计算机科学
计算机安全
量子计算机
密码学
量子
物理
量子力学
摘要
Purpose: The general objective of the study was to explore cybersecurity threats and mitigation strategies in the age of quantum computing. Methodology: The study adopted a desktop research methodology. Desk research refers to secondary data or that which can be collected without fieldwork. Desk research is basically involved in collecting data from existing resources hence it is often considered a low cost technique as compared to field research, as the main cost is involved in executive’s time, telephone charges and directories. Thus, the study relied on already published studies, reports and statistics. This secondary data was easily accessed through the online journals and library. Findings: The findings reveal that there exists a contextual and methodological gap relating to cybersecurity threats and mitigation strategies in the age of quantum computing. Preliminary empirical review revealed that quantum computing posed a significant threat to current cybersecurity measures by potentially rendering traditional cryptographic systems obsolete. It highlighted that existing encryption methods, such as RSA and ECC, were vulnerable to the powerful computational capabilities of quantum algorithms like Shor's algorithm. The research emphasized the urgent need for the development and integration of quantum-resistant cryptographic techniques and strategies to ensure continued security. It also concluded that, while quantum computing introduced substantial risks, it offered opportunities for innovation in cybersecurity, requiring proactive measures and strategic planning to address these emerging threats effectively. Unique Contribution to Theory, Practice and Policy: The Theory of Quantum Computing and Quantum Cryptography, Information Security Management Theory and Complexity Theory may be used to anchor future studies on cybersecurity threats and mitigation strategies in the age of quantum computing. The study recommended several key actions to address the cybersecurity challenges posed by quantum computing. It suggested accelerating research and development into post-quantum cryptographic algorithms and integrating these quantum-resistant solutions into current security infrastructures. The study also recommended enhancing cybersecurity education and training to prepare professionals for quantum-related challenges. Additionally, it advocated for promoting collaborative research between academia, industry, and government, developing strategic risk management frameworks, and engaging in policy advocacy to establish standards for quantum-safe technologies. These measures were intended to ensure that both theoretical and practical aspects of cybersecurity could effectively address the evolving threats of quantum computing.
科研通智能强力驱动
Strongly Powered by AbleSci AI