20Jan 2017


  • Cihan University/Sulaymaniyah. Utara University Malaysia.
Crossref Cited-by Linking logo
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

The purpose of this paper was to study information security threats, information threat, and security threats source with a threat agents. It focused on the meaning of hackers and perceptions of public against the word ‘‘hackers’’ with a special emphasis on different types of hackers within organizations and in the society. The empirical literatures provide the best way to prevent the problems of hacking in the society and shows that white hats, black hats and spy hackers motivation strategies are largely involved and effective to check organizations performance. It proposes quantitative approach with the design and descriptive for this study. The questionnaires will be used will be selected as a means to collect data with a simple random sample of the company\\\'s employees as observers / participants in the study.

  1. Abdulkadir, s. S., &dzarma, d. E. (2015).security threats analysis of ibrahimbabangida library, modibboadama university of technology, yola.international journal of innovation and scientific research, 13(2), 591-597.
  2. Action fraud. (2011). Accessed 31 october2016 http://actionfraud.org.uk/what-is-fraud
  3. Afyouni, h. (2006). Database security and auditing: protecting data integrity and accessibility, thomson course, canada.
  4. Alhabeeb, m., almuhaideb, a., le, p., &srinivasan, b. (2010, april). Information security threats classification pyramid. In advanced information networking and applications workshops (waina), 2010 ieee 24th international conference on(pp. 208-213). Ieee.
  5. Ateeq, a. (2012). ‘type of security threats and it’s prevention’, international journal of computer technology and applications, vol.3, no.2, pp.750-752.
  6. Ayuso, p.n., gasca, r.m., lefevre, lft-fw.(2012). A cluster-basedfaulttolerant architecture for stateful?rewalls.computers& security; 31(4):524e39.
  7. Baker, w., goudie, m., hutton a., hylender, c., niemantsverdriet j, &novak, c, (2010).verizon 2010 data breach investigations report.
  8. Bompard, e., huang, t., wu, y., &cremenescu, m. (2013).classification and trend analysis of threats origins to the security of power systems. International journal of electrical power & energy systems50, 50-64.
  9. Bratus, s. (2007). What hackers learn that the rest of us don’t. Ieee security and privacy.
  10. Brown, b. (2009). Help prevent computer theft, palmerston north, new zealand.
  11. Choo,. (2011). The cyber threat landscape: challenges and future research directions. Computers & security; 30(8):719e31.
  12. Cyber-media (2006). Increase in cyber-attack against home users retrieved from http://www.ciol.com/ciol-techportal/content/security/news/2006/2061010859.asp
  13. Damico, t. M. (2009). \"cyber attack prevention for the home user: how to prevent a cyber attack.\"inquiries journal/student pulse, 1(11). Retrieved from http://www.inquiriesjournal.com/a?id=47
  14. Dashora, k. (2011). Cyber crime in the society: problems and preventions. Journal of alternative perspectives in the social sciences, 3(1), 240-259.
  15. Desai, m., patel, s., somaiya, p., &vishwanathan, v. (2016). Prevention of distributed denial of service attack using web referrals: a review.
  16. Dezfouli, f. N., dehghantanha, a., mahmod, r., sani, n. F. B. M., shamsuddin, s. B., &daryabar, f. (2013). A survey on malware analysis and detection techniques.international journal of advancements in computing technology, 5(14), 42.
  17. Easttom, c. (2006). Computer security fundamental, pearson prentice hall, united states of america.
  18. Engebretson, p. (2013). The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier.
  19. Farahmand, f., navathe ,s.b., sharp, g.p., &enslow, ph. (2005). A management perspective on risk of security threats to information systems, information technology and management archive; 202-225.
  20. Ferrari, e., &thuraisingham, b. (2006). Guest editorial: special issue on privacy preserving data management. The vldb journal15(4), 291-292.
  21. Greitzer, f. L., strozer, j. R., cohen, s., moore, a. P., mundie, d., &cowley, j. (2014, may). Analysis of unintentional insider threats deriving from social engineering exploits. In security and privacy workshops (spw), 2014 ieee(pp. 236-250). Ieee.
  22. merriam-webster.com. Merriam-webster.(2013). Web. 9th december 2013.
  1. Hackingalert (2008).hacker tricks and prevention techniques.retrieved, from http://www.hackingalert.com/hacking-articles/hacker-tricks.php.
  2. Hansen, j.v., lowry, p.b., meservy, r., &mcdonald, d. (2007).genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection.decision support systems; 43(4):1362e74.
  3. Hayes, r. (2014). Retail security and loss prevention.butterworth-heinemann.
  4. Jamil, d., & khan, m. N. A. (2011). Is ethical hacking ethical?. International journal of engineering science and technology (ijest), issn, 0975-5462.
  5. Jansen, w. A. (2011, january). Cloud hooks: security and privacy issues in cloud computing. In system sciences (hicss), 2011 44th hawaii international conference on (pp. 1-10).ieee.
  6. Jee, j. E., lee, s. J., lee, s. R., bae, b. C., & shin, y. T. (2012). A logical network partition scheme for cyber hacking and terror attacks. Journal of kiise: information networking, 39(1), 95-101.
  7. Jouini, m., rabai, l. B. A., &aissa, a. B. (2014).classification of security threats in information systems. Procedia computer science32, 489-496.
  8. Loader, b. D., &thomas, d. (eds.). (2013). Cybercrime: security and surveillance in the information age. Routledge.
  9. Marchewka, j. T. (2014). Information technology project management.johnwiley& sons.
  10. Padmanabhan, s. (2012).hacking for lulz: employing expert hackers to combat cyber terrorism.  J. Ent. & tech. L., 15, 191.
  11. Ponemon institute. (2014).cost of data breach.ibm. Available:http://www-935.ibm.com/services/us/en/it-services/security-services/cost-of-data-breach/ accessed 1st, november, 2016.
  12. Posey, c., bennettr.j, &roberts, t.l. (2011).understanding the mindset of the abusive insider: an examination of insiders’ causal reasoning following internal security changes.computers&security.30(6e7):486e97.
  13. Richardson, r. (2010/2011).csi computer crime and security survey, http://www.gocsi.com; 2011.
  14. Robert, siciliano. (mar 6, 2011). Https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/
  15. Sabahi, f. (2011, may). Cloud computing security threats and responses. In communication software and networks (iccsn), 2011 ieee 3rd international conference on(pp. 245-249). Ieee.
  16. Sanglakhi, a. (2013). Hackers and the internet.
  17. Shaluf, i. (2007). ‘an overview on disaster’, disaster prevention and management, vol.16, no.5, pp.687-717.
  18. Shedden, p., smith, w., &ahmad, a. (2010).information security risk assessment: towards a business practice perspective.
  19. Shim, j., qureshi, a. A., &siegel, j. G. (2013). The international handbook of computer security.routledge.
  20. Shiu, s., baldwin, a., beres, y., mont, m.c., &duggan, g. (2011).economic methods and decision making by security professionals.the tenth workshop on the economics of information security (weis).
  21. Silowash, g. J., cappelli, d. M., moore, a. P., trzeciak, r. F., shimeall, t., &flynn, l. (2012).common sense guide to mitigating insider threats.
  22. Solomon, m., &chapple, m. (2005).information security illuminated, jones and bartlett, united states of america.
  23. Stanton, j.m, stam, k.r, mastrangelo, p, &jolton, j. (2005).analysis of end user security behaviors.computers& security. 24(2):124e33.
  24. Swiderski, f., &snyder, w. (2004).threat modelling microsoft press.
  25. Top layer security (2008). Securing tomorrow’s networks today. Retrieved, 2008, from http://www.toplayernetworks.com/content/resource/faq.jsp.
  26. Vacca, j. (2009). Computer and information security handbook, burlington, ma: morgankaufmann.
  27. Von solms, r., & van niekerk, j. (2013).from information security to cyber security.computers& security, 38, 97-102.
  28. Walters, r. (2014). Cyber-attacks on us companies in 2014. Heritage foundation issue brief, (4289).
  29. Warkentin, m., &willison, r. (2009).behavioral and policy issues in information systems security: the insider threat. European journal of information systems. 18(2):101e5.
  30. Whitman, m. E., &mattord, h. J. (2008).management of information security, course technology.
  31. Xu, z., hu, q., &zhang, c. (2013). Why computer talents become computer hackers. Communications of the acm56(4), 64-74.
  32. Zafar, h., &clark, j.g. (2009).current state of information security research in is.communications of the association for information systems; 24(34):557e96.
  33. Zhi-jun, w., hai-tao z., ming-hua w., &bao-song, p. (2012). Msabms-based approach of detecting ldosattack.computers& security 31(4):402e17.

[MunadhilAbduljabar Alsalim, Ahmed Munadhil Alsalim, Amr Hail Ghilan Al-madhagi and Salah Mortada Shahen. (2017); INFORMATION SECURITY THREATS: COMPUTER HACKING. Int. J. of Adv. Res. 5 (1). 349-356] (ISSN 2320-5407). www.journalijar.com

Munadhil Abduljabar Alsalim, Ahmed Munadhil Alsalim, Amr Hai
Cihan University/Sulaymaniyah


Article DOI: 10.21474/IJAR01/2753       DOI URL: http://dx.doi.org/10.21474/IJAR01/2753

Share this article