COMMON CYBERSECURITY VULNERABILITIES: SOFTWARE BUGS, WEAK PASSWORDS, MISCONFIGURATIONS, SOCIAL ENGINEERING

COMMON CYBERSECURITY VULNERABILITIES: SOFTWARE BUGS, WEAK PASSWORDS, MISCONFIGURATIONS, SOCIAL ENGINEERING

Authors

DOI:

https://doi.org/10.62304/jieet.v3i04.193

Keywords:

Cybersecurity, Software Bugs, Weak Passwords, Misconfigurations, Social Engineering, Vulnerabilities, Information Security

Abstract

This systematic review examines the most significant cybersecurity vulnerabilities, employing the PRISMA methodology to analyze findings from a comprehensive selection of 150 recent research articles. The study identifies and explores key vulnerabilities, including phishing, compromised credentials, poor encryption, misconfigurations, malicious insiders, ransomware, and exploited trust relationships. The findings highlight the persistent prevalence of phishing and compromised credentials, driven by evolving attacker tactics and the increasing complexity of remote work environments. Technical vulnerabilities such as inadequate encryption and misconfigurations remain critical issues, emphasizing the need for stringent security protocols and continuous monitoring. Malicious insiders continue to pose substantial risks, necessitating robust access controls and comprehensive employee education. The review also underscores the growing sophistication of ransomware attacks, particularly those employing double extortion tactics, and the significant threat posed by compromised trust relationships between organizations. The study concludes that a holistic approach, integrating advanced technical defenses with human-centric strategies, is essential for enhancing cybersecurity resilience and protecting sensitive information in an ever-evolving digital landscape.

 

Author Biographies

Mahmudul Hasan, Graduate Researcher, Master of Science in Management Information Systems, College of Business, Lamar University, Texas, USA

 

 

 

 

Farhana Zaman Rozony, Graduate Researcher, Master of Science in Management Information Systems, College of Business, Lamar University, Texas, USA

 

 

Md Kamruzzaman, PhD Candidate, Faculty Of Management, Multimedia University, Cyberjaya, Malaysia

 

Md Kazi Shahab Uddin  , Master of Science in Information Technology, Washington University of Science and Technology, Virginia, USA

 

 

 

 

Downloads

Published

2024-08-20

How to Cite

Hasan, M. ., Farhana Zaman Rozony, Md Kamruzzaman, & MdKaziShahabUddin . (2024). COMMON CYBERSECURITY VULNERABILITIES: SOFTWARE BUGS, WEAK PASSWORDS, MISCONFIGURATIONS, SOCIAL ENGINEERING. Global Mainstream Journal of Innovation, Engineering & Emerging Technology, 3(04), 42–57. https://doi.org/10.62304/jieet.v3i04.193
Loading...