The Current Trends, Techniques, and Challenges of Cybersecurity
##plugins.themes.bootstrap3.article.main##
Recently, the world witnessing rapidly growing in using computer systems based on networks, and no doubt that most of the systems are running over the internet which become a normal regular issue for governments, companies, organizations, institutions, and individuals. and the majority of these systems rely on using various cloud computing services that consequently at the same time have many advantages and disadvantages, and one of the disadvantages is that some security issues are arising, and these systems sometimes are increasingly affected by the number of security threats, and by default, the threats become troubles that gained the concerns of companies and governments. where researchers work hard to find solutions to those threats. Now the demand for finding tools techniques and skills for cybersecurity professionals has become an essential issue. This paper highlights the important aspects of cybersecurity such as Cybersecurity Institutions of cybersecurity, Attacks and Attackers, emergent technologies, techniques, and characteristics of cybersecurity. In addition, some Leading countries on global cybersecurity that provided the most powerful cyber will be demonstrated, and the comparison of some current states of the powerful countries that covered cyber security issues will be discussed. Further, this paper cover the Cyber security strategies, the evolution model for assessing cybersecurity, and the challenges that face cybersecurity will be deeply decussated.
References
-
Usman M, Jan MA, He X, Chen J. A survey on representation learning efforts in cybersecurity domain. ACM Computing Surveys (CSUR). 2019; 52(6): 1-28.
Google Scholar
1
-
Min KS, Chai SW, Han M. An international comparative study on cyber security strategy. International Journal of Security and Its Applications. 2015; 9(2): 13-20.
Google Scholar
2
-
Craigen D, Diakun-Thibault N, Purse R. Defining cybersecurity. Technology Innovation Management Review. 2014; 4(10).
Google Scholar
3
-
Bay M. What is cybersecurity?. French Journal for Media Research. 2016; 6: 1-28.
Google Scholar
4
-
Sabillon R, Cavaller V, Cano J. National cyber security strategies: global trends in cyberspace. International Journal of Computer Science and Software Engineering. 2016; 5(5): 67.
Google Scholar
5
-
Choi JH, Lee HJ. A Study on the Real-time Cyber Attack Intrusion Detection Method. Journal of the Korea Convergence Society. 2018; 9(7): 55-62.
Google Scholar
6
-
Filipek R. Information security becomes a business priority. Internal Auditor. 2007; 64(1): 18-9.
Google Scholar
7
-
Altas EA, Enisa ME. The impact of flipped classroom approach on the writing achievement and self-regulated learning of pre-service english teachers. Turkish Online Journal of Distance Education. 2020; 22(1): 66-88.
Google Scholar
8
-
Internet live stats. [Internet] Available from: https://www.internetlivestats.com/
Google Scholar
9
-
Cost of cyber attacks. Cybertalk.org. [Internet] Available from: https://www.cybertalk.org/9987-2/
Google Scholar
10
-
Albahar M. Cyber-attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics. 2019; 25: 993-1006.
Google Scholar
11
-
Fichtner L. What kind of cyber security? Theorising cyber security and mapping approaches. Internet Policy Review. 2018; 7(2).
Google Scholar
12
-
Chowdhury A. Recent cyber security attacks and their mitigation approaches–an overview. In Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings 7 2016 (pp. 54-65).
Google Scholar
13
-
Sofi I, Mahajan A, Mansotra V. Machine learning techniques used for the detection and analysis of modern types of ddos attacks. Int. Res. J. Eng. Technol. 2017; 4(6): 1085-92.
Google Scholar
14
-
Elsayed MS, Le-Khac NA, Dev S, Jurcut AD. Ddosnet: A deep-learning model for detecting network attacks. In2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM) 2020 Aug 31 (pp. 391-396).
Google Scholar
15
-
Habibi MR, Baghaee HR, Dragičević T, Blaabjerg F. Detection of false data injection cyber-attacks in DC microgrids based on recurrent neural networks. IEEE Journal of Emerging and Selected Topics in Power Electronics. 2020; 9(5): 5294-310.
Google Scholar
16
-
Li B, Wu Y, Song J, Lu R, Li T, Zhao L. DeepFed: Federated deep learning for intrusion detection in industrial cyber–physical systems. IEEE Transactions on Industrial Informatics. 2020; 17(8): 5615-24.
Google Scholar
17
-
Zhang H, Li Y, Lv Z, Sangaiah AK, Huang T. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica. 2020; 7(3): 790-9.
Google Scholar
18
-
Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF, et al. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics. 2022; 11(2): 198.
Google Scholar
19
-
Ottis R. Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. InProceedings of the 7th European Conference on Information Warfare 2008 Jul (p. 163). Reading, MA: Academic Publishing Limited.
Google Scholar
20
-
Kozlowski A. Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific Journal. 2014; 3(4): 237-45.
Google Scholar
21
-
Chen TM. Stuxnet, the real start of cyber warfare? [Editor's Note]. IEEE Network. 2010; 24(6): 2-3.
Google Scholar
22
-
Bianco LJ. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems. Ph.D. Thesis. Utica College; 2016.
Google Scholar
23
-
https://ccdcoe.org/uploads/2018/10/NCSS-Guidelines_2013.pdf, 2018.
Google Scholar
24
-
Kolini F, Janczewski L. Clustering and topic modelling: A new approach for analysis of national cyber security strategies. 2017.
Google Scholar
25
-
European Union Agency for Cybersecurity. [Internet] Available from: https://www.enisa.europa.eu
Google Scholar
26
-
https://www.statista.com/statistics
Google Scholar
27
-
Voo J, Hemani I, Jones S, DeSombre W, Cassidy D, Schwarzenbach A. National cyber power index 2020. Belfer Center for Science and International Affairs, Harvard Kennedy School. 2020.
Google Scholar
28
-
Voo J, Hemani I, Jones S, DeSombre W, Cassidy D, Schwarzenbach A. National Cyber Power Index 2020: Methodology and Analytical Considerations. China Cyber Policy Initiative Reports. 2020.
Google Scholar
29
-
SecureWorld. Top 10 Most Powerful Countries in Cyberspace. [Internet] 2022. Available from: https://www.secureworld.io/industry-news/top-10-most-powerful-countries-in-cyberspace
Google Scholar
30
-
Eisenbach TM, Kovner A, Lee MJ. Cyber risk and the US financial system: A pre-mortem analysis. Journal of Financial Economics. 2022; 145(3): 802-26.
Google Scholar
31
-
Zwilling M, Klien G, Lesjak D, Wiechetek Ł, Cetin F, Basim HN. Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems. 2022; 62(1): 82-97.
Google Scholar
32
-
Pingkuo L, Xue H. Comparative analysis on similarities and differences of hydrogen energy development in the World's top 4 largest economies: A novel framework. International Journal of Hydrogen Energy. 2022; 47(16): 9485-503.
Google Scholar
33
-
Petrenko S. Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation. CRC Press; 2022.
Google Scholar
34
-
Ponemon L. Cost of a data breach study: global overview. Benchmark research sponsored by IBM Security independently conducted by Ponemon Institute LLC. 2018.
Google Scholar
35
-
Ukwandu E, Ben-Farah MA, Hindy H, Bures M, Atkinson R, Tachtatzis C, et al. Cyber-security challenges in aviation industry: A review of current and future trends. Information. 2022; 13(3): 146.
Google Scholar
36
-
Himmat M, Algazoli G, Hammam N, Abdalla AG. Review on the Current State of the Internet of Things and its Extension and its Challenges. European Journal of Information Technologies and Computer Science. 2022; 2(2): 1-5.
Google Scholar
37
Most read articles by the same author(s)
-
Mubarak Himmat,
Gada Algazoli,
Nazar Hammam,
Ashraf Gasim Elsid Abdalla,
Review on the Current State of the Internet of Things and its Extension and its Challenges , European Journal of Information Technologies and Computer Science: Vol. 2 No. 2 (2022)