Protecting Computer Systems Against Cyber Threats: Strategies, Technologies, and Best Practices

Main Article Content

MALOANI SAIDI Georges

Abstract

Cybersecurity has become a major concern for businesses and institutions in the face of increasing cyberattacks. This study analyzes the strategies, technologies, and best practices used to protect computer systems against digital threats. The literature review highlights the importance of a holistic approach, integrating frameworks such as ISO 27001 and NIST, as well as risk management policies. Technological advances, particularly artificial intelligence (AI) and blockchain, strengthen data detection and protection, although their adoption remains limited. Survey results show that 55 percent of companies have a formal strategy, but the human factor remains the weak link, with 90 percent of successful attacks due to human errors. The Zero Trust model is emerging as an effective solution, requiring strict access verification. However, several challenges persist, including the lack of resources, the complexity of regulations, and the constantly evolving nature of threats. Recommendations include increased staff training, better cybersecurity governance, and greater integration of advanced technologies. A proactive approach combining awareness, technological innovation, and a clear regulatory framework is essential to ensure the resilience of IT infrastructures in the face of growing cyber threats.

Article Details

Section

Research Article

References

A. Livres et ouvrages académiques

• Djimgou Ngameni, P. (2024). Cyberstratégie Africaine Tome 1 : Gouvernance et politiques de cybersécurité en Afrique. LARC Africa.

• Ghernaouti, S. (2013). La Cybersécurité: Un enjeu global, un défi stratégique. Presses polytechniques et universitaires romandes.

• Kalonji, T. (2011). Cybersécurité et renseignement en Afrique subsaharienne. Éditions Universitaires Européennes.

B. Articles scientifiques et conférences

• Mazurczyk, W., Lubacz, J., Mazurczyk, P. (2015). Applying an ecological perspective to cybersecurity. Journal of Cybersecurity, Vol. 1, Issue 1, pp. 1-16.

• Mohamed, A. Y., Kamau, S. K. (2023). A Continent-Wide Assessment of Cyber Vulnerability Across Africa. African Journal of Cybersecurity Studies, Vol. 5, Issue 2.

• Rahman, Z., Yi, X. (2022). Integrating Blockchain and AI for Cybersecurity in Industry 4.0. Cyber Defense Journal, Vol. 3, pp. 78-94.

• Haruna, W., Aremu, T. A., Modupe, Y. A. (2022). Defending against cybersecurity threats to the payments and banking system. African Cybersecurity Review, Vol. 4, Issue 1.

C. Rapports et publications officielles

• ENISA (Agence européenne pour la cybersécurité) (2023). Threat Landscape Report 2023: Cybersecurity Trends and Challenges in Europe.

• NIST (National Institute of Standards and Technology) (2022). Framework for Improving Critical Infrastructure Cybersecurity – Version 2.0.

• IBM Security (2023). X-Force Threat Intelligence Index 2023. IBM Corporation.

D. Sites Web et ressources numériques

• Secureframe.com (2023). Guide sur le cadre de cybersécurité NIST et ses implications pour les entreprises. Consulté en ligne : https://secureframe.com/fr-fr/blog/nist-csf-framework

• Centre Borelli (2023). Le système SmartCheck. Consulté en ligne : https://centreborelli.ens-paris-saclay.fr/fr/le-systeme-smartcheck

• ITSocial.fr (2023). Comment la blockchain renforce-t-elle la cybersécurité ?. Consulté en ligne : https://itsocial.fr/tribunes/comment-la-blockchain-renforce-t-elle-la-cybersecurite/

• Le Monde (2024). Les défis de la cybersécurité en entreprise : manque de talents et évolution des menaces. Consulté en ligne : https://www.lemonde.fr/economie/article/2024/10/12/les-defis-de-la-cybersecurite-en-entreprise-manque-de-talents-et-evolution-des-menaces_6349704_3234.html

• TEHTRIS (2018). Qu’est-ce qu’une stratégie holistique en cybersécurité ?. Consulté en ligne : https://tehtris.com/fr/blog/a-quoi-ressemble-une-strategie-holistique-en-cybersecurite

Similar Articles

You may also start an advanced similarity search for this article.