Study of Cyber Security Challenges and Their Impact

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : May 2, 2024 at 5:20 pm | [if 1553 equals=””] Volume :02 [else] Volume :02[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Yogesh Rai, Ritu Vishwakarma

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant Professor, Assistant Professor, Department of Computer Science & Engineering, Corporate Institute of Science and Technology Bhopal, Bhopal, Department of Computer Science & Engineering, Corporate Institute of Science and Technology Bhopal, Bhopal, Madhya Pradesh, Madhya Pradesh, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nIn the contemporary digital landscape, the Internet has become an indispensable tool for daily activities, encompassing email communication, financial transactions, shopping, reservations, data sharing, and access to information. This interconnected realm, often termed cyberspace, defines our modern era, characterized by the pervasive presence of the Internet of Things (IoT), facilitating ubiquitous data exchange and communication. However, this interconnectedness also exposes vulnerabilities, leading to cybersecurity concerns. The transfer of information traverses’ numerous systems and networks, introducing risks such as data manipulation and compromised confidentiality. Consequently, a myriad of cybersecurity threats emerges, including online fraud, Distributed Denial of Service (DDoS) attacks, phishing attempts, and identity theft. In this paper, we aim to delve into the initial stages of these cyber threats, analyzing their implications and ramifications. By examining the evolving landscape of cybersecurity, we seek to foster a deeper understanding of these challenges and explore potential strategies to mitigate their impact effectively.

n

n

n

Keywords: Cyber crime, cyber security, data sharing, internet of things (IoT), denial of service (ddos) attacks, shopping

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Wireless Security and Networks(ijwsn)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Wireless Security and Networks(ijwsn)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Yogesh Rai, Ritu Vishwakarma.Study of Cyber Security Challenges and Their Impact.International Journal of Wireless Security and Networks.May 2, 2024; 02(01):-.

n

How to cite this URL: Yogesh Rai, Ritu Vishwakarma , Study of Cyber Security Challenges and Their Impact ijwsn May 2, 2024 {cited May 2, 2024};02:-. Available from: https://journals.stmjournals.com/ijwsn/article=May 2, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] nn

n[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Amarasinghe AM, Wijesinghe WA, Nirmana DL, Jayakody A, Priyankara AM. AI based cyber threats and vulnerability detection, prevention and prediction system. In2019 international conference on advancements in computing (ICAC) 2019 Dec 5 (pp. 363-368). IEEE.
  2. Bakdash JZ, Hutchinson S, Zaroukian EG, Marusich LR, Thirumuruganathan S, Sample C, Hoffman B, Das G. Malware in the future? Forecasting of analyst detection of cyber events. Journal of Cybersecurity. 2018;4(1): tyy007.
  3. Ben Fredj O, Mihoub A, Krichen M, Cheikhrouhou O, Derhab A. CyberSecurity attack prediction: a deep learning approach. In13th international conference on security of information and networks 2020 Nov 4 (pp. 1-6).
  4. Bendovschi A. Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance. 2015 Jan 1;28: 24-31.
  5. Desai V, Oza K, Naik P. Data mining approach for cybersecurity. International Journal of Computer Applications Technology and Research. 2021 Jan;10(1):35-41.
  6. Fang X, Xu M, Xu S, Zhao P. A deep learning framework for predicting cyber attacks rates. EURASIP Journal on Information security. 2019 Dec; 2019:1-1.
  7. Humayun M, Niazi M, Jhanjhi NZ, Alshayeb M, Mahmood S. Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering. 2020 Apr;45: 3171-89.
  8. Husák M, Komárková J, Bou-Harb E, Čeleda P. Survey of attack projection, prediction, and forecasting in cyber security. IEEE Communications Surveys & Tutorials. 2018 Sep 23;21(1):640-60.
  9. Jang-Jaccard J, Nepal S. A survey of emerging threats in cybersecurity. Journal of computer and system sciences. 2014 Aug 1;80(5):973-93.
  10. Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports. 2021 Nov 1;7: 8176-86.
  11. Morovat K, Panda B. A survey of artificial intelligence in cybersecurity. In2020 International Conference on Computational Science and Computational Intelligence (CSCI) 2020 Dec 16 (pp. 109-115). IEEE.
  12. Rahman MA, Al-Saggaf Y, Zia T. A data mining framework to predict cyber attack for cyber security. In2020 15th IEEE Conference on Industrial Electronics and Applications (ICIEA) 2020 Nov 9 (pp. 207-212). IEEE.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 02
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received January 25, 2024
Accepted February 29, 2024
Published May 2, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]