Abstract
For the information technology sector, cybersecurity is essential. One of the main issues in the modern world is sending information from one system to another without letting the information out. Online crimes, which are on the rise daily, are the first thing that comes to mind when we think about cyber security. Various governments and businesses are adopting a number of actions to stop these cybercrimes. A lot of individuals are still quite worried about cyber security after taking many safeguards. This study’s primary goal is to examine the difficulties that modern technology-based cyber security faces, especially in light of the rising acceptance of cutting-edge innovations like server less computing, blockchain, and artificial intelligence (AI). The aim of this paper is to give readers a good overview of the most recent cyber security trends, ethics, and strategies. This study focuses on the present state of cyber security and the steps that may be taken to address the rising dangers posed by modern technology through a thorough investigation of the existing literature and actual case studies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Corallo, A., Lazoi, M., Lezzi, M.: Cybersecurity in the context of industry 4.0: a structured classification of critical assets and business impacts. Comput. Ind. 114, 103165 (2020)
Kim, J.: Cyber-security in government: reducing the risk. Comput. Fraud Secur. 7(2017), 8–11 (2017)
Kumar, A., Bhushan, B., Nand, P.: Preventing and detecting intrusion of cyberattacks in smart grid by integrating blockchain. In: Sharma, D.K., Peng, S.-L., Sharma, R., Zaitsev, D.A. (eds.) Micro-Electronics and Telecommunication Engineering. LNNS, vol. 373, pp. 119–130. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-8721-1_12
Madaan, G., Bhushan, B., Kumar, R.: Blockchain-based cyberthreat mitigation systems for smart vehicles and industrial automation. Stud. Big Data Multimed. Technol. Internet Things Environ. 13–32 (2020). https://doi.org/10.1007/978-981-15-7965-3_2
Chen, P.: The evolution of cybercrime: from hackers to organized crime. J. Financ. Crime 21(2), 312–322 (2014)
McAfee & CSIS. The economic impact of cybercrime—No slowdown in sight (2016)
Kumar, A., Bhushan, B., Malik, A., Kumar, R.: Protocols, solutions, and testbeds for cyber-attack prevention in industrial SCADA systems. In: Pattnaik, P.K., Kumar, R., Pal, S. (eds.) Internet of Things and Analytics for Agriculture, Volume 3. SBD, vol. 99, pp. 355–380. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-6210-2_17
Kashyap, S., Bhushan, B., Kumar, A., Nand, P.: Quantum blockchain approach for security enhancement in cyberworld. In: Kumar, R., Sharma, R., Pattnaik, P.K. (eds.) Multimedia Technologies in the Internet of Things Environment, Volume 3. SBD, vol. 108, pp. 1–22. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0924-5_1
Singh, R., Kumar, R.: Cybercrime and its effects on individuals and organizations: a review of the literature. J. Cybersecur. 4(2), 73–87 (2018)
Grier, C., Song, D., Tanz, J.: A first look at computer security dividends. In: ACM Conference on Computer and Communications Security, pp. 345–354 (2010)
Zhou, Y., Wang, X.: A survey of intrusion detection techniques. J. Netw. Comput. Appl.Netw. Comput. Appl. 35(1), 1–14 (2012)
Chakraborty, S., Biswas, P.: A review on cyber security: threats, challenges, and solutions. J. King Saud Univ.-Comput. Inf. Sci. 30(2), 131–139 (2018)
Anti-Phishing Working Group. Phishing Activity Trends Report Q3 2020 (2020). https://apwg.org/reports/apwg-phishing-activity-trends-report-q3-2020/
Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci.Comput. Syst. Sci. 80(5), 973–993 (2014)
Hu, Y., et al.: Artificial intelligence security: Threats and countermeasures. ACM Comput. Surv. (CSUR) 55(1), 1–36 (2021)
Li, C., Wang, L., Ji, S., Zhang, X., Xi, Z., Guo, S., Wang, T.: Seeing is living? Rethinking the security of facial liveness verification in the DeepFake era. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 2673–2690 (2022)
Arora, A., Kaur, A., Bhushan, B., Saini, H.: Security concerns and future trends of internet of things. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (2019). https://doi.org/10.1109/icicict46008.2019.8993222
Goel, A.K., Rose, A., Gaur, J., Bhushan, B.: Attacks, countermeasures and security paradigms in IoT. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (2019). https://doi.org/10.1109/icicict46008.2019.8993338
Miao, Y., Chen, C., Pan, L., Han, Q.-L., Zhang, J., Xiang, Y.: Machine learning–based cyber attacks targeting on controlled information: a survey. ACM Comput. Surv. (CSUR) 54(7), 1–36 (2021)
Choo, K.-K.R.: Cloud computing: challenges and future directions. Trends Issues Crime Crim. Just. 400, 1–6 (2010)
Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21(2), 1851–1877 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Imam, M., Wajid, M.A., Bhushan, B., Hameed, A.A., Jamil, A. (2024). Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends. In: García Márquez, F.P., Jamil, A., Hameed, A.A., Segovia Ramírez, I. (eds) Emerging Trends and Applications in Artificial Intelligence. ICETAI 2023. Lecture Notes in Networks and Systems, vol 960. Springer, Cham. https://doi.org/10.1007/978-3-031-56728-5_47
Download citation
DOI: https://doi.org/10.1007/978-3-031-56728-5_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-56727-8
Online ISBN: 978-3-031-56728-5
eBook Packages: EngineeringEngineering (R0)