Cybersecurity: Protecting Networks, Systems, and Data from Cyberattacks
Main Article Content
Abstract
The prevalence of cyber risks presents an ever-increasing threat to the security of networks, systems, and sensitive data in an era where digital connectivity rules. This study explores the complex field of cybersecurity with the goal of offering a thorough grasp of the tactics used to defend against cyberattacks.
The first section of the study examines the historical background of cybersecurity, showing how it developed from simple computer security measures to the complex array of modern threats. The focus is on describing the wide range of cyberthreats, such as ransomware, phishing, and malware, and illustrating how they appear and what happens in the real world. A large amount of research is devoted to analyzing the vulnerabilities present in operating systems, networks, and data storage, providing insight into the complex interactions between technological flaws and human variables. The paper explores the role of human error as a crucial trigger for cybersecurity breaches in addition to clarifying the various attack surfaces.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
Anderson, R., & Moore, T. (2009). Information security economics—and beyond. In T. M. Moore (Ed.),
Economics of Information Security (Vol. 1, pp. 187-198). Springer.
Clarke, R., & Knake, R. K. (2010). Cyber war: The next threat to national security and what to do about it.
HarperCollins..
Disterer, G. (2012). Cyber security and the politics of time. In Proceedings of the 2012 European Conference
on Information Warfare and Security (pp. 71-79). Academic Conferences International Limited.
Eren, S., & Batur, D. (2017). Cybersecurity challenges in critical infrastructure protection. In Advances in
Information Security, Privacy, & Ethics (pp. 19-43). IGI Global.
Goodman, S. E. (Ed.). (2015). The dynamics of cyberspace: Understanding complex and unpredictable
behavior. Oxford University Press.
Herold, R. V. (2016). Data privacy for the smart grid. Springer.
Kizza, J. M. (2015). Guide to computer network security (3rd ed.). Springer.
Landwehr, C. E., & Bull, J. M. (2012). Cyber security: A critical review of several key issues. In Proceedings
of the 45th Hawaii International Conference on System Sciences (pp. 1032-1041). IEEE.
NIST. (2018). Framework for improving critical infrastructure cybersecurity. National Institute of Standards
and Technology. https://www.nist.gov/cyberframework.
Ozdemir, Z. D. (2017). Cybersecurity in smart grid communication networks. In Security and Privacy in
Communication Networks (pp. 199-224). Springer.
Ransbotham, S., Kiron, D., & Prentice, P. (2015). Beyond the hype: The hard work behind analytics success.
MIT Sloan Management Review, 56(4), 1-31.
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.
W. Norton & Company..
Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford
University Press.
World Economic Forum. (2018). "Digital Transformation Initiative: Unlocking $100 Trillion for Business
and Society from Digital Transformation."
Whitman, M. E., & Mattord, H. J. (2018). Management of Information Security (6th ed.). Cengage Learning.
R. K. Kaushik Anjali and D. Sharma, "Analyzing the Effect of Partial Shading on Performance of Grid
Connected Solar PV System", 2018 3rd International Conference and Workshops on Recent Advances and
Innovations in Engineering (ICRAIE), pp. 1-4, 2018.