Meta-Analysis of Cyber Dominance in Modern Warfare: Attacks and Mitigation Strategies
Main Article Content
Abstract
This meta-analysis study focused on cyber dominance in modern warfare, particularly, exploring cyber-attacks and mitigation strategies. The study ascertained that the escalating growth of internet connectivity and the rising reliance on networked digital technologies have opened new avenues for cyber-attacks in the contemporary era. Various actors, comprising state and non-state entities, parties in offensive hacking operations and information campaigns to achieve strategic goals. The study conducts a comprehensive meta-analysis of existing research to explore key strategies for establishing and maintaining cyber-attacks and mitigation strategies. This study analyzed peer-reviewed papers that investigate both cyber-attack tactics employed by state actors and defensive policy frameworks and measures adopted by nations. The significant volume of studies indicated that the execution of robust authentication strategies, such as multi-factor authentication (MFA) could mitigate cyberattacks. The meta-analysis studies equally ascertained that consistently employing security patches and software updates is instrumental to addressing these vulnerabilities promptly. Besides, configuring firewalls to limit unnecessary inbound and outbound traffic helps create a strong defense perimeter and prevents unauthorized communication.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
. Aslan, O., and Samet, R., (2018)."Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities
and Bugs," 2017 International Conference on Cyberworlds (CW), Chester, UK, 2017, pp. 222-225, doi:
1109/CW.2017.22.
. Algarni, A. M., Thayananthan, V., & Malaiya, Y. K. (2021). Quantitative Assessment of Cybersecurity
Risks for Mitigating Data Breaches in Business Systems. Retrieved from https://www.mdpi.com/2076-
/11/8/3678
. Bamrara, A. (2023). Cyber Attacks and Defense Strategies in India: An Empirical Assessment of Banking
Sector. Retrieved from
https://www.academia.edu/100835187/Cyber_Attacks_and_Defense_Strategies_in_India_An_Empirica
l_Assessment_of_Banking_Sector
. Boscoianu, M. (2021). Refined Concepts of Massive and Flexible Cyber Attacks with Information
Warfare Strategies. Retrieved from https://www.academia.edu/57722212/Refined_Concepts_of_Massive_and_Flexible_Cyber_Attacks_wi
th_Information_Warfare_Strategies
. Duan, N., Yee, N., Otis, A., Joo, J. C., Stewart, E., Bayles, A., Spiers, N., & Cortez, E. (2021). Mitigation
Strategies Against Cyberattacks on Distributed Energy Resources. IEEE.
https://doi.org/10.1109/isgt49243.2021.9372173
. Gandal, N., Moore, T., Riordan, M., & Barnir, N. (2023). Empirically evaluating the effect of security
precautions on cyber incidents. Computers & Security, 133,
https://doi.org/10.1016/j.cose.2023.103380
. Hasan, M. R. (2022). Cybercrime Techniques in Online Banking. Int. J. of Aquatic Science, 13(1), 524-
Retrieved from: https://www.journal-aquaticscience.com/article_158883.html (January 2022)
. Khalel, S., & Khudher, S., (2022)."Cyber-Attacks Risk Mitigation on Power System via Artificial
Intelligence Technique," 2022 9th International Conference on Electrical and Electronics Engineering
(ICEEE), Alanya, Turkey, 2022, pp. 117-122, doi: 10.1109/ICEEE55327.2022.9772559.
. Kolesnikov, N. (2023). 50+ Cybersecurity Statistics for 2023 You Need to Know – Where, Who & What
is Targeted. Retrieved from https://www.techopedia.com/cybersecurity-statistics
. Kelemen, R. (2020). Cyber Attacks and Cyber Intelligence in the System of Cyber Warfare.
Retrieved from
https://www.academia.edu/44681867/Cyber_Attacks_and_Cyber_Intelligence_in_the_System_of_Cyb
er_Warfare
. Liu, X., Zhang, J., Zhu, P., Tan, Q., & Yin, W. (2021). Quantitative cyber-physical security
analysis methodology for industrial control systems based on incomplete information Bayesian
game. Computers & Security, 102, 102138. https://doi.org/10.1016/j.cose.2020.102138
. Hasan, M. R. (2022). Cybercrime Techniques in Online Banking. Int. J. of Aquatic Science,
(1), 524-
. 541. Retrieved from https://www.journal-aquaticscience.com/article_158883.html
. Pran, R. H. (2022). Business Impact Analysis of Cyber-attacks in Bank by Social Network
Analysis and Machine Learning. Retrieved from
https://www.academia.edu/92999479/Business_Impact_Analysis_of_Cyber_attacks_in_Bank_by_Soci
al_Network_Analysis_and_Machine_Learning
. Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., … Sarwat, A. I. (2023).
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Retrieved
from https://www.mdpi.com/1424-8220/23/8/4060
. Saad, M., Bukhari, S., and Kim, C., (2019). "A review of various modern strategies for
mitigation of cyber-attacks in smart grids," 2019 IEEE Transportation Electrification Conference and
Expo, Asia-Pacific (ITEC Asia-Pacific), Seogwipo, Korea (South), 2019, pp. 1-7, doi: 10.1109/ITECAP.2019.8903798.
. Sheehan, B., Murphy, F., Kia, A. N., & Kiely, R. (2021). A quantitative bow-tie cyber risk
classification and assessment framework. Journal of Risk Research, 24(12), 1619–1638.
doi:10.1080/13669877.2021.1900337 Statista. (2023). Cyber-attacks: most-targeted industries 2021-
https://www.statista.com/statistics/221293/cyber-crime-target-industries/
. Suzen, A. (2020). A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0
Ecosystem. Retrieved from
https://www.academia.edu/42883345/A_Risk_Assessment_of_Cyber_Attacks_and_Defense_Strategies
_in_Industry_4_0_Ecosystem
. Will. (2023). Cyber Risk Evaluation and Mitigation - A Quantitative Research Analysis -.
Retrieved from https://researchpod.org/informatics-technology/cyber-risk-evaluation-mitigation