##plugins.themes.bootstrap3.article.main##

Recently, the world witnessing rapidly growing in using computer systems based on networks, and no doubt that most of the systems are running over the internet which become a normal regular issue for governments, companies, organizations, institutions, and individuals. and the majority of these systems rely on using various cloud computing services that consequently at the same time have many advantages and disadvantages, and one of the disadvantages is that some security issues are arising, and these systems sometimes are increasingly affected by the number of security threats, and by default, the threats become troubles that gained the concerns of companies and governments. where researchers work hard to find solutions to those threats. Now the demand for finding tools techniques and skills for cybersecurity professionals has become an essential issue. This paper highlights the important aspects of cybersecurity such as Cybersecurity Institutions of cybersecurity, Attacks and Attackers, emergent technologies, techniques, and characteristics of cybersecurity. In addition, some Leading countries on global cybersecurity that provided the most powerful cyber will be demonstrated, and the comparison of some current states of the powerful countries that covered cyber security issues will be discussed. Further, this paper cover the Cyber security strategies, the evolution model for assessing cybersecurity, and the challenges that face cybersecurity will be deeply decussated.

References

  1. Usman M, Jan MA, He X, Chen J. A survey on representation learning efforts in cybersecurity domain. ACM Computing Surveys (CSUR). 2019; 52(6): 1-28.
     Google Scholar
  2. Min KS, Chai SW, Han M. An international comparative study on cyber security strategy. International Journal of Security and Its Applications. 2015; 9(2): 13-20.
     Google Scholar
  3. Craigen D, Diakun-Thibault N, Purse R. Defining cybersecurity. Technology Innovation Management Review. 2014; 4(10).
     Google Scholar
  4. Bay M. What is cybersecurity?. French Journal for Media Research. 2016; 6: 1-28.
     Google Scholar
  5. Sabillon R, Cavaller V, Cano J. National cyber security strategies: global trends in cyberspace. International Journal of Computer Science and Software Engineering. 2016; 5(5): 67.
     Google Scholar
  6. Choi JH, Lee HJ. A Study on the Real-time Cyber Attack Intrusion Detection Method. Journal of the Korea Convergence Society. 2018; 9(7): 55-62.
     Google Scholar
  7. Filipek R. Information security becomes a business priority. Internal Auditor. 2007; 64(1): 18-9.
     Google Scholar
  8. Altas EA, Enisa ME. The impact of flipped classroom approach on the writing achievement and self-regulated learning of pre-service english teachers. Turkish Online Journal of Distance Education. 2020; 22(1): 66-88.
     Google Scholar
  9. Internet live stats. [Internet] Available from: https://www.internetlivestats.com/
     Google Scholar
  10. Cost of cyber attacks. Cybertalk.org. [Internet] Available from: https://www.cybertalk.org/9987-2/
     Google Scholar
  11. Albahar M. Cyber-attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics. 2019; 25: 993-1006.
     Google Scholar
  12. Fichtner L. What kind of cyber security? Theorising cyber security and mapping approaches. Internet Policy Review. 2018; 7(2).
     Google Scholar
  13. Chowdhury A. Recent cyber security attacks and their mitigation approaches–an overview. In Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings 7 2016 (pp. 54-65).
     Google Scholar
  14. Sofi I, Mahajan A, Mansotra V. Machine learning techniques used for the detection and analysis of modern types of ddos attacks. Int. Res. J. Eng. Technol. 2017; 4(6): 1085-92.
     Google Scholar
  15. Elsayed MS, Le-Khac NA, Dev S, Jurcut AD. Ddosnet: A deep-learning model for detecting network attacks. In2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM) 2020 Aug 31 (pp. 391-396).
     Google Scholar
  16. Habibi MR, Baghaee HR, Dragičević T, Blaabjerg F. Detection of false data injection cyber-attacks in DC microgrids based on recurrent neural networks. IEEE Journal of Emerging and Selected Topics in Power Electronics. 2020; 9(5): 5294-310.
     Google Scholar
  17. Li B, Wu Y, Song J, Lu R, Li T, Zhao L. DeepFed: Federated deep learning for intrusion detection in industrial cyber–physical systems. IEEE Transactions on Industrial Informatics. 2020; 17(8): 5615-24.
     Google Scholar
  18. Zhang H, Li Y, Lv Z, Sangaiah AK, Huang T. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica. 2020; 7(3): 790-9.
     Google Scholar
  19. Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF, et al. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics. 2022; 11(2): 198.
     Google Scholar
  20. Ottis R. Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. InProceedings of the 7th European Conference on Information Warfare 2008 Jul (p. 163). Reading, MA: Academic Publishing Limited.
     Google Scholar
  21. Kozlowski A. Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific Journal. 2014; 3(4): 237-45.
     Google Scholar
  22. Chen TM. Stuxnet, the real start of cyber warfare? [Editor's Note]. IEEE Network. 2010; 24(6): 2-3.
     Google Scholar
  23. Bianco LJ. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems. Ph.D. Thesis. Utica College; 2016.
     Google Scholar
  24. https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf, 2018.
     Google Scholar
  25. Kolini F, Janczewski L. Clustering and topic modelling: A new approach for analysis of national cyber security strategies. 2017.
     Google Scholar
  26. European Union Agency for Cybersecurity. [Internet] Available from: https://www.enisa.europa.eu
     Google Scholar
  27. https://www.statista.com/statistics
     Google Scholar
  28. Voo J, Hemani I, Jones S, DeSombre W, Cassidy D, Schwarzenbach A. National cyber power index 2020. Belfer Center for Science and International Affairs, Harvard Kennedy School. 2020.
     Google Scholar
  29. Voo J, Hemani I, Jones S, DeSombre W, Cassidy D, Schwarzenbach A. National Cyber Power Index 2020: Methodology and Analytical Considerations. China Cyber Policy Initiative Reports. 2020.
     Google Scholar
  30. SecureWorld. Top 10 Most Powerful Countries in Cyberspace. [Internet] 2022. Available from: https://www.secureworld.io/industry-news/top-10-most-powerful-countries-in-cyberspace
     Google Scholar
  31. Eisenbach TM, Kovner A, Lee MJ. Cyber risk and the US financial system: A pre-mortem analysis. Journal of Financial Economics. 2022; 145(3): 802-26.
     Google Scholar
  32. Zwilling M, Klien G, Lesjak D, Wiechetek Ł, Cetin F, Basim HN. Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems. 2022; 62(1): 82-97.
     Google Scholar
  33. Pingkuo L, Xue H. Comparative analysis on similarities and differences of hydrogen energy development in the World's top 4 largest economies: A novel framework. International Journal of Hydrogen Energy. 2022; 47(16): 9485-503.
     Google Scholar
  34. Petrenko S. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. CRC Press; 2022.
     Google Scholar
  35. Ponemon L. Cost of a data breach study: global overview. Benchmark research sponsored by IBM Security independently conducted by Ponemon Institute LLC. 2018.
     Google Scholar
  36. Ukwandu E, Ben-Farah MA, Hindy H, Bures M, Atkinson R, Tachtatzis C, et al. Cyber-security challenges in aviation industry: A review of current and future trends. Information. 2022; 13(3): 146.
     Google Scholar
  37. Himmat M, Algazoli G, Hammam N, Abdalla AG. Review on the Current State of the Internet of Things and its Extension and its Challenges. European Journal of Information Technologies and Computer Science. 2022; 2(2): 1-5.
     Google Scholar