Deepak Kumar Sharma,
Tejinder Pal Singh Brar,
- Research Scholar, Department of Computer Technology, M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar (Deemed to be University), Mullana, Ambala, Haryana, India
- Professor, Department of Computer Technology, M.M. Institute of Computer Technology & Business Management, Maharishi Markandeshwar (Deemed to be University), Mullana, Ambala, Haryana, India
Abstract
At present, a significant portion of global economic, commercial, cultural, social, and governmental activities and interactions, including those involving individuals, NGOs, and state institutions, takes place in cyberspace. In recent times, many businesses and government agencies around the world have been facing the growing challenge of cyberattacks and the risks associated with wireless communication technologies. As modern society becomes increasingly dependent on digital technologies, protecting sensitive information from cyber threats has become a major concern. The primary aim of cyberattacks is often to cause financial harm to organizations, although in some cases, they may also pursue military or political objectives. This study aims to explore and critically assess the current developments in the field of cybersecurity, while also identifying the challenges, weaknesses, and advantages of the proposed approaches. A variety of novel descendant assaults are examined in depth. Standard security frameworks are examined alongside the historical context and early-generation cybersecurity methodologies. Additionally, developing trends and current breakthroughs in cybersecurity, along with associated dangers and difficulties, are addressed. The thorough review study given for IT and cybersecurity researchers is anticipated to be beneficial.
Keywords: Security, cyber security, threats, cybercrime, cyber warfare
[This article belongs to International Journal of Information Security Engineering ]
Deepak Kumar Sharma, Tejinder Pal Singh Brar. An In-depth Analysis of Cyberattacks and Cybersecurity: New Trends and Advancements. International Journal of Information Security Engineering. 2025; 03(02):31-38.
Deepak Kumar Sharma, Tejinder Pal Singh Brar. An In-depth Analysis of Cyberattacks and Cybersecurity: New Trends and Advancements. International Journal of Information Security Engineering. 2025; 03(02):31-38. Available from: https://journals.stmjournals.com/ijise/article=2025/view=233245
References
- Aghajani G, Ghadimi N. Multi-objective energy management in a micro-grid. Energy Rep. 2018 Nov 1; 4: 218–25.
- Akhavan-Hejazi H, Mohsenian-Rad H. Power systems big data analytics: An assessment of paradigm shift barriers and prospects. Energy Rep. 2018 Nov 1; 4: 91–100.
- Al Shaer D, Al Musaimi O, de la Torre BG, Albericio F. Hydroxamate siderophores: Natural occurrence, chemical synthesis, iron binding affinity and use as Trojan horses against pathogens. Eur J Med Chem. 2020 Dec 15; 208: 112791.
- Alkatheiri MS, Chauhdary SH, Alqarni MA. Seamless security apprise method for improving the reliability of sustainable energy-based smart home applications. Sustain Energy Technol Assess. 2021 Jun 1; 45: 101219.
- Alzubaidi A. Cybercrime awareness among Saudi nationals: dataset. Data Br. 2021 Jun 1; 36: 106965.
- Baig ZA, Szewczyk P, Valli C, Rabadia P, Hannay P, Chernyshev M, Johnstone M, Kerai P, Ibrahim A, Sansurooah K, Syed N. Future challenges for smart cities: Cyber-security and digital forensics. Digit Investig. 2017 Sep 1; 22: 3–13.
- Beechey M, Kyriakopoulos KG, Lambotharan S. Evidential classification and feature selection for cyber-threat hunting. Knowl-Based Syst. 2021 Aug 17; 226: 107120.
- Brar TP. Secure E-Banking Environment: A Comparative Analysis of Various Security Aspects. International Journal of Emerging Issues in Management and Technology (IJEIMT). 2016; 1(3): 22–30.
- Bullock JA, Haddow GD, Coppola DP. Cybersecurity and critical infrastructure protection. In: Bullock JA, Haddow GD, Coppola DP, editors. Introduction to Homeland Security. 6th ed. Amsterdam: Butterworth-Heinemann; 2021. p. 425–97. doi: 10.1016/B978-0-12-817137-0.00008-0.
- Cao J, Ding D, Liu J, Tian E, Hu S, Xie X. Hybrid-triggered-based security controller design for networked control system under multiple cyberattacks. Inf Sci. 2021 Feb 16; 548: 69–84.
- Chandra A, Snowe MJ. A taxonomy of cybercrime: Theory and design. Int J Account Inf Syst. 2020 Sep 1; 38: 100467.
- Chen JK, Chang CW, Wang Z, Wang LC, Wei HS. Cyber deviance among adolescents in Taiwan: Prevalence and correlates. Child Youth Serv Rev. 2021 Jul 1; 126: 106042.
- Cheng S, Zhao G, Gao M, Shi Y, Huang M, Marefati M. A new hybrid solar photovoltaic / phosphoric acid fuel cell and energy storage system; Energy and Exergy performance. Int J Hydrog Energy. 2021 Feb 11; 46(11): 8048–66.
- Edgar TW, Manz DO. Science and cyber security. In: Edgar TW, Manz DO, editors. Research Methods for Cyber Security. Amsterdam: Syngress; 2017. p. 33–62. doi: 10.1016/B978-0-12-805349-2.00002-9.
- Furnell S, Shah JN. Home working and cyber security–an outbreak of unpreparedness? Comput Fraud Secur. 2020 Aug 1; 2020(8): 6–12.
- Gandhi P, Sharma RK, Brar TPS, Bhatia P. Significance of data mining in the domain of intrusion detection. In: Gandhi P, Bhatia S, Dev K, editors. Data Driven Decision Making Using Analytics. Boca Raton: CRC Press; 2021. p. 16. doi: 10.1201/9781003199403.
- Hart S, Margheri A, Paci F, Sassone V. Riskio: A serious game for cyber security awareness and education. Comput Secur. 2020 Aug 1; 95: 101827.
- Huang J, Ho DW, Li F, Yang W, Tang Y. Secure remote state estimation against linear man-in-the-middle attacks using watermarking. Automatica. 2020 Nov 1; 121: 109182.
- Iqbal Z, Anwar Z. SCERM—A novel framework for automated management of cyber threat response activities. Future Gener Comput Syst. 2020 Jul 1; 108: 687–708.
- Yang SH, Cao Y, Wang Y, Zhou C, Yue L, Zhang Y. Harmonizing safety and security risk analysis and prevention in cyber-physical systems. Process Saf Environ Prot. 2021 Apr 1; 148: 1279–91.
- Khan SK, Shiwakoti N, Stasinopoulos P, Chen Y. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. Accid Anal Prev. 2020 Dec 1; 148: 105837.
- Kharlamova N, Hashemi S, Træholt C. Data-driven approaches for cyber defense of battery energy storage systems. Energy AI. 2021 Sep 1; 5: 100095.
- Lee C, Chae YH, Seong PH. Development of a method for estimating security state: Supporting integrated response to cyber-attacks in NPPs. Ann Nucl Energy. 2021 Aug 1; 158: 108287.
- Li J, Sun C, Su Q. Analysis of cascading failures of power cyber-physical systems considering false data injection attacks. Glob Energy Interconnect. 2021 Apr 1; 4(2): 204–13.
- Li N, Tsigkanos C, Jin Z, Hu Z, Ghezzi C. Early validation of cyber–physical space systems via multi-concerns integration. J Syst Softw. 2020 Dec 1; 170: 110742.
- Liu X, Zhang J, Zhu P, Tan Q, Yin W. Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Comput Secur. 2021 Mar 1; 102: 102138.
- Mehrpooya M, Ghadimi N, Marefati M, Ghorbanian SA. Numerical investigation of a new combined energy system includes parabolic dish solar collector, Stirling engine and thermoelectric device. Int J Energy Res. 2021 Sep; 45(11): 16436–55.
- Le Nguyen C, Golman W. Diffusion of the Budapest Convention on cybercrime and the development of cybercrime legislation in Pacific Island countries: ‘Law on the books’ vs ‘law in action’. Comput Law Secur Rev. 2021 Apr 1; 40: 105521.
- Ogbanufe O. Enhancing end-user roles in information security: Exploring the setting, situation, and identity. Comput Secur. 2021 Sep 1; 108: 102340.
- Patel DC, Berry MF, Bhandari P, Backhus LM, Raees S, Trope W, Nash A, Lui NS, Liou DZ, Shrager JB. Paradoxical motion on sniff test predicts greater improvement following diaphragm plication. Ann Thorac Surg. 2021 Jun 1; 111(6): 1820–6.
- Priyadarshini I, Kumar R, Sharma R, Singh PK, Satapathy SC. Identifying cyber insecurities in trustworthy space and energy sector for smart grids. Comput Electr Eng. 2021 Jul 1; 93: 107204.
- Qiu W, Sun K, Yao W, You S, Yin H, Ma X, Liu Y. Time-frequency based cyber security defense of wide-area control system for fast frequency reserve. Int J Electr Power Energy Syst. 2021 Nov 1; 132: 107151.
- Tam T, Rao A, Hall J. The good, the bad and the missing: A Narrative review of cyber-security implications for Australian small businesses. Comput Secur. 2021 Oct 1; 109: 102385.

International Journal of Information Security Engineering
| Volume | 03 |
| Issue | 02 |
| Received | 22/04/2025 |
| Accepted | 19/06/2025 |
| Published | 24/07/2025 |
| Publication Time | 93 Days |
Login
PlumX Metrics