IDEAS home Printed from https://ideas.repec.org/a/bhx/ojtjts/v6y2024i5p1-14id2145.html
   My bibliography  Save this article

Cybersecurity Threats and Mitigation Strategies in the Age of Quantum Computing

Author

Listed:
  • Debby Umar

Abstract

Purpose: The general objective of the study was to explore cybersecurity threats and mitigation strategies in the age of quantum computing. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to cybersecurity threats and mitigation strategies in the age of quantum computing. Preliminary empirical review revealed that quantum computing posed a significant threat to current cybersecurity measures by potentially rendering traditional cryptographic systems obsolete. It highlighted that existing encryption methods, such as RSA and ECC, were vulnerable to the powerful computational capabilities of quantum algorithms like Shor's algorithm. The research emphasized the urgent need for the development and integration of quantum-resistant cryptographic techniques and strategies to ensure continued security. It also concluded that, while quantum computing introduced substantial risks, it offered opportunities for innovation in cybersecurity, requiring proactive measures and strategic planning to address these emerging threats effectively. Unique Contribution to Theory, Practice and Policy: The Theory of Quantum Computing and Quantum Cryptography, Information Security Management Theory and Complexity Theory may be used to anchor future studies on cybersecurity threats and mitigation strategies in the age of quantum computing. The study recommended several key actions to address the cybersecurity challenges posed by quantum computing. It suggested accelerating research and development into post-quantum cryptographic algorithms and integrating these quantum-resistant solutions into current security infrastructures. The study also recommended enhancing cybersecurity education and training to prepare professionals for quantum-related challenges. Additionally, it advocated for promoting collaborative research between academia, industry, and government, developing strategic risk management frameworks, and engaging in policy advocacy to establish standards for quantum-safe technologies. These measures were intended to ensure that both theoretical and practical aspects of cybersecurity could effectively address the evolving threats of quantum computing.

Suggested Citation

  • Debby Umar, 2024. "Cybersecurity Threats and Mitigation Strategies in the Age of Quantum Computing," Journal of Technology and Systems, CARI Journals Limited, vol. 6(5), pages 1-14.
  • Handle: RePEc:bhx:ojtjts:v:6:y:2024:i:5:p:1-14:id:2145
    as

    Download full text from publisher

    File URL: https://carijournals.org/journals/index.php/JTS/article/view/2145/2533
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojtjts:v:6:y:2024:i:5:p:1-14:id:2145. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/JTS/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.