Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
INTERNATIONAL JOURNAL OF ADVANCE RESEARCH, IDEAS AND INNOVATIONS IN TECHNOLOGY
In the near future, cyber security will play a dominant role in personal and business applications. As society is becoming more and more digitized, there are more chances to win by exploiting this. As a result of the growing proliferation of digitization and connected devices, the demand for cyber security solutions is growing at a relatively high rate. The complexity and connectivity of digitized systems have a direct impact on their security. The goal of this review is to summarize the logical predictions of the future of cybersecurity.
Cybersecurity At The Heart Of Technological Apogee And Future Development, 2018
The era of computerization pushing further and further the possibilities of accessing sensitive data via computer networks, which exposes both individuals and businesses to serious harm in the event of unsafe these. This aspect is highly sensitive, which makes it necessary to protect the resources that individuals use via intranets, and more particularly the Internet, thus leading to cybersecurity. Thus, throughout this article, we will discuss the main lines of this field of study that predisposes the computing of tomorrow and which can to some extent lead to development or total loss, since all is articulated around data and information.
isara solutions, 2018
Digital Security assumes a significant job in the field of data innovation Securing the data have turned out to be perhaps the greatest test in the present day. At whatever point we consider the digital security the principal thing that rings a bell is 'digital wrongdoings' which are expanding colossally step by step. Different Governments and organizations are taking numerous measures so as to avoid these digital violations. Other than different measures digital security is as yet an exceptionally enormous worry to many. This paper fundamentally centers around difficulties looked by digital security on the most recent advancements .It likewise centers around most recent about the digital security methods, morals and the patterns changing the essence of digital security.
International Journal of Recent Technology and Engineering
In the field of informational technology, cyber securit y plays an important role in ensuring that information has becom e one of today's major challenges. The first thing that comes to our mind when we ever talk about cyber security is ' cyber crimes, ' which are rising exponentially every day. Different governments and companies take numerous measures to prevent such cyber crimes. In addition to various cyber security measures, many still have a major concern. It also reports on the innovations in cyber security strategies, practices and developments that change the face of online health. This paper focuses mainly on cyber security challenges facing the latest technologies.
2019
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on the latest about cyber security techniques, ethics and the trends changing the face of cyber security. This paper mainly focuses on cyber Security and its fundamental elements on latest technologies. Aye Mya Sandar | Ya Min | Khin Myat Nwe Win "Fundamental Areas of Cyber Security on Latest Technology" Published in International Journal of Trend in Scientific Research...
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Today, with modern lifestyles, people have become involved in the life and use of technology. More technology for financial transactions as well as shopping in their cyberspace.At the same time, the protection of knowledge has become increasingly difficult. In addition, the proliferation of social media has led to an increase in online crime or cybercrime. in the world data security plays an important role in information technology. Information with security become one of the major challenges of today. Whenever we think of cybersecurity, we come first think of the 'cybercrimes' that are spreading every day. Different governments and Businesses take various steps to avoid this form of cybercrime. In addition to numerous cyber security measures, many people are also very worried about it. This paper focuses primarily on cybersecurity concerns related to new technology. It also focuses on the new. Cybersecurity, ethics, and technologies for development that affect cybersecurity.
European Journal of Information Technologies and Computer Science
Recently, the world witnessing rapidly growing in using computer systems based on networks, and no doubt that most of the systems are running over the internet which become a normal regular issue for governments, companies, organizations, institutions, and individuals. and the majority of these systems rely on using various cloud computing services that consequently at the same time have many advantages and disadvantages, and one of the disadvantages is that some security issues are arising, and these systems sometimes are increasingly affected by the number of security threats, and by default, the threats become troubles that gained the concerns of companies and governments. where researchers work hard to find solutions to those threats. Now the demand for finding tools techniques and skills for cybersecurity professionals has become an essential issue. This paper highlights the important aspects of cybersecurity such as Cybersecurity Institutions of cybersecurity, Attacks and Atta...
SSRN Electronic Journal, 2000
Traditional "network-centric" cyber defenses intend to prevent a thief from reaching data, while new "data-centric" cyber defenses assume the thief will reach it. The new defenses make information hard to find and impossible to read. The difference between the old and new approaches is profound. By changing the balance of power between predator and prey, it introduces a new priceperformance curve for cyber security.
Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is 'cyber crimes' which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies .It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber security.
2015
Computer Security has become a major challenge in the present years due to the continuous global technological development and the different possibilities for the use of computer. Cyber threats are growing at an alarming rate and at the same pace with the online use of Personal Computers and mobile devices. This work surveys the state of Cyber Security emerging threats landscape, through the overview of related works reported between 2011 and 2013 in the literature by stakeholders and experts in Information Technology (IT) industry. Different type of Cyber emerging threats such as malicious attack, network attack and network abuse have been identified with specific interest on virus, Phishing, Spam and insider abuse to mention but a few. It has been established that these Cybercriminals tools are exhibiting common level of sophistication and advancement as the advances in Computer and mobile technologies. The available countermeasures are found to be satisfactorily effective, yet Cyber criminals are creating new measures to overcome Security mechanism. It is also envisaged that as the technologies advances, a resultant proliferation of cyber threats will be witnessed. Thus, a few government and Information Technology (IT) stakeholders’ strategic policies to help in combating cyber threats were presented
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
A crucial element of information technology is cyber security. Cyber security is the process of defending sensitive information and crucial systems against online assaults. When we think of cyber security, the first thing that comes to mind is cybercrimes, which are on the rise every day. Governments and other businesses are taking a lot of measures to stop these cybercrimes. Maintaining cyber security continues to be a very challenging task for us despite many attempts. I.
Multidisciplinary International Journal of Research and Development (MIJRD), 2021
The deep space and the stunning level of sophistication of cyberattacks on critical infrastructures, facilities and services on which our contemporary existence has become increasingly dependent, is cause for great concern. Even though a great deal goes unreported, the reports available so far is alarming. What this implies is that we are existing at the precipice of a cyber-holocaust, it appears that the threats posed by these occurrences are not properly understood by the relevant stakeholders and the society in general. In this study, confirmed occurrences of successful cyber-attacks are presented in an extensive literature review. And based on this review pertinent data from secondary sources that have a keen interest in ensuring a secure cyber space is used to highlight subsisting and persisting threats. The information is also used to show future threats as regards the security of cyber space as the world anticipates intensification of cyber-attacks especially among state actors, as well as sophisticated corporate syndicates and highly motivated knowledgeable groups and individuals. From the analysis it appears that the approaches currently put in place to check/mitigate the incidence of cyber-attacks are not producing veritable results. Consequently, this study suggests the need to develop frameworks that will support multi and trans disciplinary approaches to the problem as well as improve/ enhance treaties among nations and the need for nations and corporate institutions and to take responsibility for cyber escalation.
International Research Journal of Modernization in Engineering, Technology and Science, 2024
Cyber security is concerned with preventing illegal usage, invasions, sabotage, and natural catastrophes from affecting information, hardware, and software on the internet. Because of the myriad ways in which computer systems and data may be exploited, cyber security is a burgeoning discipline. Online banking information, medical or financial information, and intimate images are examples of data that may require cyber protection. However, as there are challenges to cyber security, it is not always straightforward to apply. Any criminal act that aims to destroy or steal data, as well as disrupt digital life in general, is considered a cyber-security threat. This paper discussed the emerging threats in the cyber security space, analysed and identified some associated cyber security risks and proffered possible solutions that could mitigate the activities of cybercriminals on the internet and evoke vigilance on those that use the internet daily for business and personal activities.
ArXiv, 2021
The fourth industrial revolution (4IR) widely known as Industry 4.0 is a revolution many authors believe have come to stay. It is a revolution that has been fast blurring the line between physical, digital, and biological technologies. These disruptive innovative revolutionary technologies largely rely on high-speed internet connectivity, Cloud technologies, Augmented Reality, Additive Manufacturing, Data science, and Artificial Intelligence. Most developed economies have embraced the revolution while the developing economies are struggling to adopt 4IR because they lack the requisite skills, knowledge, and technology. Thus, this study investigates Nigeria as one of the developing economies to understand her readiness for 4IR and the level of preparedness to mitigate the sophisticated cyber-attacks that comes with the revolution. The investigation adopted quantitative research approach and developed an online questionnaire that was shared amongst the population of interest that incl...
The following chapter does not have an ambition to thoroughly explore all the cyber security-related topics. However, I chose a way to open the hottest topics from the national security perspective. All the parts do not have any deep conclusions, but should serve the reader as a guide for further reading. In each part I provide you with some further references that are the most discussed and cited papers in the academic debate. However, as cyber security is an explosive topic today, we can assume that considerable amount of articles are accidentally omitted. The current securitization wave of cyber threats as one of the most serious national security issue contributes to the production of a huge amount of literature, making the finding of a wisely compiled literature not an easy task. This is the reason why the articles mentioned in the following chapter are chosen from those that are the most debated ones.
2021
The running era can be termed as an era of the internet, as the use of the internet is increasing day by day. Every coin has two sides, so is the coin of the internet. One side shows the ease of communication, sharing information, marketing, and businesses, etc with the use of the internet. On the other hand, it brings a crucial concern on the security part. Cybersecurity is the field that promises to safeguard the network, data, electronic devices, servers, computers from malicious attacks. By cybersecurity, we mean staying ahead of hackers and preventing exploitation of the system. Hackers are getting smarter day by day, thereby bringing new challenges to cybersecurity experts. News about threats like ransomware, phishing, vulnerability exploits, IoT-based attacks, etc, run around us most of the time nowadays. The current study describes well-known common challenges and discloses some new challenges in cybersecurity and suggested possible solutions to overcome them.
2019
Digital world connected millions of people through internet for our day today activities, and therefore security, privacy, authentication issues is a key question today. The main objective of this paper is to study various issues in enabling technologies such as Cyber Physical System (CPS), Internet of Things (IoT), Big Data Analytics (BDA) and Artificial Intelligence (AI). IoT is a network of devices which link, interact and transfer data but security and privacy should concern while moving from traditional to modern world. CPS is a combination of data processing, networking and physical activities, through critical infrastructure attacker access computer devices and damages the system. Big data shared high volume, velocity, variety, context and content data to distributed system and key issue is data lost by harm. Artificial Intelligence can perform job as like human brain and solve real world problem but optical network can be easily attacked by hackers. This paper investigate different threats, limitation and future work in the cyber physical system, IoT etc and various methods are discussed from various articles and it is more helpful in doing further research work in this area and cyber security is the most important tool which can be implement to protect the cyberspace from the inside and outside attacker.
Shodh Sari-An International Multidisciplinary Journal, 2023
Cyber Security plays a very important role in the field of information technology. Securing the information has become one of the biggest challenges in the contemporary society. Whenever we think about the cyber security, the first thing that comes to our mind is 'cyber crimes' which are increasing tremendously day by day. Various government authorities and private organizations are taking many measures to prevent these cybercrimes. Besides various measures cyber security is still a very big concern to all of us. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on latest cyber security techniques, ethics and the trends changing the face of cyber security.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Cyber security is crucial in the information technology field in today's world. Because every piece of data is now housed online, securing data has become one of the most challenging responsibilities. The first thing that comes to mind when we think of cyber security is cyber criminals, namely hacking, which is on the rise. To tackle cybercrime, several governments and corporations are pursuing several measures. Aside from spectacular attempts, many people still have concerns about cyber security. This study focuses mostly on the issues that cyber security faces with emerging technology. It also concentrates on the most important aspects of data security, such as methods, ethics, and developments that are transforming the public's belief in cyber security.
Detecting and Mitigating Robotic Cyber Security Risks
Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber Security that goes beyond the limits of the traditional information security to involve not only the security of information tools but also the other assets, involving the person's own confidential information. In computer security or information security, relation to the human is basically to relate their duty(s) in the security process. In Cyber security, the factor has an added dimension, referring humans as the targets for the cyber-attacks or even becoming the part of the cyber-attack unknowingly. This also involves the details about the cybercriminals and cyber risks going ahead with the classification of the Cybercrimes which is against individual, property, organisation and society. Impacts of security breaches are also discussed. Counter...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.