- Business Intelligence,
- Communication Technology and New Media,
- Computer and Systems Architecture,
- Data Storage Systems,
- Digital Communications and Networking,
- E-Commerce,
- Information Literacy,
- Management Information Systems,
- Management Sciences and Quantitative Methods,
- Operational Research,
- Science and Technology Studies,
- Social Media and
- Technology and Innovation
Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend against the signature-less attacks. This study will create threat awareness, find out capabilities of threat actors, their motivations and objectives and identify best practices.
Available at: http://works.bepress.com/emmanuel-opara/2/