Skip to main content

Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends

  • Conference paper
  • First Online:
Emerging Trends and Applications in Artificial Intelligence ( ICETAI 2023)

Abstract

For the information technology sector, cybersecurity is essential. One of the main issues in the modern world is sending information from one system to another without letting the information out. Online crimes, which are on the rise daily, are the first thing that comes to mind when we think about cyber security. Various governments and businesses are adopting a number of actions to stop these cybercrimes. A lot of individuals are still quite worried about cyber security after taking many safeguards. This study’s primary goal is to examine the difficulties that modern technology-based cyber security faces, especially in light of the rising acceptance of cutting-edge innovations like server less computing, blockchain, and artificial intelligence (AI). The aim of this paper is to give readers a good overview of the most recent cyber security trends, ethics, and strategies. This study focuses on the present state of cyber security and the steps that may be taken to address the rising dangers posed by modern technology through a thorough investigation of the existing literature and actual case studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Corallo, A., Lazoi, M., Lezzi, M.: Cybersecurity in the context of industry 4.0: a structured classification of critical assets and business impacts. Comput. Ind. 114, 103165 (2020)

    Article  Google Scholar 

  2. Kim, J.: Cyber-security in government: reducing the risk. Comput. Fraud Secur. 7(2017), 8–11 (2017)

    Article  Google Scholar 

  3. Kumar, A., Bhushan, B., Nand, P.: Preventing and detecting intrusion of cyberattacks in smart grid by integrating blockchain. In: Sharma, D.K., Peng, S.-L., Sharma, R., Zaitsev, D.A. (eds.) Micro-Electronics and Telecommunication Engineering. LNNS, vol. 373, pp. 119–130. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-8721-1_12

    Chapter  Google Scholar 

  4. Madaan, G., Bhushan, B., Kumar, R.: Blockchain-based cyberthreat mitigation systems for smart vehicles and industrial automation. Stud. Big Data Multimed. Technol. Internet Things Environ. 13–32 (2020). https://doi.org/10.1007/978-981-15-7965-3_2

  5. Chen, P.: The evolution of cybercrime: from hackers to organized crime. J. Financ. Crime 21(2), 312–322 (2014)

    Google Scholar 

  6. McAfee & CSIS. The economic impact of cybercrime—No slowdown in sight (2016)

    Google Scholar 

  7. Kumar, A., Bhushan, B., Malik, A., Kumar, R.: Protocols, solutions, and testbeds for cyber-attack prevention in industrial SCADA systems. In: Pattnaik, P.K., Kumar, R., Pal, S. (eds.) Internet of Things and Analytics for Agriculture, Volume 3. SBD, vol. 99, pp. 355–380. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-6210-2_17

    Chapter  Google Scholar 

  8. Kashyap, S., Bhushan, B., Kumar, A., Nand, P.: Quantum blockchain approach for security enhancement in cyberworld. In: Kumar, R., Sharma, R., Pattnaik, P.K. (eds.) Multimedia Technologies in the Internet of Things Environment, Volume 3. SBD, vol. 108, pp. 1–22. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0924-5_1

    Chapter  Google Scholar 

  9. Singh, R., Kumar, R.: Cybercrime and its effects on individuals and organizations: a review of the literature. J. Cybersecur. 4(2), 73–87 (2018)

    Google Scholar 

  10. Grier, C., Song, D., Tanz, J.: A first look at computer security dividends. In: ACM Conference on Computer and Communications Security, pp. 345–354 (2010)

    Google Scholar 

  11. Zhou, Y., Wang, X.: A survey of intrusion detection techniques. J. Netw. Comput. Appl.Netw. Comput. Appl. 35(1), 1–14 (2012)

    MathSciNet  Google Scholar 

  12. Chakraborty, S., Biswas, P.: A review on cyber security: threats, challenges, and solutions. J. King Saud Univ.-Comput. Inf. Sci. 30(2), 131–139 (2018)

    Google Scholar 

  13. Anti-Phishing Working Group. Phishing Activity Trends Report Q3 2020 (2020). https://apwg.org/reports/apwg-phishing-activity-trends-report-q3-2020/

  14. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci.Comput. Syst. Sci. 80(5), 973–993 (2014)

    Article  MathSciNet  Google Scholar 

  15. Hu, Y., et al.: Artificial intelligence security: Threats and countermeasures. ACM Comput. Surv. (CSUR) 55(1), 1–36 (2021)

    Article  Google Scholar 

  16. Li, C., Wang, L., Ji, S., Zhang, X., Xi, Z., Guo, S., Wang, T.: Seeing is living? Rethinking the security of facial liveness verification in the DeepFake era. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 2673–2690 (2022)

    Google Scholar 

  17. Arora, A., Kaur, A., Bhushan, B., Saini, H.: Security concerns and future trends of internet of things. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (2019). https://doi.org/10.1109/icicict46008.2019.8993222

  18. Goel, A.K., Rose, A., Gaur, J., Bhushan, B.: Attacks, countermeasures and security paradigms in IoT. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (2019). https://doi.org/10.1109/icicict46008.2019.8993338

  19. Miao, Y., Chen, C., Pan, L., Han, Q.-L., Zhang, J., Xiang, Y.: Machine learning–based cyber attacks targeting on controlled information: a survey. ACM Comput. Surv. (CSUR) 54(7), 1–36 (2021)

    Article  Google Scholar 

  20. Choo, K.-K.R.: Cloud computing: challenges and future directions. Trends Issues Crime Crim. Just. 400, 1–6 (2010)

    Google Scholar 

  21. Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. Tutor. 21(2), 1851–1877 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akhtar Jamil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Imam, M., Wajid, M.A., Bhushan, B., Hameed, A.A., Jamil, A. (2024). Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends. In: García Márquez, F.P., Jamil, A., Hameed, A.A., Segovia Ramírez, I. (eds) Emerging Trends and Applications in Artificial Intelligence. ICETAI 2023. Lecture Notes in Networks and Systems, vol 960. Springer, Cham. https://doi.org/10.1007/978-3-031-56728-5_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56728-5_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56727-8

  • Online ISBN: 978-3-031-56728-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics