2020
DOI: 10.1088/1757-899x/981/2/022062
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Challenges and its Emerging Trends on Latest Technologies

Abstract: Today, due to the modern life style people have joined technology life and using more technology for shopping as well as financial transactions in their cyber space. At the same time, safeguarding of knowledge has become increasingly difficult. In addition, the heavy use and growth of social media, online crime or cybercrime has increased. In the world of information technology, data security plays a significant role. The information security has become one of today’s main challenges. Whenever we think of cybe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(9 citation statements)
references
References 4 publications
0
7
0
2
Order By: Relevance
“…The advancements in technology that we are seeing are blisteringly fast as compared to the past, which increases the number of cyberattacks with new challenging threats. With every passing year, thousands of new threats are created which are getting more and more dynamic which results in hazardous and challenging threats to the organizations (Rajasekharaiah, 2020). Knowledge management systems, like any other systems, are permanently under the pressure of knowledge risks and their possible consequences.…”
Section: Cybersecurity Challengesmentioning
confidence: 99%
“…The advancements in technology that we are seeing are blisteringly fast as compared to the past, which increases the number of cyberattacks with new challenging threats. With every passing year, thousands of new threats are created which are getting more and more dynamic which results in hazardous and challenging threats to the organizations (Rajasekharaiah, 2020). Knowledge management systems, like any other systems, are permanently under the pressure of knowledge risks and their possible consequences.…”
Section: Cybersecurity Challengesmentioning
confidence: 99%
“…The most applied techniques are Machine Learning which is found in 19 papers [6], [8], [12], [19], [26], [27], [32], [34], [46], [47], [48], [49], [50], [56], [59], [60], [63], [64] and [68] with 26. 4% of the total, likewise Data Mining is found in 12 papers [6], [23], [27], [34], [47], [48], [49], [50], [54], [55], [61] and [68] Guo, Cho, Chen, Sengupta, Hong & Mitra [79], considered as data-driven deception detection techniques: data driven, social honeypots, user profile, message content, network structure, early detection, information propagation mitigation and blockchain -based authenticity.…”
Section: B Answers To Research Questionsmentioning
confidence: 99%
“…More opportunities for work and business have emerged as a result of the development of the internet [1]. According to a survey, the internet accounts for more than 60% of total commercial transactions [2]. There is no doubt, the advent of internet has brought about immense social changes and improved the way we live and do things.…”
Section: Introductionmentioning
confidence: 99%