Affiliation:
1. Brainware University, India
Abstract
Systems for monitoring cybersecurity are now crucial instruments for safeguarding digital assets and fending off numerous attacks. This chapter covers the various uses, challenges, and new developments of using surveillance systems in order to enhance cybersecurity. Discussion themes include threat detection, incident response, insider threat identification, and vulnerability management. The primary challenges—including data overload, false positives, privacy concerns, skill gaps, regulatory compliance, adaptive threats, and cultural acceptance—are also exhaustively examined. The report also covers recent advancements, such as the use of zero trust architectures, the development of behavioral analytics, and the blending of AI and ML technologies. By addressing these problems and implementing these trends, organizations can strengthen their entire cybersecurity posture.
Reference20 articles.
1. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., . . . Zhou, Y. (2017). Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17) (pp. 1093-1110). USENIX.
2. MapReduce based intelligent model for intrusion detection using machine learning technique.;M.Asif;Journal of King Saud University. Computer and Information Sciences,2021
3. Insider Threat Detection Using Machine Learning Approach
4. Chander, B., Pal, S., De, D., & Buyya, R. (2022). Artificial intelligence-based internet of things for industry 5.0. Artificial intelligence-based internet of things systems, 3-45.
5. Cybersecurity, C. I. (2018). Framework for improving critical infrastructure cybersecurity. https://nvlpubs. nist. gov/nistpubs/CSWP/NIST