Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview
-
Published:2023-03-06
Issue:
Volume:
Page:57-63
-
ISSN:
-
Container-title:Mesopotamian Journal of Cyber Security
-
language:
-
Short-container-title:MJCS
Author:
Mijwil Maad1, Unogwu Omega John2, Filali Youssef3, Bala Indu4, Al-Shahwani Humam5
Affiliation:
1. Baghdad College of Economic Sciences University 2. Department of Computer Science, Azteca University, Chalco, Mexico 3. Department of Computer Science, Faculty of Sciences Dhar-Mahraz, University of Sidi Mohamed Ben Abdellah, Fez, Morocco 4. School of Electrical and Electronics Engineering, Lovely Professional University, Punjab, India 5. Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka, Malacca, Malaysia
Abstract
The term cybersecurity refers to an environment capable of protecting digital devices, networks and information from unauthorized access and preventing data theft or alteration. It is composed of a collection of carefully crafted techniques, processes, and practices to protect sensitive information and deterring cyber-attacks. In the recent period, the domain of cybersecurity has undergone rapid growth in response to the increasing cyber threats. Cybersecurity includes important tactics that help protect the digital environment, which are firewalls, encryption, secure passwords, and threat detection and response systems. Employees must be trained on these tactics. This article will discuss the five most pressing challenges facing the cybersecurity industry today that must be taken into account by businesses, organizations, and individuals in order to secure their confidential data from cybercrime. The conclusion of the article highlighted the significance of growing awareness about cybersecurity risks in order to effectively handle digital environments and protect them from any electronic threats.
Publisher
Mesopotamian Academic Press
Subject
History,Sociology and Political Science,Ophthalmology,General Medicine,Ophthalmology,General Medicine,Ophthalmology,Orthopedics and Sports Medicine,Physical Therapy, Sports Therapy and Rehabilitation,Education,Organizational Behavior and Human Resource Management,Sociology and Political Science,Industrial relations,Infectious Diseases,Virology,Rheumatology,Rheumatology
Reference40 articles.
1. Fauziyah F., Wang Z., and Joy G., “Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT),” Journal of Information Security, vol.13, no.4, pp:294-311, October 2022. https://doi.org/10.4236/jis.2022.134016 2. Mijwil M. M., Doshi R., Hiran K. K., Al-Mistarehi AH, and Gök M., “Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects,” Mesopotamian journal of cybersecurity, vol.2022, pp:1-4, 2022. https://doi.org/10.58496/MJCS/2022/001 3. Mijwil M. M., Sadıkoğlu E., Cengiz E., and Candan H., “Siber Güvenlikte Yapay Zekanın Rolü ve Önemi: Bir Derleme,” Veri Bilimi, vol.5, no.2 pp:97-105, December 2022. 4. Georgiadou A., Mouzakitis S., and Askounis D., “Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework,” Sensors, vol.21, no.9, pp:1-14, May 2021. https://doi.org/10.3390/s21093267 5. Yamin M. M., Ullah M., Ullah H., and Katt B., “Weaponized AI for cyber attacks,” Journal of Information Security and Applications, vol.57, pp:102722, March 2021. https://doi.org/10.1016/j.jisa.2020.102722
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|