{"title":"Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector","authors":"Stephanie Ness, Tushar Khinvasara","doi":"10.9734/jerr/2024/v26i21075","DOIUrl":null,"url":null,"abstract":"Currently, the majority of economic, commercial, cultural, social, and governmental activity and contacts between countries, encompassing individuals, non-governmental organizations, and government institutions, occur in the virtual realm known as cyberspace. In recent times, numerous private enterprises and governmental institutions worldwide have encountered the issue of cyber- attacks and the peril associated with wireless communication technology. The modern society heavily relies on electronic technology, and safeguarding this data from cyber-attacks poses a formidable challenge. Cyber-attacks are intended to inflict financial harm onto companies. Cyber- attacks may serve military or political objectives in certain instances. Some examples of these damages include PC infections, knowledge breaches, data distribution service (DDS), and other attack routes. For this purpose, different companies employ diverse strategies to mitigate the harm caused by cyber-attacks. Cybersecurity monitors up-to-date information on the most recent IT data. Researchers worldwide have proposed several techniques to prevent cyber-attacks or mitigate their impact. Several approaches are currently in the operational phase, while others are still in the study phase. The objective of this study is to conduct a thorough examination and evaluation of the latest advancements in the field of cyber security, with the purpose of identifying and analyzing the problems, vulnerabilities, and strengths of the proposed methodologies. A comprehensive analysis is conducted on several forms of novel descendant attacks. The discussion revolves around conventional security frameworks, encompassing their historical context and early-generation approaches to cyber-security. Furthermore, this report presents the latest advancements and developing patterns in the field of cyber security, as well as the current problems and risks to security. The comprehensive review study offered for IT and cyber security researchers is anticipated to be beneficial.","PeriodicalId":508164,"journal":{"name":"Journal of Engineering Research and Reports","volume":"50 42","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research and Reports","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9734/jerr/2024/v26i21075","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Currently, the majority of economic, commercial, cultural, social, and governmental activity and contacts between countries, encompassing individuals, non-governmental organizations, and government institutions, occur in the virtual realm known as cyberspace. In recent times, numerous private enterprises and governmental institutions worldwide have encountered the issue of cyber- attacks and the peril associated with wireless communication technology. The modern society heavily relies on electronic technology, and safeguarding this data from cyber-attacks poses a formidable challenge. Cyber-attacks are intended to inflict financial harm onto companies. Cyber- attacks may serve military or political objectives in certain instances. Some examples of these damages include PC infections, knowledge breaches, data distribution service (DDS), and other attack routes. For this purpose, different companies employ diverse strategies to mitigate the harm caused by cyber-attacks. Cybersecurity monitors up-to-date information on the most recent IT data. Researchers worldwide have proposed several techniques to prevent cyber-attacks or mitigate their impact. Several approaches are currently in the operational phase, while others are still in the study phase. The objective of this study is to conduct a thorough examination and evaluation of the latest advancements in the field of cyber security, with the purpose of identifying and analyzing the problems, vulnerabilities, and strengths of the proposed methodologies. A comprehensive analysis is conducted on several forms of novel descendant attacks. The discussion revolves around conventional security frameworks, encompassing their historical context and early-generation approaches to cyber-security. Furthermore, this report presents the latest advancements and developing patterns in the field of cyber security, as well as the current problems and risks to security. The comprehensive review study offered for IT and cyber security researchers is anticipated to be beneficial.
目前,包括个人、非政府组织和政府机构在内的大多数经济、商业、文化、社会和政府活动以及国与国之间的联系都发生在被称为网络空间的虚拟领域。近来,全球众多私营企业和政府机构都遇到了网络攻击问题以及与无线通信技术相关的危险。现代社会严重依赖电子技术,保护这些数据免受网络攻击是一项艰巨的挑战。网络攻击的目的是对公司造成经济损失。在某些情况下,网络攻击可能会达到军事或政治目的。这些损害的一些例子包括 PC 感染、知识泄露、数据分发服务 (DDS) 和其他攻击途径。为此,不同的公司采用不同的策略来减轻网络攻击造成的危害。网络安全监测最新的 IT 数据信息。世界各地的研究人员已经提出了几种预防网络攻击或减轻其影响的技术。有几种方法目前已进入操作阶段,而其他方法仍处于研究阶段。本研究的目的是对网络安全领域的最新进展进行彻底检查和评估,以确定和分析所提方法的问题、漏洞和优势。本文对几种形式的新型后裔攻击进行了全面分析。讨论围绕传统安全框架展开,包括其历史背景和早期的网络安全方法。此外,本报告还介绍了网络安全领域的最新进展和发展模式,以及当前的安全问题和风险。本报告为 IT 和网络安全研究人员提供了全面的综述研究,预计将有所裨益。