International Journal of Academic Research in Business and Social Sciences

search-icon

Cyber Security and Cyber Threats in the Jordan Business Context

Open access
In today’s digital world, cyber security has become a top priority for companies, particularly in Jordan. Owing to the fast assimilation of technology and the growing dependence on digital platforms, enterprises in Jordan encounter an extensive array of cyber hazards that have the potential to jeopardize their information, functions, and standing. The purpose of this article is to present a thorough study of the common cyber threats and cyber security strategies in the context of Jordanian company. This research outlines the main cyber threats that Jordanian firms face, including malware, phishing attacks, distributed denial-of-service (DDoS) assaults, and advanced persistent threats (APTs), through a thorough analysis of the literature that has already been published and industry reports. Because these risks have the potential to cause data breaches, financial losses, and operational interruptions, it is crucial that businesses put strong cyber security measures. The paper delves deeper into the cyber security tactics and best practices that Jordanian companies have used to lessen these risks. Implementing intrusion detection and prevention systems, firewalls, encrypting critical data, carrying out frequent vulnerability assessments, and raising employee understanding of cybersecurity through training and educational initiatives are some of these precautions. Through an analysis of the consequences of cyberattacks and the efficacy of different cyber security strategies, this research offers important information that Jordanian companies may use to improve their cyber resilience. It also emphasizes how crucial it is for the public and commercial sectors to work together with cybersecurity specialists to create a thorough cybersecurity framework that protects the country’s digital infrastructure and promotes a safe business climate.
Ahmad, A., Webb, J., Desouza, K. C., & Boorman, J. (2019). Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. Computers & Security, 86, 402-418.
Aldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues. Future internet, 11(3), 73.
Alghusin, N., & Al-Ajlouni, M. I. (2020). Transformational leadership as an antecedent for organisational commitment and job performance in the banking sector of Jordan. International Journal of Productivity and Quality Management, 30(2), 186-213.
Al?ma'aitah, M. A. (2022). Investigating the drivers of cybersecurity enhancement in public organizations: The case of Jordan. The Electronic Journal of Information Systems in Developing Countries, 88(5), e12223.
Al?ma'aitah, M. A. (2022). Investigating the drivers of cybersecurity enhancement in public organizations: The case of Jordan. The Electronic Journal of Information Systems in Developing Countries, 88(5), e12223.
AlSobeh, A. M. R., AlAzzam, I., Shatnawi, A. M. J., & Khasawneh, I. (2023). Cybersecurity awareness factors among adolescents in Jordan: Mediation effect of cyber scale and personal factors. Online Journal of Communication and Media Technologies, 13(2), e202312.
Altulaihan, E., Almaiah, M. A., & Aljughaiman, A. (2022). Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions. Electronics, 11(20), 3330.
Amer, T. B., & Al-Omar, M. I. A. (2023). The Impact of Cyber Security on Preventing and Mitigating Electronic Crimes in the Jordanian Banking Sector. International Journal of Advanced Computer Science and Applications, 14(8).
Amer, T. B., & Al-Omar, M. I. A. (2023). The Impact of Cyber Security on Preventing and Mitigating Electronic Crimes in the Jordanian Banking Sector. International Journal of Advanced Computer Science and Applications, 14(8).
Aswathy, S. U., Tyagi, A. K., & Kumari, S. (2021). The Future of Edge Computing with Blockchain Technology: Possibility of Threats, Opportunities, and Challenges. Recent Trends in Blockchain for Information Systems Security and Privacy, 261-292.
Cappelli, D. M., Moore, A. P., & Trzeciak, R. F. (2012). The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley.
Darwazeh, N. S., Al-Qassas, R. S., & AlDosari, F. (2015). A secure cloud computing model based on data classification. Procedia Computer Science, 52, 1153-1158.
Diwan, T. D. (2021). An investigation and analysis of cyber security information systems: latest trends and future suggestion. Information Technology in Industry, 9(2), 477-492.
Erbschloe, M. (2004). Trojans, worms, and spyware: a computer security professional's guide to malicious code. Elsevier.
Ikitemur, G. (2014). Enhancing cyber security in Turkey through effective public and private cooperation. The University of Texas at Dallas.
Imam, M., Wajid, M. A., Bhushan, B., Hameed, A. A., & Jamil, A. (2023, September). Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends. In International Conference on Emerging Trends and Applications in Artificial Intelligence (pp. 570-588). Cham: Springer Nature Switzerland.
Jimmy, F. N. U. (2024). Cyber security Vulnerabilities and Remediation Through Cloud Security Tools. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 2(1), 129-171.
Jørgensen, N. (2022). Contentious expertise: Hacking mobile phones, changing mobile technology. First Monday, 27(3).
Kala, E. M. (2023). The impact of cyber security on business: how to protect your business. Open Journal of Safety Science and Technology, 13(2), 51-65.
Kanaan, A., AL-Hawamleh, A., Aloun, M., Alorfi, A., & Abdalwahab Alrawashdeh, M. (2024). Fortifying Organizational Cyber Resilience: An Integrated Framework for Business Continuity and Growth amidst Escalating Threat Landscapes. International Journal of Computing and Digital Systems, 16(1), 1-13.
Lacuška, M., & Perá?ek, T. (2021). Trends in global telecommunication fraud and its impact on business. Developments in Information & Knowledge Management for Business Applications: Volume 1, 459-485.
Mohebbi, S., Zhang, Q., Wells, E. C., Zhao, T., Nguyen, H., Li, M., ... & Ou, X. (2020). Cyber-physical-social interdependencies and organizational resilience: A review of water, transportation, and cyber infrastructure systems and processes. Sustainable Cities and Society, 62, 102327.
Mokhor, V., Honchar, S., & Onyskova, A. (2020, October). Cybersecurity Risk Assessment of Information Systems of Critical Infrastructure Objects. In 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T) (pp. 19-22). IEEE.
Naaman, D. W., Rasheed, B. H., Ahmed, B. T., Salih, A. Y., & Mustafa, S. H. (2022). Design a Real-time Communication System using 3CX Software-based Private Branch Exchange Phone System on Raspberry Pi Device. Asian Journal of Research in Computer Science, 13(4), 34-45.
Naseer, I. (2020). Cyber Defense for Data Protection and Enhancing Cyber Security Networks for Military and Government Organizations. MZ Computing Journal, 1(1).
Obaidat, M. A., Obeidat, S., Holst, J., Al Hayajneh, A., & Brown, J. (2020). A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers, 9(2), 44.
Obeidat, Z. M., Xiao, S. H., al Qasem, Z., & Obeidat, A. (2018). Social media revenge: A typology of online consumer revenge. Journal of Retailing and Consumer Services, 45, 239-255.
Okpa, J. T., Ajah, B. O., Nzeakor, O. F., Eshiotse, E., & Abang, T. A. (2023). Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria. Security Journal, 36(2), 350-372.
Owen, H., Zarrin, J., & Pour, S. M. (2022). A survey on botnets, issues, threats, methods, detection and prevention. Journal of Cybersecurity and Privacy, 2(1), 74-88.
Saxena, N., Hayes, E., Bertino, E., Ojo, P., Choo, K. K. R., & Burnap, P. (2020). Impact and key challenges of insider threats on organizations and critical businesses. Electronics, 9(9), 1460.
Schoenherr, J. R., Lilja-Lolax, K., & Gioe, D. (2022). Multiple Approach Paths to Insider Threat (MAP-IT): Intentional, Ambivalent and Unintentional Insider Threats. Counter-Insider Threat Research and Practice, 1(1).
Sindiren, E., & Ciylan, B. (2018). Privileged account management approach for preventing insider attacks. International Journal of Computer Science and Network Security, 18(1), 33-42.
Verma, A., & Shri, C. (2022). Cyber security: A review of cyber crimes, security challenges and measures to control. Vision, 09722629221074760.
(Alrkeebat, 2024)
Alrkeebat, A. A. S. (2024). Cyber Security and Cyber Threats in the Jordan Business Context. International Journal of Academic Research in Business and Social Sciences, 14(6), 1816–1827.