A Comprehensive Study: Computer-generated Security Challenges and Initial Trends

Main Article Content

Sherif Shafique
Fatimah Batool

Abstract

Globally,  non-governmental  and  governmental  organizations  are  intricately  linked  through diverse  communication  technologies,  presenting  a  significant  challenge  with  the  escalating threats   of   cyber-attacks   and   the   imperative   need   for   information   security.   In   today’s interconnected  world,  a  majority  of  social,  cultural,  economic,  commercial,  and  governmental activities   unfold   in   cyberspace   on   an   international   scale,   intensifying   the   complexity   of safeguarding  data  from  cyber  threats.  These  threats,  driven  by  financial,  political,  or  military motives,  necessitate  diverse  solutions  to  thwart  potential  cyber-attacks.  Researchers  across  the globe  have  proposed  a  plethora  of  methods  to  counteract  the  rising  tide  of  cyber  threats.  This study  aims  to  scrutinize  the  challenges  inherent  in  the  methods  proposed  within  the  realm  of cyber security.   Furthermore,   it   conducts   an   assessment   of   the   strengths,   weaknesses,   and challenges  associated  with  these  methodologies.  Special  emphasis  is  placed  on  dissecting  new descendant  attacks,  providing  an  in-depth  understanding  of  the  evolving  threat  landscapes. Additionally, the study sheds light on emerging trends and recent developments in cyber security, fostering  awareness  among cyber security researchers  and  offering  valuable  guidance  for  future research and development endeavours.

Article Details

How to Cite
Shafique, S., & Batool, F. (2022). A Comprehensive Study: Computer-generated Security Challenges and Initial Trends. Zhongguo Kuangye Daxue Xuebao, 27(2), 4-7. https://zkdx.ch/journal/zkdx/article/view/6
Section
Articles

How to Cite

Shafique, S., & Batool, F. (2022). A Comprehensive Study: Computer-generated Security Challenges and Initial Trends. Zhongguo Kuangye Daxue Xuebao, 27(2), 4-7. https://zkdx.ch/journal/zkdx/article/view/6

References

D. Rammanohar and Sandhane Raghav (2021), “Artificial Intelligence in Cybersecurity”, Physics Conference Series, Vol.(2021) 04207

Parati, N., & Anand, P. (2017), “Machine Learning in Cyber Defence”, International Journal of Computer Sciences and Engineering, Vol. 5(12), pp. 317–322.

Rajani, P., Adike, S., & Abhishek, S. G. K. (2020), “Artificial Intlegence”, The New Age, Vol 8(2), pp. 1398-1403.

S, VonSolms R(2016),“An information security knowledge sharing model in organizations”, Comput Hum Behav, Vol.57, pp.442-451.

S. Anand (2021), “Introduction to Cyber Security: Guide to the World of Cyber Security”, Notion Press, Chennai, IndiaVarian HR (2004), “System reliability and free riding”, Economics of Information Security, Springer, Boston, pp. 1-15.

Wagner TD, MahbubK, ,PalomarE(2019),et al. “Cyber threat intelligence sharing: survey and research directions”, Comput Secur, Vol.87, 101589Li,QinghuiLiu(2021), “A comprehensive review study of cyber-attacks and cybersecurity;

Emerging trends and recent developments”,Energy Reports, Vol.7,Nov.2021, pp. 8176-8186.

Similar Articles

You may also start an advanced similarity search for this article.