Enhancing Cybersecurity Against Emerging Threats in the Future of Cyber Warfare
Keywords:
Firewalls, cyberweapon, cyber-attack, malicious, automation, IDS, cyber warfareAbstract
In today's technological landscape, cyber warfare has emerged as the most critical global issue. Cybersecurity experts predict the onset of cyber warfare, surpassing conventional military operations and having the potential to disrupt essential industrial management programs. The cyber revolution predominantly targets smaller governments and groups resembling terrorist pirates, employing similar tactics. These entities exhibit malicious intent by attempting to breach passwords and compromise both factory automation systems and military infrastructure. This study investigates the potential of combining firewalls and Intrusion Detection Systems IDS as a comprehensive cybersecurity strategy for the future of cyber warfare. Firewalls, as a primary line of defense, operate as barriers between networks, monitoring and controlling incoming and outgoing traffic. On the other hand, IDS functions as vigilant detectors, identifying anomalous activities or unauthorized access within a network.
Downloads
References
Andress, Jason, and Steve Winterfeld. Cyber warfare: techniques, tactics, and tools for security practitioners. Elsevier, 2013.
Carr, Jeffrey. Inside cyber warfare: Mapping the cyber underworld. " O'Reilly Media, Inc.", 2011.
Christian Czosseck, and Kenneth Geers, eds. The virtual battlefield: perspectives on cyber warfare. Vol. 3. Ios Press, 2009.
Gazula, Mohan Buvana. Cyber warfare conflict analysis and case studies. Diss. Massachusetts Institute of Technology, 2017.
Poirier, William J., and James Lotspeich. Air Force cyber warfare: now and the future. AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST, 2013.
Shakarian, Paulo, Jana Shakarian, and Andrew Ruef. Introduction to cyber-warfare: A multidisciplinary approach. Newnes, 2013.
Hjortdal, Magnus. "China’s use of cyber warfare: Espionage meets strategic deterrence." Journal of Strategic Security 4.2 (2011): 1-24.
S. K. Sahu, A. Anand, A. Sharma, and N. Nautiyal, "A review: Outrageous cyber warfare," 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 2016, pp. 70-74.
Lindsay, Jon R. "Stuxnet and the limits of cyber warfare." Security Studies 22.3 (2013): 365-404.
H. Al-Mohannadi, Q. Mirza, A. Namanya, I. Awan, A. Cullen, and J. Disso, "Cyber-Attack Modeling Analysis Techniques: An Overview," 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, 2016, pp. 69-76.
Hjortdal, M., China’s use of cyber warfare: Espionage meets strategic deterrence. Journal of Strategic Security, 2011, pp.1-24.
Bryant, Adam, and Michael Grimaila. "Developing a Framework to Improve Information Assurance Battlespace Knowledge." ICIW2007-2nd International Conference on Information Warfare & Security: ICIW2007. Academic Conferences Limited, 2007.
McGraw, Gary. "Cyberwar is inevitable (unless we build security in)." Journal of Strategic Studies 36.1 (2013): 109-119.
Eidman, Christopher R., and Gregory S. Green. Unconventional cyber warfare: cyber opportunities in unconventional warfare. NAVAL POSTGRADUATE SCHOOL MONTEREY CA, 2014.
Rowe, Neil C. "Ethics of cyberwar attacks/Chapter in Cyber War and Cyber Terrorism." Monterey, California. Naval Postgraduate School, 2007.
Andress, Jason, and Steve Winterfeld. Cyber warfare: techniques, tactics, and tools for security practitioners. Elsevier, 2013.
Robinson, Michael, Kevin Jones, and Helge Janicke. "Cyber warfare: Issues and challenges." Computers & Security 49 (2015): 70-94.
Dasi , S. ., & Rao, G. M. . (2023). Design and Analysis of Metamaterial Absorber using Split Ring Resonator for Dual Band Terahertz Applications. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1), 128–132. https://doi.org/10.17762/ijritcc.v11i1.6059
Prof. Sharayu Waghmare. (2012). Vedic Multiplier Implementation for High Speed Factorial Computation. International Journal of New Practices in Management and Engineering, 1(04), 01 - 06. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/8
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.