Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review

Malwares are growing exponentially and are becoming challenging with time, especially for Small and Medium Enterprises (SMEs). As the backbone of a nation’s economy, SMEs face challenges due to limited knowledge, awareness, and resource constraints. These hurdles hinder their adoption of existing fr...

Full description

Saved in:
Bibliographic Details
Main Authors: Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, Abdulkarim Kanaan Jebna, Kiran Adnan
Format: Article
Language:English
Published: SAGE Publishing 2025-01-01
Series:SAGE Open
Online Access:https://doi.org/10.1177/21582440251314671
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832575853423230976
author Adnan Bin Amanat Ali
Ramesh Kumar Ayyasamy
Rehan Akbar
Abdulkarim Kanaan Jebna
Kiran Adnan
author_facet Adnan Bin Amanat Ali
Ramesh Kumar Ayyasamy
Rehan Akbar
Abdulkarim Kanaan Jebna
Kiran Adnan
author_sort Adnan Bin Amanat Ali
collection DOAJ
description Malwares are growing exponentially and are becoming challenging with time, especially for Small and Medium Enterprises (SMEs). As the backbone of a nation’s economy, SMEs face challenges due to limited knowledge, awareness, and resource constraints. These hurdles hinder their adoption of existing frameworks and policies. Existing studies do not explore vulnerabilities within SMEs regarding their effective compliance with the cybersecurity infrastructure to mitigate malware attacks. This research is conducted through a Systematic Literature Review (SLR) using the PRISMA framework. Through this systematic inquiry, we have successfully identified the vulnerabilities and mitigation factors to deal with malware attacks. This SLR uncovers the vulnerabilities, emphasizing non-compliance with cybersecurity infrastructure. To confront these vulnerabilities, a mapping framework using concept maps is proposed. The study contributes to enhancing SMEs’ awareness about the consequences of non-compliance with cybersecurity infrastructure and equipping them with effective measures for vulnerability management.
format Article
id doaj-art-4e4a99b6fae2472ba815cad68a7d4c5e
institution Kabale University
issn 2158-2440
language English
publishDate 2025-01-01
publisher SAGE Publishing
record_format Article
series SAGE Open
spelling doaj-art-4e4a99b6fae2472ba815cad68a7d4c5e2025-01-31T17:04:43ZengSAGE PublishingSAGE Open2158-24402025-01-011510.1177/21582440251314671Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature ReviewAdnan Bin Amanat Ali0Ramesh Kumar Ayyasamy1Rehan Akbar2Abdulkarim Kanaan Jebna3Kiran Adnan4 Universiti Tunku Abdul Rahman (UTAR), Kampar, Perak, Malaysia Universiti Tunku Abdul Rahman (UTAR), Kampar, Perak, Malaysia School of Computing and Information Sciences Florida International University, Miami, FL, USA Universiti Tunku Abdul Rahman (UTAR), Kampar, Perak, Malaysia Universiti Tunku Abdul Rahman (UTAR), Kampar, Perak, MalaysiaMalwares are growing exponentially and are becoming challenging with time, especially for Small and Medium Enterprises (SMEs). As the backbone of a nation’s economy, SMEs face challenges due to limited knowledge, awareness, and resource constraints. These hurdles hinder their adoption of existing frameworks and policies. Existing studies do not explore vulnerabilities within SMEs regarding their effective compliance with the cybersecurity infrastructure to mitigate malware attacks. This research is conducted through a Systematic Literature Review (SLR) using the PRISMA framework. Through this systematic inquiry, we have successfully identified the vulnerabilities and mitigation factors to deal with malware attacks. This SLR uncovers the vulnerabilities, emphasizing non-compliance with cybersecurity infrastructure. To confront these vulnerabilities, a mapping framework using concept maps is proposed. The study contributes to enhancing SMEs’ awareness about the consequences of non-compliance with cybersecurity infrastructure and equipping them with effective measures for vulnerability management.https://doi.org/10.1177/21582440251314671
spellingShingle Adnan Bin Amanat Ali
Ramesh Kumar Ayyasamy
Rehan Akbar
Abdulkarim Kanaan Jebna
Kiran Adnan
Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
SAGE Open
title Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
title_full Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
title_fullStr Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
title_full_unstemmed Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
title_short Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review
title_sort cybersecurity infrastructure compliance key factors to detect and mitigate malware attacks in smes a systematic literature review
url https://doi.org/10.1177/21582440251314671
work_keys_str_mv AT adnanbinamanatali cybersecurityinfrastructurecompliancekeyfactorstodetectandmitigatemalwareattacksinsmesasystematicliteraturereview
AT rameshkumarayyasamy cybersecurityinfrastructurecompliancekeyfactorstodetectandmitigatemalwareattacksinsmesasystematicliteraturereview
AT rehanakbar cybersecurityinfrastructurecompliancekeyfactorstodetectandmitigatemalwareattacksinsmesasystematicliteraturereview
AT abdulkarimkanaanjebna cybersecurityinfrastructurecompliancekeyfactorstodetectandmitigatemalwareattacksinsmesasystematicliteraturereview
AT kiranadnan cybersecurityinfrastructurecompliancekeyfactorstodetectandmitigatemalwareattacksinsmesasystematicliteraturereview