Fig. 1. Analytical methodology
Fig. 2. Results of future information security concerns surveyed in 2017
Fig. 3. Comparison of security concerns between KISA and IT executives in 2017
Fig. 4. Comparison of security concerns between FSI and IT executives in 2017
Fig. 5. Results of future information security concerns surveyed in 2018
Fig. 6. Comparison of security concerns between KISA and IT executives in 2018
Fig. 7. Comparison of security concerns between FSI and IT executives in 2018
Fig. 8. Comparing main Keywords of Future Information Security Concerned by Organizations and IT Practitioners
References
- S. Sagiroglu & D. Sinanc. (2013, May). Big data: A review. In Collaboration Technologies and Systems (CTS). 2013 International Conference on. (pp. 42-47). IEEE.
- I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, & S. U. Khan. (2015). The rise of "big data" on cloud computing: Review and open research issues. Information Systems, 47, 98-115. https://doi.org/10.1016/j.is.2014.07.006
- D. Puthal, S. Nepal, R. Ranjan & J. Chen. (2016). Threats to networking cloud and edge datacenters in the internet of things. IEEE Cloud Computing, 3(3), 64-71. https://doi.org/10.1109/MCC.2016.63
- L. Xu, C. Jiang, J. Wang, J. Yuan & Y. Ren. (2014). Information security in big data: privacy and data mining. IEEE Access, 2, 1149-1176. https://doi.org/10.1109/ACCESS.2014.2362522
- Nick Carr. (2017). Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations. FireEye. https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
- E. David. (2017). IT threat evolution Q1. Kasperskylab. https://securelist.com/it-threat-evolution-q1-2017/78452/
- E. David. (2017). IT threat evolution Q2. Kasperskylab. https://securelist.com/it-threat-evolution-q2-2017/79354/
- D. Gray. (2018). IBreaking Down the Rapidly Evolving GandCrab Ransomware. McAfeelab. https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/gandcrab-ransomware/
- A. Rehman & T. Saba. (2014). Evaluation of artificial intelligent techniques to secure information in enterprises. Artificial Intelligence Review, 42(4), 1029-1044. https://doi.org/10.1007/s10462-012-9372-9
- D. Gary. (2018). Breaking Down the Rapidly Evolving GandCrab Ransomware. McAfeelab. https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/gandcrab-ransomware/
- R. Richardson & M. North. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10-21.
- R. Roman, J. Lopez, & M. Mambo. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698. https://doi.org/10.1016/j.future.2016.11.009
- J. L. Tsai & N. W. Lo. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE systems journal, 9(3), 805-815. https://doi.org/10.1109/JSYST.2014.2322973
- KISA. (2017). Prospects for Top 10 Information Protection Issues in 2017. Korea Internet & Security Agency. http://www.kisa.or.kr/public/library/etc_View.jsp?regno=022280&searchType=&searchKeyword=&pageIndex=1
- Financial Security Institute. (2017). The Forecast of the Top 10 Financial IT Security Issues in 2017. http://www.fsec.or.kr/user/bbs/fsec/42/312/bbsDataView/696.do?page=1&column=bbsDataTitle&search=2017&searchSDate=&searchEDate=&bbsDataCategory=
- KISA. (2018). Prospects for Top 10 Internet Issues in 2018. Korea Internet & Security Agency. http://www.kisa.or.kr/public/library/etc_View.jsp?regno=0011859&searchType=&searchKeyword=&pageIndex=1
- Financial Security Institute. (2018). The Forecast of the Top 10 Financial IT Security Issues in 2018. Financial Security Institute. http://www.fsec.or.kr/user/bbs/fsec/42/312/bbsDataView/968.do?page=1&column=bbsDataTitle&search=2018&searchSDate=&searchEDate=&bbsDataCategory=