Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Impact Analysis of Resilience Against Malicious Code Attacks via Emailsopen access

Authors
Lee, ChulwonLee, Kyungho
Issue Date
2022
Publisher
TECH SCIENCE PRESS
Keywords
Cyberattack; resilience; malicious code; spear-phishing
Citation
CMC-COMPUTERS MATERIALS & CONTINUA, v.72, no.3, pp.4803 - 4816
Indexed
SCIE
SCOPUS
Journal Title
CMC-COMPUTERS MATERIALS & CONTINUA
Volume
72
Number
3
Start Page
4803
End Page
4816
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/142323
DOI
10.32604/cmc.2022.025310
ISSN
1546-2218
Abstract
The damage caused by malicious software is increasing owing to the COVID-19 pandemic, such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infrastructures and spear-phishing attacks on business or research institutes. Recently, several studies have been conducted to prevent further phishing emails in the workplace because malware attacks employ emails as the primary means of penetration. However, according to the latest research, there appears to be a limitation in blocking email spoofing through advanced blocking systems such as spam email filtering solutions and advanced persistent threat systems. Therefore, experts believe that it is more critical to restore services immediately through resilience than the advanced prevention program in the event of damage caused by malicious software. In accordance with this trend, we conducted a survey among 100 employees engaging in information security regarding the effective factors for countering malware attacks through email. Furthermore, we confirmed that resilience, backup, and restoration were effective factors in responding to phishing emails. In contrast, practical exercise and attack visualization were recognized as having little effect on malware attacks. In conclusion, our study reminds business and supervisory institutions to carefully examine their regular voluntary exercises or mandatory training programs and assists private corporations and public institutions to establish counter-strategies for dealing with malware attacks.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE