Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector

Stephanie Ness, Tushar Khinvasara
{"title":"Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector","authors":"Stephanie Ness, Tushar Khinvasara","doi":"10.9734/jerr/2024/v26i21075","DOIUrl":null,"url":null,"abstract":"Currently, the majority of economic, commercial, cultural, social, and governmental activity and contacts between countries, encompassing individuals, non-governmental organizations, and government institutions, occur in the virtual realm known as cyberspace. In recent times, numerous private enterprises and governmental institutions worldwide have encountered the issue of cyber- attacks and the peril associated with wireless communication technology. The modern society heavily relies on electronic technology, and safeguarding this data from cyber-attacks poses a formidable challenge. Cyber-attacks are intended to inflict financial harm onto companies. Cyber- attacks may serve military or political objectives in certain instances. Some examples of these damages include PC infections, knowledge breaches, data distribution service (DDS), and other attack routes. For this purpose, different companies employ diverse strategies to mitigate the harm caused by cyber-attacks. Cybersecurity monitors up-to-date information on the most recent IT data. Researchers worldwide have proposed several techniques to prevent cyber-attacks or mitigate their impact. Several approaches are currently in the operational phase, while others are still in the study phase. The objective of this study is to conduct a thorough examination and evaluation of the latest advancements in the field of cyber security, with the purpose of identifying and analyzing the problems, vulnerabilities, and strengths of the proposed methodologies. A comprehensive analysis is conducted on several forms of novel descendant attacks. The discussion revolves around conventional security frameworks, encompassing their historical context and early-generation approaches to cyber-security. Furthermore, this report presents the latest advancements and developing patterns in the field of cyber security, as well as the current problems and risks to security. The comprehensive review study offered for IT and cyber security researchers is anticipated to be beneficial.","PeriodicalId":508164,"journal":{"name":"Journal of Engineering Research and Reports","volume":"50 42","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research and Reports","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9734/jerr/2024/v26i21075","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Currently, the majority of economic, commercial, cultural, social, and governmental activity and contacts between countries, encompassing individuals, non-governmental organizations, and government institutions, occur in the virtual realm known as cyberspace. In recent times, numerous private enterprises and governmental institutions worldwide have encountered the issue of cyber- attacks and the peril associated with wireless communication technology. The modern society heavily relies on electronic technology, and safeguarding this data from cyber-attacks poses a formidable challenge. Cyber-attacks are intended to inflict financial harm onto companies. Cyber- attacks may serve military or political objectives in certain instances. Some examples of these damages include PC infections, knowledge breaches, data distribution service (DDS), and other attack routes. For this purpose, different companies employ diverse strategies to mitigate the harm caused by cyber-attacks. Cybersecurity monitors up-to-date information on the most recent IT data. Researchers worldwide have proposed several techniques to prevent cyber-attacks or mitigate their impact. Several approaches are currently in the operational phase, while others are still in the study phase. The objective of this study is to conduct a thorough examination and evaluation of the latest advancements in the field of cyber security, with the purpose of identifying and analyzing the problems, vulnerabilities, and strengths of the proposed methodologies. A comprehensive analysis is conducted on several forms of novel descendant attacks. The discussion revolves around conventional security frameworks, encompassing their historical context and early-generation approaches to cyber-security. Furthermore, this report presents the latest advancements and developing patterns in the field of cyber security, as well as the current problems and risks to security. The comprehensive review study offered for IT and cyber security researchers is anticipated to be beneficial.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络空间的新威胁:对国家安全政策和医疗保健行业的影响
目前,包括个人、非政府组织和政府机构在内的大多数经济、商业、文化、社会和政府活动以及国与国之间的联系都发生在被称为网络空间的虚拟领域。近来,全球众多私营企业和政府机构都遇到了网络攻击问题以及与无线通信技术相关的危险。现代社会严重依赖电子技术,保护这些数据免受网络攻击是一项艰巨的挑战。网络攻击的目的是对公司造成经济损失。在某些情况下,网络攻击可能会达到军事或政治目的。这些损害的一些例子包括 PC 感染、知识泄露、数据分发服务 (DDS) 和其他攻击途径。为此,不同的公司采用不同的策略来减轻网络攻击造成的危害。网络安全监测最新的 IT 数据信息。世界各地的研究人员已经提出了几种预防网络攻击或减轻其影响的技术。有几种方法目前已进入操作阶段,而其他方法仍处于研究阶段。本研究的目的是对网络安全领域的最新进展进行彻底检查和评估,以确定和分析所提方法的问题、漏洞和优势。本文对几种形式的新型后裔攻击进行了全面分析。讨论围绕传统安全框架展开,包括其历史背景和早期的网络安全方法。此外,本报告还介绍了网络安全领域的最新进展和发展模式,以及当前的安全问题和风险。本报告为 IT 和网络安全研究人员提供了全面的综述研究,预计将有所裨益。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Resilience and Recovery Mechanisms for Software-Defined Networking (SDN) and Cloud Networks Experimental Multi-dimensional Study on Corrosion Resistance of Inorganic Phosphate Coatings on 17-4PH Stainless Steel Modelling and Optimization of a Brewery Plant from Starch Sources using Aspen Plus Innovations in Thermal Management Techniques for Enhanced Performance and Reliability in Engineering Applications Development Status and Outlook of Hydrogen Internal Combustion Engine
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1