Abstract
Data security has become increasingly important in today's world of information technology. A modern lifestyle, made possible by advances in technology, is driving people to use their portable devices for shopping and financial transactions in cyberspace. Simultaneously, cybercrime has increased due to the heavy use of social media. Information security has become a major issue today. Cyber-attack incidents have increased significantly with the massive growth of Internet interconnection, often resulting in devastating and grievous consequences. Cyberspace is dominated by malware, which frequently exploits existing vulnerabilities or advances in technology to carry out malicious goals. Security experts have long considered it imperative to develop more innovative and effective mechanisms to defend against malware. Businesses and governments adopt varied measures against cybercrime. Despite ongoing initiatives, cybersecurity remains vital to many. This report outlines common vulnerabilities in software, hardware, and networks. It focuses on new technology-related cybersecurity issues and includes an analysis of ethical and developmental aspects, alongside a review of the latest technological advancements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mohurle, S., Patil, M.: A brief study of wannacry threat: Ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 1938–1940 (2017)
Richardson, R., North, M.M.: Ransomware: Evolution, mitigation and prevention. Int. Manage. Rev. 13(1), 10 (2017)
Dobrygowski, D.: Why Companies Are Forming Cybersecurity Alliances. Harvard Business School Publishing, Harvard Business Review (2019)
Kshetri, N.: Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electron. Commer. Res. 13(1), 41–69 (2013)
Zou, T., et al. : Smart grids cyber–physical security: Parameter correction model against unbalanced false data injection attacks Electr. Power Syst. Res. 187, Article 106490 (2020)
CESG: Common Cyber Attacks: Reducing the Impact. CESG (The Information Security Arm of GCHQ) with CERT-UK (2015)
Boiko, A., Shendryk, V., Boiko, O.: Information systems for supply chain management: uncertainties, risks and cyber security. Procedia Computer Science 149, 65–70 (2019)
Kephart, J.O., White, S.R.: Measuring and modeling computer virus prevalence. In: Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 2–15. IEEE (1993)
Best, K., Lewis, J.: Hacking the democratic mainframe: the Melissa virus and transgressive computing. Media International Australia 95(1), 207–226 (2000)
Mansfield-Devine, S.: Ransomware: taking businesses hostage. Netw. Secur. 10, 8–17 (2016)
Mohamed, A., Køien, G.M.: Cyber security and the Internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secu. 4, 65–88 (2015)
Gopika, B., Rashi, Y.: Predicting the Spread of Malware Outbreaks Using Autoencoder Based Neutral Networks. In: MENDEL, Vol. 25, No. 1, pp. 157–164 (2019)
Von Neumann, J.: The computer and the brain. Yale University Press (2012)
Coleman, R.C.: 2015 IC3 Annual Internet Crime Report. Annual Report, Annual Report, Washington DC, USA: FBI Internet Crime Complaint Center, 1–236 (2015)
Roa, R.E.E.: Ransomware Attacks on the Healthcare Industry, Doctoral dissertation, Utica College (2017)
Reka, S.S., Dragicevic, T.: Future effectual role of energy delivery: A comprehensive review of Internet of Things and smart grid. Renew. Sustain. Energy Rev. 91, 90–108 (2018)
Corno, F., Sánchez, E., Squillero, G.: Evolving assembly programs: how games help microprocessor validation. IEEE Trans. Evol. Comput. 9(6), 695–706 (2005)
Okoye, E.I., Gbegi, D.O.: Forensic accounting: a tool for fraud detection and prevention in the public sector. (A study of selected ministries in Kogi state). Int. J. Acad. Res. Bus. Soc. Sci. 3(3), 1–19 (2013)
Abouzakhar, N.: Critical infrastructure cybersecurity: A review of recent threats and violations (2013)
Bada, M., Sasse, A.M., Nurse, J.R.: Cyber security awareness campaigns: Why do they fail to change behavior? arXiv preprint arXiv:1901.02672 (2019)
Haber, E., Zarsky, T.: Cybersecurity for Infrastructure: A Critical Analysis. Fla (2016)
Homeland Security: State Cybersecurity Governance Case Studies: Cross Site Report. US Department of Homeland Security (2017)
Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J.: A security review of local government using NIST CSF: a case study. J. Supercomput. 74(10), 5171–5186 (2018)
Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)
Mylrea, M., Gourisetti, S.N.G., Larimer, C., Noonan, C.: Insider threat cybersecurity framework webtool & methodology: Defending against complex. cyber-physical threats. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 207–216. IEEE (2018)
OAS: Critical Infrastructure Protection Report Latin America and the Caribbean 2018. Organization of American States (2018)
Ramon, M.C., Zajac, D.A.: Cybersecurity Literature Review and Efforts Report. Prepared for NCHRP Project, 03–127 (2018)
Rao, V.M., Francis, R.A.: Critical review of cybersecurity protection procedures and practice in water distribution systems. In: Proceedings of the 2015 Industrial and Systems Engineering Research Conference (2015)
Siemens: Cybersecurity in the Modern Industrial World. Harvard Business School Publishing, Harvard Business Review (2018)
Tonge, A.M., Kasture, S.S., Chaudhari, S.R.: Cyber security: challenges for society-literature review. IOSR J. Comp. Eng. 2(12), 67–75 (2013)
Gelles, M.G.: Insider threat: Prevention, detection, mitigation, and deterrence. Butterworth-Heinemann (2016)
Sadeghi, A.R.: Trusted computing—special aspects and challenges. In: International Conference on Current Trends in Theory and Practice of Computer Science, pp. 98–117. Springer, Berlin, Heidelberg (2008)
Ahrendt, W., Beckert, B., Hähnle, R., Rümmer, P., Schmitt, P.H.: Verifying object-oriented programs with Key: A tutorial. In: International Symposium on Formal Methods for Components and Objects, pp. 70–101. Springer, Berlin, Heidelberg (2006)
Chaithanya, B.N., Veena, R.: Emerging trends and challenges in advanced technologies on cyber security. IJO-International J. Comp. Sci. Eng. 2(1), 01–16 (2019)
Chitneni, A.: Study of emerging trends on latest technologies and its cybersecurity challenges. J. Innov. Develop. Pharmaceut. Techn. Sci. (JIDPTS) 3(11) (2020)
Corrons, L.: A look back at cyber-security in 2012. Panda Labs (2013)
Potlapally, N.: Hardware security in practice: challenges and opportunities. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 93–98. IEEE (2011)
Li, Q., Gao, H., Xu, B., Jiao, Z.: Hardware threat: the challenge of information security. In: 2008 International Symposium on Computer Science and Computational Technology, Vol. 1, pp. 517–520. IEEE (2008)
Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: Identifying and classifying hardware trojans. Computer 43(10), 39–46 (2010)
Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: Threats and emerging solutions. In: 2009 IEEE International high level design validation and test workshop, pp. 166–171. IEEE (2009)
Reddy, G.N., Reddy, G.J.: A study of cyber security challenges and emerging trends on latest technologies. arXiv preprint arXiv:1402.1842 (2014)
Singh, N.: A Study of Cyber Security Trends and Its Challenges: A Conceptual Framework. Trusted Computing Group TPM Main, Part 1 (2006), Design Principles Specification version 1.2. Revision 94
Trusted Computing Group TPM Main, Part 2 (2006), TPM Structures Specification version 1.2. Revision 94
Trusted Computing Group TPM Main, Part 3 (2006), Design Principles Specification version 1.2. Revision 94
Vidhya, P.M.: Cyber security-trends and challenges. Int. J. Comput. Sci. Mob. Comput. 3(2), 586–590 (2014)
Qamar, S., Anwar, Z., Rahman, M.A., Al-Shaer, E., Chu, B.T.: Data-driven analytics for cyber-threat intelligence and information sharing. Comput. Secur. 67, 35–58 (2017)
Meier, R., Scherrer, C., Gugelmann, D., Lenders, V., Vanbever, L.: FeedRank: a tamper-resistant method for the ranking of cyber threat intelligence feeds. In: 2018 10th International Conference on Cyber Conflict (CyCon), pp. 321–344. IEEE (2018)
Sauerwein, C., Pekaric, I., Felderer, M., Breu, R.: An analysis and classification of public information security data sources used in research and practice. Comput. Secur. 82, 140–155 (2019)
Pitropakis, N., et al.: An enhanced cyber-attack attribution framework. In: International Conference on Trust and Privacy in Digital Business, pp. 213–228. Springer, Cham (2018)
Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. In: Network Security Metrics, pp. 53–73. Springer, Cham (2017)
Kaloudi, N., Li, J.: The ai-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR) 53(1), 1–34 (2020)
Razzaq, A., Latif, K., Ahmad, H.F., Hur, A., Anwar, Z., Bloodsworth, P.C.: Semantic security against web application attacks. Inf. Sci. 254, 19–38 (2014)
Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.D.: Building an Ontology of Cyber Security. In: STIDS, pp. 54–61 (2014)
Geramiparvar, M.S., Modiri, N.: An approach to counteracting common cyber-attacks according to the metric-based model. Int. J. Comp. Sci. Netw. Sec. (IJCSNS) 16(1), 81 (2016)
Yeboah-Ofori, A., Brimicombe, A.: Cyber intelligence and OSINT: developing mitigation techniques against cybercrime threats on social media. Int. J. Cyber-Sec. Digi. Forensics (IJCSDF) 7(1), 87–98 (2018)
Anwar, Z., Montanari, M., Gutierrez, A., Campbell, R.H.: Budget constrained optimal security hardening of control networks for critical cyber-infrastructures. Int. J. Crit. Infrastruct. Prot. 2(1–2), 13–25 (2009)
Dehue, F., Bolman, C., Vollink, T., Pouwelse, M.: Cyberbullying and traditional bullying in relation to adolescents’ perception of parenting. J. Cyber Therapy and Rehabilit. 5(1), 25–34 (2012)
Stancu, A.I.: Evolution of the international regulations regarding cybercrime. Public Administ. Region. Stud. 18(2), 72–79 (2016)
Rege-Patwardhan, A.: Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Crim. Justice Stud. 22(3), 261–271 (2009)
Alkaabi, A., Mohay, G., McCullagh, A., Chantler, N.: Dealing with the problem of cybercrime. In: International Conference on Digital Forensics and Cyber Crime, pp. 1–18. Springer, Berlin, Heidelberg (2010)
Banday, M.T.: Emerging Challenges of Cyber Crimes to Cyber Security (2011)
Nurse, J.: Cyber Security Awareness Campaigns: Why do they fail to change behavior? (2015)
Ahamad, M., et al.: Emerging cyber threats report for 2009 (2008)
Van Eeten, M., Bauer, J.M.: Emerging threats to internet security: incentives, externalities, and policy implications. J. Conting. Crisis Manage. 17(4), 221–232 (2009)
Raban, Y., Hauptman, A.: Foresight of cyber security threat drivers and affecting technologies. foresight (2018)
Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Sec. Mobi. 65–88 (2015)
AlDairi, A.: Cyber security attacks on smart cities and associated mobile technologies. Procedia Comp. Sci. 109, 1086–1091 (2017)
Pan, L., Zheng, X., Chen, H.X., Luan, T., Bootwala, H., Batten, L.: Cyber security attacks to modern vehicular systems. J. Info. Sec. Appl. 36, 90–100 (2017)
Middleton, B.: A history of cyber security attacks: 1980 to present. Auerbach Publications (2017)
Chowdhury, A.: Recent cyber security attacks and their mitigation approaches–an overview. In: International conference on applications and techniques in information security, pp. 54–65. Springer, Singapore (2016)
Conteh, N.Y., Schmick, P.J.: Cybersecurity: risks, vulnerabilities, and countermeasures to prevent social engineering attacks. Int. J. Adv. Comp. Res. 6(23), 31 (2016)
Lallie, H.S., et al.: Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)
Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30(8), 719–731 (2011)
Farahmand, F., Navathe, S.B., Sharp, G.P., Enslow, P.H.: A management perspective on risk of security threats to information systems. Inf. Technol. Manage. 6(2), 203–225 (2005)
Baldwin, A., Gheyas, I., Ioannidis, C., Pym, D., Williams, J.: Contagion in cyber security attacks. J. Operat. Res. Soc. 68(7), 780–791 (2017)
Abu, M.S., Selamat, S.R., Ariffin, A., Yusof, R.: Cyber threat intelligence–issue and challenges. Indonesian J. Electr. Eng. Comp. Sci. 10(1), 371–379 (2018)
Carlton, M., Levy, Y., Ramim, M.: Mitigating cyber-attacks through the measurement of non-IT professionals’ cybersecurity skills. Info. Comp. Sec. (2019)
Semerci, M., Cemgil, A.T., Sankur, B.: An intelligent cyber security system against DDoS attacks in SIP networks. Comput. Netw. 136, 137–154 (2018)
Teixeira, A., Dán, G., Sandberg, H., Johansson, K.H.: A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator. IFAC Proceedings Volumes 44(1), 11271–11277 (2011)
Dagoumas, A.: Assessing the impact of cybersecurity attacks on power systems. Energies 12(4), 725 (2019)
He, Q., Meng, X., Qu, R., Xi, R.: Machine learning-based detection for cyber security attacks on connected and autonomous vehicles. Mathematics 8(8), 1311 (2020)
Keller, S., Powell, A., Horstmann, B., Predmore, C., Crawford, M.: Information security threats and practices in small businesses. Inf. Syst. Manag. 22(2), 7 (2005)
Loch, K.D., Carr, H.H., Warkentin, M.E.: Threats to information systems: today's reality, yesterday's understanding. Mis Quarterly, 173–186 (1992)
Dokuchaev, V.A., Maklachkova, V.V., Statev, V.Y.: Classification of personal data security threats in information systems. T-Comm-Телекоммуникации и Транспорт 14(1), 56–60 (2020)
Wall, D.S.: Crime, security and information communication technologies: the changing cybersecurity threat landscape and its implications for regulation and policing. Security and Information Communication Technologies: The Changing Cybersecurity Threat Landscape and Its Implications for Regulation and Policing (July 20, 2017) (2017)
Wang, L., Jones, R.: Big data analytics in cyber security: network traffic and attacks. J. Comp. Info. Sys. 61(5), 410–417 (2021)
Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Xu, M.: A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8, 222310–222354 (2020)
Seth, S.M., Mishra, R.: Comparative analysis of encryption algorithms for data communication. IJCST 2(2) (2011)
Amini, A.: Secure Storage in Cloud Computing (2012)
Forouzan, B.A.: Cryptography and Network Security, special Indian edition. The McGraw-Hill Companies
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tulay, M.A., Olatunbosun, S. (2025). Cybersecurity Techniques, Emerging Threats, and Industry Responses. In: Deligiannidis, L., Ghareh Mohammadi, F., Shenavarmasouleh, F., Amirian, S., Arabnia, H.R. (eds) Image Processing, Computer Vision, and Pattern Recognition and Information and Knowledge Engineering. CSCE 2024. Communications in Computer and Information Science, vol 2262. Springer, Cham. https://doi.org/10.1007/978-3-031-85933-5_25
Download citation
DOI: https://doi.org/10.1007/978-3-031-85933-5_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-85932-8
Online ISBN: 978-3-031-85933-5
eBook Packages: Computer ScienceComputer Science (R0)