Study of Cyber Security Challenges and Their Impact

Year : 2024 | Volume :02 | Issue : 01 | Page : 7-12
By

Yogesh Rai,

Ritu Vishwakarma,

  1. Assistant Professor Department of Computer Science & Engineering, Corporate Institute of Science and Technology Bhopal, Bhopal Madhya Pradesh India
  2. Assistant Professor Department of Computer Science & Engineering, Corporate Institute of Science and Technology Bhopal, Bhopal Madhya Pradesh India

Abstract

In the contemporary digital landscape, the internet has become an indispensable tool for daily activities, encompassing email communication, financial transactions, shopping, reservations, data sharing, and access to information. This interconnected realm, often termed cyberspace, defines our modern era, characterized by the pervasive presence of the Internet of Things (IoT), facilitating ubiquitous data exchange and communication. However, this interconnectedness also exposes vulnerabilities, leading to cybersecurity concerns. The transfer of information traverses numerous systems and networks, introducing risks such as data manipulation and compromised confidentiality. Consequently, a myriad of cybersecurity threats emerge, including online fraud, distributed denial-of-service (DDoS) attacks, phishing attempts, and identity theft. In this study, we aim to delve into the initial stages of these cyber threats, analyzing their implications and ramifications. By examining the evolving landscape of cybersecurity, we seek to foster a deeper understanding of these challenges and explore potential strategies to mitigate their impact effectively.

Keywords: Cybercrime, cyber security, data sharing, Internet of Things (IoT), distributed denial-of-service (DDoS) attacks, shopping

[This article belongs to International Journal of Wireless Security and Networks(ijwsn)]

How to cite this article: Yogesh Rai, Ritu Vishwakarma. Study of Cyber Security Challenges and Their Impact. International Journal of Wireless Security and Networks. 2024; 02(01):7-12.
How to cite this URL: Yogesh Rai, Ritu Vishwakarma. Study of Cyber Security Challenges and Their Impact. International Journal of Wireless Security and Networks. 2024; 02(01):7-12. Available from: https://journals.stmjournals.com/ijwsn/article=2024/view=144847



References

  1. Amarasinghe AMSN, Wijesinghe WACH, Nirmana DLA, Jayakody A, Priyankara AMS. AI based cyber threats and vulnerability detection, prevention and prediction system. 2019 International Conference on Advancements in Computing (ICAC), Malabe, Sri Lanka, 2019, 363–368. DOI: 10.1109/ICAC49085.2019.9103372.
  2. Jang-Jaccard J, Nepal S. A survey of emerging threats in cybersecurity. J Comput Syst Sci. 2014;80:973– DOI: 10.1016/j.jcss.2014.02.005.
  3. Bakdash JZ, Hutchinson S, Zaroukian EG, Marusich LR, Thirumuruganathan S, Sample C, Hoffman B, Das G. Malware in the future? Forecasting of analyst detection of cyber events. J Cybersecur. 2018;4(1): DOI: 10.1093/cybsec/tyy007.
  4. Ben Fredj O, Mihoub A, Krichen M, Cheikhrouhou O, Derhab A. Cybersecurity attack prediction: A deep learning approach. In: International Conference on Security of Information and Networks; 2020. p. 1–6. DOI: 10.1145/3433174.3433614.
  5. Desai VP, Oza DKS, Naik DPG. Data mining approach for cyber security. Int J Comput Appl Technol Res. 2021;10:35– DOI: 10.7753/IJCATR1001.1007.
  6. Fang X, Xu M, Xu S, Zhao P. A deep learning framework for predicting cyber attacks rates. EURASIP J Inf Secur. 2019;2019:1–
  7. Husák M, Komárková J, Bou-Harb E, Čeleda P. Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun Surv Tutor. 2018;21:640–60. DOI: 10.1109/COMST.2018.2871866.
  8. Humayun M, Niazi M, Jhanjhi NZ, Alshayeb M, Mahmood S. Cyber security threats and vulnerabilities: A systematic mapping study. Arab J Sci Eng. 2020;45:3171–89. DOI: 10.1007/s13369-019-04319-2.
  9. Bendovschi A. Cyber-attacks – trends, patterns and security countermeasures. Procedia Econ 2015;28:24–31. DOI: 10.1016/S2212-5671(15)01077-1.
  10. Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Rep. 2021;7:8176– DOI: 10.1016/j.egyr.2021.08.126.
  11. Morovat K, Panda B. A survey of artificial intelligence in cybersecurity. 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2020, 109–115. DOI: 10.1109/CSCI51800.2020.00026.
  12. Rahman MA, Al-Saggaf Y, Zia T. A data mining framework to predict cyber attack for cyber security. 2020 15th IEEE Conference on Industrial Electronics and Applications (ICIEA), Kristiansand, Norway, 2020, 207–212. DOI: 10.1109/ICIEA48937.2020.9248225.

Regular Issue Subscription Review Article
Volume 02
Issue 01
Received January 25, 2024
Accepted February 29, 2024
Published May 2, 2024