Advanced Cyber Exploitation and Mitigation Methodology
Oghene Augustine Onome
Dr. Oghene Augustine Onome, Technology Recovery and Operations Management Head for eProcess International, The Technology Hub for Ecobank Transnational International, Shomolu, Lagos State, Nigeria.
Manuscript received on February 11, 2022. | Revised Manuscript received on March 02, 2022. | Manuscript published on March 30, 2021. | PP: 8-15 | Volume-10 Issue-4, March, 2022. | Retrieval Number: 100.1/ijese.D25250310422 | DOI: 10.35940/ijese.C2525.0310422
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The aim of this article looks into the comprehensive methods in re-architecting a security operations centre (SOC) to protect corporate computing frameworks. Through persistent exploitation using advanced technologies, cyber threat infiltration has caused financial losses to enterprises all over the world. No progress has been made yet in terms of technological improvements, particularly in combining cybersecurity equipment. Cybercriminals, on the other hand, are constantly improving their tools and methodologies in order to breach any business. Multiple exploitations through networks, systems, and phishing emails have resulted in incoming dangers, threats, and vulnerabilities in areas such as data privacy and security due to rapid technological advancement. To protect their working environment, several firms in many sectors have resorted outmoded technologies which are ineffective in the face of advanced persistent threats (APT). Cybersecurity actors are well-equipped groups with extensive knowledge that can infiltrate even the most secure of organizations. Cyber security is seen as a major issue around the world. As a result, dedicated cyber security researchers are analysing both existing dangers and emerging threat approach patterns in order to develop a technique that can be integrated with cybersecurity management.
Keywords: Cyber Security, Data
Scope of the Article: Network Security Trust, & Privacy