A dynamic security model for addressing hacking risk factors

Saad Abdullah Alsunbul, Phu Dung Le, Jan Newmarch, Jefferson Tan

Research output: Book chapter/Published conference paperConference paperpeer-review

3 Downloads (Pure)


Communication technologies have a significant influence on the business industry. Exchanging information, storing and retrieving data, and cutting communication costs are prime reasons for relying heavily on these technologies. However, these technologies are significantly affected by hacking. Due to neglecting the behaviour of hackers during the initial design stage of common security solutions, including firewalls, Intrusion Detection Systems, Intrusion Detection and Prevention Systems, Honeypot and Honeynet, successful hacking attempts still exist. This paper aims to investigate pre-hacking steps (footprinting, scanning, and enumeration) and to highlight the risk factors that are not considered during the development of current security solutions. These risk factors are the common causes of the failures of current security solutions against many hacking attempts. Moreover, this paper proposes a dynamic security model to guide security researchers towards proposing security countermeasures that address these risk factors, which eventually lead to minimising hacking risks.
Original languageEnglish
Title of host publicationISD2016 Proceedings
Place of PublicationPoland
PublisherAssociation for Information Systems
Number of pages9
ISBN (Electronic)9788378753070
Publication statusPublished - 2016
EventThe 25th International Conference on Information Systems Development: ISD2016 - University of Economics, Katowice, Poland
Duration: 24 Aug 201626 Aug 2016
http://www.isd2016.ue.katowice.pl/ (Conference website)


ConferenceThe 25th International Conference on Information Systems Development
Abbreviated titleComplexity in Information Systems Development
Internet address


Dive into the research topics of 'A dynamic security model for addressing hacking risk factors'. Together they form a unique fingerprint.

Cite this