Exploring Current Trends and Challenges in Cybersecurity: A Comprehensive Survey

Main Article Content

B. Yamini
P. Radhakrishnan
M. Nalini
B. Maheswari
M. Shanmuganathan
Siva Subramanian R.

Abstract

Cyber security is the process of preventing unauthorized access, theft, damage, and interruption to computers, servers, networks, and data. It entails putting policies into place to guarantee the availability, confidentiality, and integrity of information and information systems. Cyber security seeks to protect against a variety of dangers, including as hacking, data breaches, malware infections, and other nefarious actions.  Cyber security has grown to be a major worry as a result of the quick development of digital technology and the growing interconnection of our contemporary society. In order to gain insight into the constantly changing world of digital threats and the countermeasures put in place to address them, this survey seeks to study current trends and issues in the area of cyber security. The study includes responses from end users, business executives, IT administrators, and experts across a wide variety of businesses and sectors. The survey gives insight on important problems such the sorts of cyber threats encountered, the efficacy of current security solutions, future technology influencing cyber security, and the human elements leading to vulnerabilities via a thorough analysis of the replies. The most important conclusions include an evaluation of the most common cyber dangers, such as malware, phishing scams, ransom ware, and data breaches, as well as an investigation of the methods and tools used to counter these threats. The survey explores the significance of staff education and awareness in bolstering cyber security defenses and pinpoints opportunities for development in this area. The survey also sheds insight on how cutting-edge technologies like cloud computing, artificial intelligence, and the Internet of Things (IoT) are affecting cyber security practices. It analyses the advantages and disadvantages of using these technologies while taking into account issues like data privacy, infrastructure security, and the need for specialized skills. The survey also looks at the compliance environment, assessing how industry norms and regulatory frameworks affect cyber security procedures. The survey studies the obstacles organizations encounter in attaining compliance and assesses the degree of knowledge and commitment to these requirements. The results of this cyber security survey help to better understand the current status of cyber security and provide organizations and individual’s useful information for creating effective policies to protect digital assets. This study seeks to promote a proactive approach to cyber security, allowing stakeholders to stay ahead of threats and build a safe digital environment by identifying relevant trends and concerns.

Article Details

How to Cite
Yamini, B., Radhakrishnan, P., Nalini, M., Maheswari, B., Shanmuganathan, M., & R., S. S. . (2023). Exploring Current Trends and Challenges in Cybersecurity: A Comprehensive Survey. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10s), 23–33. https://doi.org/10.17762/ijritcc.v11i10s.7590
Section
Articles

References

Kotut L, Wahsheh LA. Survey of cyber security challenges and solutions in smart grids. In 2016 cybersecurity symposium (CYBERSEC) Apr 18 pp. 32-37 ,2016.

Shi J, Wan J, Yan H, Suo H. A survey of cyber-physical systems. In2011 international conference on wireless communications and signal processing (WCSP) Nov 9 pp. 1-6. 2011.

Sobb T, Turnbull B, Moustafa N. Supply chain 4.0: A survey of cyber security challenges, solutions and future directions. Electronics. Nov 6;9-11:2020.

Sajal SZ, Jahan I, Nygard KE. A Survey on Cyber Security Threats and Challenges in Modern Society. In2019 IEEE international conference on electro information technology (EIT) 2019 May 20 pp. 525-528. 2019.

Singh S, Silakari S. A survey of cyber-attack detection systems, International Journal of Computer Science and Network Security. May 30;9(5),2009

Benarous L, Kadri B, Bouridane A. A survey on cyber security evolution and threats: biometric authentication solutions. Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era.:371-411, 2017

M. Maroof, N. ., & Abdul Waheed, M. . (2023). Energy Efficient Clustering and Routing using Energy Centric MJSO and MACO for Wireless Sensor Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 213–221. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2648

Lu Y, Da Xu L. Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal. Sep 12;6(2):2103-15, 2018

Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in iot-based cloud computing: A comprehensive survey. Electronics. Jan;11(1):16, 2022

Li JH. Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering. Dec;19(12):1462-74,2018

Mathew AR. Cyber security through blockchain technology. Int. J. Eng. Adv. Technol. Oct;9(1):3821-4, 2019

Tirumala SS, Valluri MR, Babu GA. A survey on cybersecurity awareness concerns, practices and conceptual measures. In2019 International Conference on Computer Communication and Informatics (ICCCI) Jan 23 (pp. 1-6). 2019.

Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials. Oct 26;18(2):1153-76.2015

Tanaka, A., Min-ji, K., Silva, C., Cohen, D., & Mwangi, J. Predictive Analytics for Healthcare Resource Allocation. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/150

Mylrea M, Gourisetti SN, Nicholls A. An introduction to buildings cybersecurity framework. In2017 IEEE symposium series on computational intelligence (SSCI) Nov 27 (pp. 1-7). IEEE, 2017

Korpela K. Improving cyber security awareness and training programs with data analytics. Information Security Journal: A Global Perspective. Jul 1;24(1-3):72-7, 2015

Pan J, Yang Z. Cybersecurity challenges and opportunities in the new" edge computing+ IoT" world. InProceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization Mar 14 (pp. 29-32), 2018.