Study of Cyber Security Challenges and Their Impact

Year : 2024 | Volume :02 | Issue : 01 | Page : –
By

Yogesh Rai

Ritu Vishwakarma

  1. Assistant Professor Department of Computer Science & Engineering, Corporate Institute of Science and Technology Bhopal, Bhopal Madhya Pradesh India
  2. Assistant Professor Department of Computer Science & Engineering, Corporate Institute of Science and Technology Bhopal, Bhopal Madhya Pradesh India

Abstract

In the contemporary digital landscape, the Internet has become an indispensable tool for daily activities, encompassing email communication, financial transactions, shopping, reservations, data sharing, and access to information. This interconnected realm, often termed cyberspace, defines our modern era, characterized by the pervasive presence of the Internet of Things (IoT), facilitating ubiquitous data exchange and communication. However, this interconnectedness also exposes vulnerabilities, leading to cybersecurity concerns. The transfer of information traverses’ numerous systems and networks, introducing risks such as data manipulation and compromised confidentiality. Consequently, a myriad of cybersecurity threats emerges, including online fraud, Distributed Denial of Service (DDoS) attacks, phishing attempts, and identity theft. In this paper, we aim to delve into the initial stages of these cyber threats, analyzing their implications and ramifications. By examining the evolving landscape of cybersecurity, we seek to foster a deeper understanding of these challenges and explore potential strategies to mitigate their impact effectively.

Keywords: Cyber crime, cyber security, data sharing, internet of things (IoT), denial of service (ddos) attacks, shopping

[This article belongs to International Journal of Wireless Security and Networks(ijwsn)]

How to cite this article: Yogesh Rai, Ritu Vishwakarma. Study of Cyber Security Challenges and Their Impact. International Journal of Wireless Security and Networks. 2024; 02(01):-.
How to cite this URL: Yogesh Rai, Ritu Vishwakarma. Study of Cyber Security Challenges and Their Impact. International Journal of Wireless Security and Networks. 2024; 02(01):-. Available from: https://journals.stmjournals.com/ijwsn/article=2024/view=144847




References

  1. Amarasinghe AM, Wijesinghe WA, Nirmana DL, Jayakody A, Priyankara AM. AI based cyber threats and vulnerability detection, prevention and prediction system. In2019 international conference on advancements in computing (ICAC) 2019 Dec 5 (pp. 363-368). IEEE.
  2. Bakdash JZ, Hutchinson S, Zaroukian EG, Marusich LR, Thirumuruganathan S, Sample C, Hoffman B, Das G. Malware in the future? Forecasting of analyst detection of cyber events. Journal of Cybersecurity. 2018;4(1): tyy007.
  3. Ben Fredj O, Mihoub A, Krichen M, Cheikhrouhou O, Derhab A. CyberSecurity attack prediction: a deep learning approach. In13th international conference on security of information and networks 2020 Nov 4 (pp. 1-6).
  4. Bendovschi A. Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance. 2015 Jan 1;28: 24-31.
  5. Desai V, Oza K, Naik P. Data mining approach for cybersecurity. International Journal of Computer Applications Technology and Research. 2021 Jan;10(1):35-41.
  6. Fang X, Xu M, Xu S, Zhao P. A deep learning framework for predicting cyber attacks rates. EURASIP Journal on Information security. 2019 Dec; 2019:1-1.
  7. Humayun M, Niazi M, Jhanjhi NZ, Alshayeb M, Mahmood S. Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering. 2020 Apr;45: 3171-89.
  8. Husák M, Komárková J, Bou-Harb E, Čeleda P. Survey of attack projection, prediction, and forecasting in cyber security. IEEE Communications Surveys & Tutorials. 2018 Sep 23;21(1):640-60.
  9. Jang-Jaccard J, Nepal S. A survey of emerging threats in cybersecurity. Journal of computer and system sciences. 2014 Aug 1;80(5):973-93.
  10. Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports. 2021 Nov 1;7: 8176-86.
  11. Morovat K, Panda B. A survey of artificial intelligence in cybersecurity. In2020 International Conference on Computational Science and Computational Intelligence (CSCI) 2020 Dec 16 (pp. 109-115). IEEE.
  12. Rahman MA, Al-Saggaf Y, Zia T. A data mining framework to predict cyber attack for cyber security. In2020 15th IEEE Conference on Industrial Electronics and Applications (ICIEA) 2020 Nov 9 (pp. 207-212). IEEE.

Regular Issue Subscription Review Article
Volume 02
Issue 01
Received January 25, 2024
Accepted February 29, 2024
Published May 2, 2024