A Comprehensive Study: Computer-generated Security Challenges and Initial Trends
Main Article Content
Abstract
Globally, non-governmental and governmental organizations are intricately linked through diverse communication technologies, presenting a significant challenge with the escalating threats of cyber-attacks and the imperative need for information security. In today’s interconnected world, a majority of social, cultural, economic, commercial, and governmental activities unfold in cyberspace on an international scale, intensifying the complexity of safeguarding data from cyber threats. These threats, driven by financial, political, or military motives, necessitate diverse solutions to thwart potential cyber-attacks. Researchers across the globe have proposed a plethora of methods to counteract the rising tide of cyber threats. This study aims to scrutinize the challenges inherent in the methods proposed within the realm of cyber security. Furthermore, it conducts an assessment of the strengths, weaknesses, and challenges associated with these methodologies. Special emphasis is placed on dissecting new descendant attacks, providing an in-depth understanding of the evolving threat landscapes. Additionally, the study sheds light on emerging trends and recent developments in cyber security, fostering awareness among cyber security researchers and offering valuable guidance for future research and development endeavours.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
References
D. Rammanohar and Sandhane Raghav (2021), “Artificial Intelligence in Cybersecurity”, Physics Conference Series, Vol.(2021) 04207
Parati, N., & Anand, P. (2017), “Machine Learning in Cyber Defence”, International Journal of Computer Sciences and Engineering, Vol. 5(12), pp. 317–322.
Rajani, P., Adike, S., & Abhishek, S. G. K. (2020), “Artificial Intlegence”, The New Age, Vol 8(2), pp. 1398-1403.
S, VonSolms R(2016),“An information security knowledge sharing model in organizations”, Comput Hum Behav, Vol.57, pp.442-451.
S. Anand (2021), “Introduction to Cyber Security: Guide to the World of Cyber Security”, Notion Press, Chennai, IndiaVarian HR (2004), “System reliability and free riding”, Economics of Information Security, Springer, Boston, pp. 1-15.
Wagner TD, MahbubK, ,PalomarE(2019),et al. “Cyber threat intelligence sharing: survey and research directions”, Comput Secur, Vol.87, 101589Li,QinghuiLiu(2021), “A comprehensive review study of cyber-attacks and cybersecurity;
Emerging trends and recent developments”,Energy Reports, Vol.7,Nov.2021, pp. 8176-8186.