Cyber Security in Data Breaches
Ayed Aldossary ;
Talal Algirim ;
Ibrahim Almubarak ;
Khalid Almuhish
Published: 2024/12/09
Abstract
In today's increasingly digital world, cyber-attacks have emerged as one of the most pressing threats to individuals, organizations, and national infrastructure. The consequences of such attacks are far-reaching, including financial losses, disruptions to daily operations, exposure of sensitive data, and even risks to public safety and national security. As cyber threats grow in frequency and sophistication, the ability to detect and prevent them becomes more critical. Notably, social media has shown potential as a tool for early detection of cyber incidents, with users acting as real-time social sensors. However, leveraging open-source indicators from social media remains a complex challenge due to the unstructured nature of the data and potential misinformation. Furthermore, as the integration of emerging technologies becomes central to business efficiency and innovation, the corresponding increase in cyber vulnerabilities poses significant risks. Data breaches—whether intentional or accidental—represent a persistent danger to organizations of all sizes, often involving the unauthorized exposure of confidential personal and corporate information. To address these threats, this paper explores technical cybersecurity practices such as the deployment of firewalls, malware protection, intrusion detection systems (IDS), and other defense mechanisms that help eliminate vulnerabilities and strengthen digital resilience. The paper emphasizes the importance of a proactive, multi-layered cybersecurity strategy to safeguard data and ensure secure, trustworthy digital environments.
Keywords
How to Cite the Article
Aldossary, A., Algirim, T., Almubarak, I., & Almuhish, K. (2024). Cyber Security in Data Breaches. Journal of Cyber Security and Risk Auditing, 2024(1), 14–22.https://doi.org/10.63180/jcsra.thestap.2024.1.3
Cyber Security in Data Breaches is licensed under CC BY 4.0
References
- Mu, X., & Antwi-Afari, M. F. (2024). The applications of Internet of Things (IoT) in industrial management: A science mapping review. International Journal of Production Research, 62(5), 1928–1952.
- Al-Mekhlafi, Z. G., Al-Janabi, H. D. K., Khalil, A., Al-Shareeda, M. A., Mohammed, B. A., Alsadhan, A. A., Alayba, A. M., Saleh, A. M. S., Al-Reshidi, H. A., & Almekhlafi, K. (2024). Lattice-based cryptography and fog computing-based efficient anonymous authentication scheme for 5G-assisted vehicular communications. IEEE Access.
- Kalpana, M. M. (2025). Survey and analysis of home automation system encompassing embedded systems, the Internet of Things (IoT) and AI algorithms. Vidhyayana – An International Multidisciplinary Peer-Reviewed E-Journal, 10(SI4).
- Nassereddine, M., & Khang, A. (2024). Applications of Internet of Things (IoT) in smart cities. In Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy (pp. 109–136). CRC Press.
- Al-Shareeda, M. M. A., Anbar, M., Alazzawi, M. A., Manickam, S., & Hasbullah, I. H. (2020). Security schemes based conditional privacy-preserving in vehicular ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science, 21(1).
- Santhikiran, B., Nagaraju, L., Sattar, S. A., Chandra, D. B., & Jayasankar, Y. (2023). Design and implementation of smart home system based on IoT and ESPRainmaker. International Transactions on Electrical Engineering and Computer Science, 2(2), 70–79.
- Hossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S., & Islam, S. R. (2024). A holistic analysis of Internet of Things (IoT) security: Principles, practices, and new perspectives. Future Internet, 16(2), 40.
- Al-Shareeda, M. A., Anbar, M., Manickam, S., Hasbullah, I. H., Abdullah, N., Hamdi, M. M., & Al-Hiti, A. S. (2020). NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs). Applied Mathematics, 14(6), 1–10.
- Uzoka, A., Cadet, E., & Ojukwu, P. U. (2024). The role of telecommunications in enabling Internet of Things (IoT) connectivity and applications. Comprehensive Research and Reviews in Science and Technology, 2(02), 055–073.
- Al-Shareeda, M. A., Manickam, S., Saare, M. A., & Arjuman, N. C. (2023). Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network. Indonesian Journal of Electrical Engineering and Computer Science, 29, 518–526.
- Mustofa, A. A., Dagnew, Y. A., Gantela, P., & Idrisi, M. J. (2023). SECHA: A smart energy-efficient and cost-effective home automation system for developing countries. Journal of Computer Networks and Communications, 2023(1), 8571506.
- Aghenta, L. O., & Iqbal, T. (2019). Design and implementation of a low-cost, open source IoT-based SCADA system using ESP32 with OLED, ThingsBoard and MQTT protocol. IMS Electronics and Electrical Engineering, 4(1), 57–86.
- Al-Shareeda, M. A., Manickam, S., & Saare, M. A. (2022). Intelligent drone-based IoT technology for smart agriculture system. In 2022 International Conference on Data Science and Intelligent Computing (ICDSIC) (pp. 41–45). IEEE.
- Siswanto, A., Efendi, A., & Kadir, E. A. (2023). Biometric face authentication system for secure smart office environments. Indonesian Journal of Electrical Engineering and Computer Science, 32(2), 1134–1141.
- Irugalbandara, I. C., Naseem, A., Perera, M., & Logeeshan, V. (2022). HOMEIO: Offline smart home automation system with automatic speech recognition and household power usage tracking. In 2022 IEEE World AI IoT Congress (AIIoT) (pp. 571–577). IEEE.
- Litayem, N. (2024). Scalable smart home management with ESP32-S3: A low-cost solution for accessible home automation. In 2024 International Conference on Computer and Applications (ICCA) (pp. 1–7). IEEE.
- Jion, M. S. A., & Ahmad, M. (2024). A smart and secured office system using IoT. In 2024 International Conference on Advances in Computing, Communication, Electrical, and Smart Systems (iCACCESS) (pp. 1–6). IEEE.