CYBERSECURITY THREATS AND COUNTERMEASURES: A REVIEW

Main Article Content

Abha Tamrakar
Bhupesh Patra

Abstract

Cybersecurity is a critical concern in today's digital age, with organizations and individuals facing an ever-evolving landscape of cyber threats. This paper provides a comprehensive review of cybersecurity threats, vulnerabilities, countermeasures, and future trends. It begins with an overview of prominent cybersecurity threats, including malware, phishing, and Distributed Denial of Service (DDoS) attacks, highlighting their impact on systems and data. The discussion then shifts to cybersecurity vulnerabilities, focusing on software vulnerabilities and human factors, such as human error and social engineering attacks. The paper also explores cybersecurity countermeasures, such as antivirus software, firewalls, and encryption, detailing how these tools work and their limitations. Furthermore, it examines emerging trends in cybersecurity, including new types of cyber attacks and advancements in cybersecurity technologies, and discusses their potential implications for cybersecurity professionals. By understanding the current cybersecurity landscape and anticipating future trends, organizations and individuals can better prepare for and mitigate the risks posed by cyber threats.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Tamrakar, A. ., & Patra, B. . (2018). CYBERSECURITY THREATS AND COUNTERMEASURES: A REVIEW. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 9(3), 1400–1404. https://doi.org/10.61841/turcomat.v9i3.14598
Section
Research Articles

References

Choo, K.-K. R., Smith, R. G., & McCusker, R. (2012). An empirical study of the effectiveness of cyber

security governance in public sector organisations. In Proceedings of the 2012 45th Hawaii International

Conference on System Sciences (pp. 4743–4752). IEEE.

Garber, L., Huth, C., & Krawczyk, P. (2013). How to stay alive when the grid dies: Surviving a cyber attack.

Communications of the ACM, 56(5), 35–37.

Gupta, B., Walia, G. K., & Saxena, K. K. (2018). An extensive survey on phishing attacks and their

detection techniques. Computers & Security, 76, 1–25.

Kumar, S., Azees, M. A., & Bhaskaran, R. (2014). A survey on malware detection methods. Procedia

Technology, 14, 435–442.

Mirkovic, J., Prier, G., Reiher, P., & Hussain, A. (2004). Attacking DDoS at the source. IEEE Network,

(1), 23–29.

Aljawarneh, S. A. (2018). Cyber security awareness and education for cyber security students: A

questionnaire analysis. Journal of King Saud University - Computer and Information Sciences, 30(4), 512–

Andronio, N., Migliardi, M., & Daidone, A. (2018). A survey on ransomware: Evolution, prevention, and

mitigation. Computers & Security, 78, 131–148.

Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why phishing works. In Proceedings of the SIGCHI

Conference on Human Factors in Computing Systems (pp. 581–590). ACM.

Rahim, M. S., Hasan, M. M., & Al-Hammadi, Y. (2018). A survey of software vulnerabilities. In 2018 9th

International Conference on Information Technology (ICIT) (pp. 219–224). IEEE.

Chowdhury, M. M. H., Mahmud, M. R., & Islam, S. H. (2017). A survey of network firewalls and their

applications. In 2017 5th International Conference on Networking Systems and Security (NSysS) (pp. 1–

. IEEE.

Stallings, W. (2017). Cryptography and network security: Principles and practices (7th ed.). Pearson.

Hadnagy, C. (2011). Social engineering: The art of human hacking. John Wiley & Sons.

Mitnick, K. D. (2002). The art of deception: Controlling the human element of security. John Wiley & Sons.

Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Designing and evaluating phishing training tools. In

Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 4039–

. ACM.

Bishop, M. (2003). Computer security: Art and science. Addison-Wesley.

Kaur, R., Kaur, M., & Singh, R. (2017). A survey of antivirus detection techniques. International Journal

of Computer Applications, 164(4), 40–44.

Smith, A. (2015). The science of cybersecurity: A review of literature. Information & Computer Security,

(4), 410–445.

Choo, K.-K. R., Smith, R. G., & McCusker, R. (2012). An empirical study of the effectiveness of cyber

security governance in public sector organisations. In Proceedings of the 2012 45th Hawaii International

Conference on System Sciences (pp. 4743–4752). IEEE.

Garber, L., Huth, C., & Krawczyk, P. (2013). How to stay alive when the grid dies: Surviving a cyber attack.

Communications of the ACM, 56(5), 35–37.

Gupta, B., Walia, G. K., & Saxena, K. K. (2018). An extensive survey on phishing attacks and their

detection techniques. Computers & Security, 76, 1–25.

Kumar, S., Azees, M. A., & Bhaskaran, R. (2014). A survey on malware detection methods. Procedia

Technology, 14, 435–442.

Mirkovic, J., Prier, G., Reiher, P., & Hussain, A. (2004). Attacking DDoS at the source. IEEE Network,

(1), 23–29.

Aljawarneh, S. A. (2018). Cyber security awareness and education for cyber security students: A

questionnaire analysis. Journal of King Saud University - Computer and Information Sciences, 30(4), 512–

Andronio, N., Migliardi, M., & Daidone, A. (2018). A survey on ransomware: Evolution, prevention, and

mitigation. Computers & Security, 78, 131–148.

Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why phishing works. In Proceedings of the SIGCHI

Conference on Human Factors in Computing Systems (pp. 581–590). ACM.