Open Access Open Access  Restricted Access Subscription Access

A Review Paper on Recent Cyberattacks and Proactive Steps to Prevent Attacks

Abubakar Osman, Zeeshan Malik

Abstract


Cybersecurity stands out as a significant contemporary challenge in today's world. With today's technology, we can communicate any sort of data, whether it be an audio file, a PDF document, or a video, with just a single click. Therefore, protecting information is crucial in the sphere of cyber security. As the globe becomes more and more connected to networks that may be used for conducting digital transactions, cyber security is still a very serious problem since cybercrimes are always destroying data with fresh ideas. Consequently, cyber security is crucial everywhere in the world. Since electronic technology is so prevalent nowadays, safeguarding sensitive data from cyberattacks is a difficult problem. This review work primarily focuses on current cyberattacks, as well as the most recent cybersecurity tactics, morals, and trends that are reshaping the field.


Keywords


Cyber security, cyberattacks, security techniques, digital transactions, global networking

Full Text:

PDF

References


IBM. (2021). What is a cyberattack? [Online]. Available from: https://www.ibm.com/topics/cyber-attack#:~:text=ibm.com).-,Why%20do%20cyberattacks%20happen%3F,data%20theft%2C%20or

%20business%20disruption.

Britannica. (2023). Pegasus (spyware). Description, Origins, Spying, & Controversies. In: Encyclopædia Britannica. [Online]. Available from: https://www.britannica.com/topic/Pegasus-spyware

Wikipedia Contributors. (2023). Pegasus (spyware). [Online]. Wikimedia Foundation. Available from: https://en.wikipedia.org/wiki/Pegasus_(spyware)

Tallahassee Memorial HealthCare. (2023). Notice to Patients Regarding IT Security Event Tallahassee, Florida (FL). [Online]. Tallahassee Memorial HealthCare. Available from: https://www.tmh.org/news/2023/notice-to-patients-regarding-it-security-event

Gao BM, Liu MT, Chu R. Information disclosing willingness in mobile internet contexts. Asia Pac J Mark Logist. 2023 Jan 4; 35(1): 108–29.

James A. (2018). University Hit With $1.14m Ransomware Attack. [Online]. Hut Six. Available from: https://www.hutsix.io/university-of-california-ransomware-attack/#:~:text=University%20

of%20California%20Ransomware%20Attack,of%20Medicine%20earlier%20this%20month.

Celosia G, Cunche M. Discontinued privacy: Personal data leaks in apple bluetooth-low-energy continuity protocols. Proceedings on Privacy Enhancing Technologies. 2020 Jul 6; 2020: 26–46.

Thakur K, Qiu M, Gai K, Ali ML. An investigation on cyber security threats and security models. In 2015 IEEE 2nd international conference on cyber security and cloud computing. 2015 Nov 3; 307–311.

Muckin M, Fitch SC. A threat-driven approach to cyber security. Lockheed Martin Corporation; 2014.

Reddy GN, Reddy GJ. A study of cyber security challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842. 2014 Feb 8.

Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, Zhang J. Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives. IEEE Commun Surv Tutor. 2023 May 5; 25(3): 1748–1774.

Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021 Nov 1; 7: 8176–86.

Aslan Ö, Aktuğ SS, Ozkan-Okay M, Yilmaz AA, Akin E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics. 2023 Mar 11; 12(6): 1333.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Computer Technology & Applications