Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity
Author(s): DESPA, Andreea-Raluca
Author(s) keywords: assets, cyber attack, cybersecurity, security challenges
Reference keywords: cyber attack, cybersecurity, ransomware
Abstract:
Cyber security has become an important concern for governments, businesses and individuals. This paper aims to provide a comprehensive overview of the current cybersecurity landscape and best practices for addressing the most critical challenges facing organizations and individuals today. The current trends, emerging threats and best solutions will be examined, including incident response planning and secure software development practices.
References:
[1]. C. Ma, “Smart city and cyber-security; technologies used, leading challenges and future recommendations”, https://www.sciencedirect.com/science/article/pii/S2352484721007265, 2021.
[2]. 2023 Cyberthreat Defense Report, CyberEdge Group, Available online at https://cyber-edge.com/wp-content/uploads/2023/04/CyberEdge-2023-CDR-Report-v1.0.pdf.
[3]. Henry Durojaye, Oluwabukola Raji, “Impact of State and State-Sponsored Actors on the Cyber Environment and the Future of Critical Infrastructure”, https://www.researchgate.net/publication/366290727_Impact_of_State_and_State-Sponsored_Actors_on_the_Cyber_Environment_and_the_Future_of_Critical_Infrastructure, 2022.
[4]. Craig Beaman, Ashley Barkworth, Toluwalope David Akande, Saqib Hakak, Muhammad Khurram Khan, “Ransomware: Recent advances, analysis, challenges and future research directions”, Available online at https://www.sciencedirect.com/science/article/pii/S016740482100314X.
[5]. Ghadge, A., Weib, M., Caldwell, N. and Wilding, R., “Managing cyber risk in supply chains: A review and research agenda”, Available online at https://www. researchgate.net/publication/334736415_Managing_cyber_risk_in_supply_chains_A_review_and_research_agenda, 2019.
[6]. “Understanding the increase in Supply Chain Security Attacks”, Available online at https://www.enisa.europa.eu/news/enisa-news/understanding-the-increase-in-supply-chain-security-attacks, 2021.
[7]. Iffat Gheyas, Ali Abdallah, “Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis”, Springer, 2016.
[8]. Nivedita Mishra, Sharnil Pandya Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review, https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9405669, 2021.
[9]. Moulika Bollinadi, Vijay Kumar Damera, “Cloud Computing: Security Issues and Research Challenges”, Available online at https://www.jncet.org/Manuscripts/Volume-7/Issue-11/Vol-7-issue-11-M-12.pdf, 2017.
[10]. ENISA Foresight Cybersecurity Threats, Available online at https://www.enisa. europa.eu/publications/enisa-foresight-cybersecurity-threats-for-2030, 2023.
[11]. I. Sommerville, “Software Engineering”, 10th Edition, 2015.
[12]. ENISA Threat Landscape 2022, Available online at https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022, 2022.
[13]. Shahed Latif, Subra Kumaraswamy, Tim Mather, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance”, 2009, Available online at https:// csit.ust.edu.sd/files/2018/09/security3.pdf.
[14]. Check Point 2023 Security Report, Available online at https://go.checkpoint.com/2023-cyber-security-report/, 2023.
Article Title: Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity
Author(s): DESPA, Andreea-Raluca
Date of Publication: 2023-12-27
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2023.02.04
Issue: Volume 12, Issue 2, Year 2023
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 35-42 (8 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.