Emerging Challenges in Cyber Security

Emerging Challenges in Cyber Security

Pooja M. R., Gururaj H. L., Pavan S. P. Kumar
DOI: 10.4018/978-1-6684-3991-3.ch002
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

In today's world of digitization where individuals and organizations are connected by the internet, cybersecurity has become a major concern. Some of the most common challenges in cyber security that have evolved to a greater extent include cloud attacks, attacks from IoT, and hardware and software attacks along with the huge increase in phishing and ransomware attacks. With most of the organizations and companies using technological advancements for financial management, cryptocurrency and blockchain attacks also pose a major threat in daily activities. Being able to recognize the cyber security challenges, one must be able to secure themselves at both individual and organization levels. In this chapter, the authors deal with the continuously changing nature of cyber-attacks that has enhanced the difficulty of handling and avoiding emerging threats along with technological solutions that can address the concern. The techniques for demands of privacy and protection will also be discussed.
Chapter Preview
Top

Introduction

The swift degree of transformation in cyber technologies, growing legal constraints governed by policies, and quick data movement is generating an atmosphere in which economic, technical, and policy issues are powerfully dictating what is which science could be doing, how the science could best be done, and essentialisms that are required for those who can do the right science. A significant task has been control of data . Data is detained by and skillfully controlled by a limited number of workers who can limit the access, how, what and when it could be retrieved, as well as how, or if, the data organizations will be at danger since social security attacks concerning cyber space (Meza et. al, 2009). Malwares embedded in tweeted image, phishing, Phony Facebook up-dates, etc., produce administrative uncertainties extending from product operation to negotiating personnel to acquire admittance to intelligence to damage of data or machines themselves from social media delivering malware(Thakur et. Al, 2019, Thuraisingham et. Al,, 2020). Some of the prevalent applications of cyber security involved with handling traffic data analysis comprise of intrusion detection, botnet detection and malware analysis.(Miao et. al, 2018, Maglaras et.al, 2018.

While on the legal side, guidelines along with regulations are out-of-sync with the brand novel technologies, significantly, the charge of alternate withinside the era is such that upcoming styles of unlawful pursuit are rising at an exceptional charge. Many decision/policy and regulation makers have negligible know-how of the era and so layout coverage and regulation which might be regularly unenforceable, inappropriate or so preventive that they save you the technology from being completed that could inhibit or stumble on initial social cyberattacks(Sarker et.al.,2020)

Owing to heterogeneous and/or interconnected characteristic of smart cities, conditions get up wherein all the problems of every aspect location are present (Pal et al,. 2009) We would be untaken with the poorest of all worlds because the interrelated characteristic of smart cities method that each unstable and non-unstable, open-supply and registered structures are concerned in transactions and facts flows. Therefore, virtual forensics for embedded, Cloud and IoT gadgets is extreme and exciting. This is because now, no longer all IoT gadgets have the equal community and alertness architecture (Lu et. al, 2018). Digital forensics of gadgets hosted withinside the Cloud surroundings is made hard through the absence of third party settlement with the client, that could permit forensics investigators to get entry to the facts saved on the Cloud. Data saved in special nations brings in addition assignment to virtual forensic detectives because of judiciary disparities and records laws. The threats along with the demanding situations to the facts saved on Cloud infrastructure will even practice to the IoT gadgets questioned during forensic investigation. Figure 1 shows some of the common Vulnerabilities and the frequent approaches for adopting defense strategies against such vulnerabilities.

Figure 1.

Vulnerabilities and approaches for defense strategies

978-1-6684-3991-3.ch002.f01

Complete Chapter List

Search this Book:
Reset