead to a greater reliance on the internet. Most people’s daily activities are dependent on their ability to navigate the internet to access and manage information. There are usually real risks associated with managing or accessing information, and these risks when exploited by threat actors, often lead to cybersecurity incidents. It is a common knowledge that a major cybersecurity incident is likely to result in significant financial losses, legal liability, privacy violations, reputational damage, sensitive data compromises, as well as national security implications. Threat actors usually employ various attack techniques to cause these incidents. After we identified the major cybersecurity incident report that is consolidated by the Center for Strategic & International Studies (CSIS) from which we derived the data of about the 803 major incidents that we analyzed, we then verified its (CSIS) credibility, non-partisan, global outreach and cybersecurity attack coverage by cross-referencing it with Data Breach Investigation Report (DBIR). We also through the lens of the Global Cybersecurity Index (GCI) ensured that this study is conducted within the context of cybersecurity principles. In reference to these attack techniques employed by threat actors, we conducted an exploratory investigation of 803 major cybersecurity incidents that were reported over the last decade. From a group of 244 of these major security incidents that happened and were reported between 2005 and 2021, this study reports that malware attack techniques were employed by threat actors to cause 48 percent of them and phishing attack techniques account for 19.7 percent of them. As many sources have confirmed the fact that major incidents will always happen, we echo the importance of readiness of organizations to conduct cybersecurity incident triage and or thorough investigation as necessary. Given the relevance of the guidelines outlined in the National Institute of Standards and Technology (NIST) incident response framework, we also recommend that organizations should adopt it or at least embrace similar guidelines as best as possible.https://ieeexplore.ieee.org/document/9998178/Data breachDoS attacksDDoS attacksexploits of unpatched vulnerabilitiesIoT attacksmajor cybersecurity incidents |
spellingShingle | Olufunsho I. Falowo Saheed Popoola Josette Riep Victor A. Adewopo Jacob Koch Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents IEEE Access Data breach DoS attacks DDoS attacks exploits of unpatched vulnerabilities IoT attacks major cybersecurity incidents |
title | Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents |
title_full | Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents |
title_fullStr | Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents |
title_full_unstemmed | Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents |
title_short | Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents |
title_sort | threat actors x2019 tenacity to disrupt examination of major cybersecurity incidents |
topic | Data breach DoS attacks DDoS attacks exploits of unpatched vulnerabilities IoT attacks major cybersecurity incidents |
url | https://ieeexplore.ieee.org/document/9998178/ |
work_keys_str_mv | AT olufunshoifalowo threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents AT saheedpopoola threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents AT josetteriep threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents AT victoraadewopo threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents AT jacobkoch threatactorsx2019tenacitytodisruptexaminationofmajorcybersecurityincidents |