2023
DOI: 10.14569/ijacsa.2023.0140292
|View full text |Cite
|
Sign up to set email alerts
|

Predictions of Cybersecurity Experts on Future Cyber-Attacks and Related Cybersecurity Measures

Abstract: The Internet interconnections' exponential growth has resulted in an increase in cyber-attack occurrences with mostly devastating consequences. Malware is a common tool for performing these attacks in cyberspace. The malefactors would either exploit the present weaknesses or employ the distinctive characteristics of the developing technologies. The cybersecurity community should increase their knowledge on the types and arsenals of cyber-attacks, and security measures against cyberattacks should be in place as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(20 citation statements)
references
References 56 publications
0
19
0
1
Order By: Relevance
“…A robust infrastructure, including redundancy and disaster recovery measures, maintains uninterrupted service delivery and facilitates rapid response to security incidents (Adeodato and Pournouri, 2020; Alhawamleh, 2023; Pan et al , 2021). It supports the implementation of cybersecurity tools and solutions, such as firewalls, intrusion detection systems and encryption protocols, which safeguard sensitive data and prevent unauthorized access (AL-Hawamleh, 2023; Aslan et al , 2023).…”
Section: Related Workmentioning
confidence: 99%
“…A robust infrastructure, including redundancy and disaster recovery measures, maintains uninterrupted service delivery and facilitates rapid response to security incidents (Adeodato and Pournouri, 2020; Alhawamleh, 2023; Pan et al , 2021). It supports the implementation of cybersecurity tools and solutions, such as firewalls, intrusion detection systems and encryption protocols, which safeguard sensitive data and prevent unauthorized access (AL-Hawamleh, 2023; Aslan et al , 2023).…”
Section: Related Workmentioning
confidence: 99%
“…For example, libraries may offer access to antivirus software, password managers and other security tools. Librarians can demonstrate good cyberethical practices by using secure passwords; encrypting sensitive data; and protecting their devices from malware and viruses (Al-Hawamleh 2023). They may also provide access to digital resources that promote cyberethics, such as e-books on online safety and privacy.…”
Section: Strategies For Promoting Cyberethical Practices In African U...mentioning
confidence: 99%
“…A cyber-attack is an intentional attempt by an individual or group to breach the system's information for economic purposes or steal data from the targeted systems [2]. Understanding these various attacks is crucial to developing an effective prediction strategy.…”
Section: Types Of Cyber-attacksmentioning
confidence: 99%
“…Malicious websites, hacked software, and infected email attachments can all spread malware. Malware can destroy files, steal confidential information, or take control of a system and use it for malicious ends once installed [2].…”
Section: Types Of Cyber-attacksmentioning
confidence: 99%