Comprehensive Analysis on Cyber Security Awareness and Measures for Cyber Espionage
Keywords:
Cyber Attacks, Cyber Espionage, Cyber Security, Cyber Terrorism, Cyber Threats, Cyber War.Abstract
In today’s Modern era, we cannot visualize the world without gadgets. Every sector has moved to digitization and almost everything gets executed through online medium and platforms. As a result, network security becomes vital globally. Routine tasks are executed via network or through online mediums so one cannot ignore cybersecurity. One single security breach can lead to exposing vital information. These breaches leave strong impact and extensive loss occurs in terms of personal, societal, national etc evidence seepage. Hence, cyber security is very essential to protect one’s cyber space. This paper will define the need of cyber space protection. It will also focus on the difference between cyber-attacks and cyber threats. Additionally, paper will enlighten on various cyber-attacks with examples that should be known to individuals to understand that such attacks hamper their cyber space. Lastly, paper will broadly discuss the impacts of cyber-attacks in various domains and numerous measures to control them.
Downloads
References
THEILER, O.New threats: the cyber-dimension. NATO Review Magazine. 2011. On-line. [accesat: 22.08.2021]. Disponibil: https://www.nato.int/docu/review/2011/11-september/cyber-threads/en/index.htm.
UNDP National Human Development Report Republic of Moldova. 1998. On-line. [accesat: 22.08.2021]Disponibil:www.md.undp.org/content/dam/moldova/docs/Publications/NHDR/NHDR_1998_english_all.pdf.
YAR, M. Cybercrime and Society. Sage Publications. London. United Kingdom. 2006. 558 p.â Eurojust (2011) Eurojust Annual Report 2011. On-line. [accesat: 22.08.2021]. Disponibil:http://eurojust.europa.eu/doclibrary/corporate/eurojust%20Annual%20Reports/Annual%20Report%202011/Annual-Report-2011-EN.pdf.
WALL, D.Policing Cybercrimes: Situating the Public Police in Networks of Security within the
Cyberspace’ Police Practice and Research. An International Journal 2007 On-line. [accesat: 22.08.2021].Disponibil:http://papers.ssrn.com/sol3/papers.cfm?abstract_id=853225.
ALFAWAZ, S. E-government security in developing countries: a managerial conceptual framework', paper presented to International Research Society for Public Management Conference, Queensland University of Technology, Brisbane: 26-28 March 2018.
MOON, M. J. (2000). Organizational Commitment Revisited in New Public Management: Motivation, Organizational Culture, Sector, and Managerial Level. Public Performance & Management Review, 24 (2).
NORRIS, D. F. and Moon, M. J. (2005). Advancing E-Government at the Grassroots: Tortoise or Hare? Public Administration Review, 65-75 (1).
PANKE, D. Small states in the European Union: Structural disadvantages in EU policy-making and counter-strategies. Journal of European Public Policy, 17(6), 2020. 817.
International Journal of Network Security, Vol.15, No.5, PP.390-396, Sept. 2013 390 A Survey on Various Cyber Attacks and Their Classification M. Uma and G. Padmavathi.
Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press The Social and Psychological Impact of Cyber-Attacks Maria Bada etl, Benson & McAlaney (2019/20) Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press.
BBC. (2017a). NHS ‘robust’ after cyber-attack Retrieved July 14 2018, from https://www.bbc.co.uk/news/uk-39909441
Nurse, J. R. C. (2018). Cybercrime and You: How Criminals Attack and the Human Factors that They Seek to Exploit. In Attrill-Smith, A., Fullwood, C. Keep, M. & Kuss, D.J. (Eds.), Oxford Handbook of Cyberpsychology 2nd Edition. Oxford: OUP. https://doi.org/10.1093/oxfordhb/9780198812746.013.35
Introduction to information security and cyber laws-Surya Prakash Tripathi, Ritendra Goel, Praveen Kumar Shukla. ISBN 10: 9351194736
15.Fundamentals of Cyber Security(Principles, Theory and Practices) ISBN-10. 9789386551559 ,ISBN-13.
Shirurkar, M. P., & Barve, A. A. (2015). CYBER SECURITY: A STUDY BASED ON STANDARDS, AREAS AND STRATEGIES IN INDIA WITH RECOMMENDATIONS FOR MAKING IT MORE OPERATIVE. Advances in Computational Research, 7(1), 209.
13 March 2020 World Health Organisation (WHO) Creation of a malicious site mimicking the WHO internal email system which aimed to steal employee passwords (https://tech.newstatesman.com/security/who-cyberattack-covid19).
Reardon, R., & Choucri, N. (2012). The role of cyberspace in international relations: A view of the literature. Proceedings of the 2012 ISA Annual Convention, San Diego, CA
CYBER ATTACKS AND ITS DIFFERENT TYPES Jibi Mariam Biju1, Neethu Gopal2, Anju J Prakash3International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019.
A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks Atul S Choudhary [1], Pankaj P Choudhary [2] etl. in Proceedings of the International Conference on Inventive Computation Technologies (ICICT-2018) DVD Part Number: CFP18F70-DVD; ISBN:978-1-5386-4984.
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate Ioannis Agrafiotis etl, Journal of Cybersecurity, 2018, 1–15 doi: 10.1093/cybsec/tyy006 Review article.
A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks Atul S Choudhary [1] etl Proceedings of the International Conference on Inventive Computation Technologies (ICICT-2018) DVD Part Number:CFP18F70-DVD; ISBN:978-1-5386-4984-8
Study of Cyber Attacks on Cyber-Physical System Ajeet Singha etl, 3rd International Conference on Advances in Internet of Things and Connected Technologies (ICIoTCT) 2018 ELSEVIER-SSRN INFORMATION SYSTEMS & EBUSINESS NETWORK ISSN: 1556-5068
Decision framework for evaluating the macroeconomic risks and policy impacts of cyber-attacks Andjelka Kelic etl, Springer Science+Business Media New York (2013) DOI 10.1007/s10669-013-9479-9
CRS Report for Congress Received through the CRS Web, Brian Cashell, William D. Jackson, Mark Jickling, and Baird Webel Government and Finance Division.
The Impact of Cyber Attacks on E-Businesses 1 Odero Eunice; 2 Bundi Dorothy; 3 Omari Omosa IJCSN - International Journal of Computer Science and Network, Volume 8, Issue 4, August 2019 ISSN (Online) : 2277-5420 www.IJCSN.org Impact Factor: 1.5 354.
PayPal’s anti-fraud team, Gengler, B. 2017, ScienceDirect, vol.2002, issue3, (Gengler, 2017).
Saleem, J, Adebisi, B, Ande, R and Hammoudeh, M (2017) A state of the art survey - Impact of cyber attacks on SME’s. In: International Conference on Future Networks and Distributed Systems (ICFNDS 2017), 19 July 2017 - 20 July 2017, Cambridge, United Kingdom.
Cyberattacks, cyber threats, and attitudes toward cybersecurity policies Keren L.G. Snider etl, Journal of Cybersecurity, 2021, 1–11 https://doi.org/10.1093/cybsec/tyab019.
KRAUS, J. - NEMEC, V., FAJČIK, P.: The Use of Wireless Sensor Network for Increasing Airport Safety; In: MAD – magazine of Aviation Development, Volume: 1, Issue: 5, September 2013, s.: 16-19; ISSN 1805-7578
Financial consequences of cyber attacks leading to data breaches in healthcare sector Marta Meisner* Copernican Journal of Finance & Accounting e-ISSN 2300-3065 2017, volume 6, issue 3 p-ISSN 2300-1240.
Cybercrime and Other Threats Faced by the Healthcare Industry, http://documents.trendmicro.com/assets/wp/wp-cybercrime-and-other-threatsfaced-by-the-healthcare-industry.pdf (accessed: 06.11.2017).
Nifakos, S.; Chandramouli, K.; Nikolaou, C.K.; Papachristou, P.; Koch, S.; Panaousis, E.; Bonacina, S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021, 21, 5119. https:// doi.org/10.3390/s21155119
Healthcare Cyber-Attacks and the COVID-19 Pandemic: An Urgent Threat to Global Health Authors Ms Menaka Muthuppalaniappan, LLB1 ; Oxford University Press on behalf of International Society for Quality in Health Care 2021
Othman, Z. (2023). Sustainability of higher education institutions: Case study on cyber attacks. Global Business Management Review, 15(1), 24-38. https://doi.org/10.32890/gbmr2023.15.1.2
Cyber-attacks are a permanent and substantial threat to health systems: Education must reflect that O’Brien Niki etl, Digital Health Volume 8: 1–3 © The Author(s) 2022 Article reuse guidelines: sagepub.com/journals-permissions DOI: 10.1177/20552076221104665
Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance Learning Alexei Arina, Alexei Anatolie, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VO`LUME 10, ISSUE 03, MARCH 2021 ISSN 2277-8616 128 IJSTR©2021 www.ijstr.org.
38. Azian Ibrahim, Noorfadhleen Mahmud, Nadrawina Isnin, Dina Hazelbella Dillah, and Dayang Nurfauziah Fauz Dillah, (2019), “Cyber Warfare Impact to National Security - Malaysia Experiences” in FGIC 2nd Conference on Governance and Integrity 2019, KnE Social Sciences, pages 206–224. DOI 10.18502/kss.v3i22.5052
Darko Galinec, Darko Možnik & Boris Guberina (2017) Cybersecurity and cyber defence: national level strategic approach, Automatika, 58:3, 273-286, DOI: 10.1080/00051144.2017.1407022
Diptiben Ghelani. Cyber Security, Cyber Threats, Implications and Future Perspectives: A Review. American Journal of Science, Engineering and Technology. Vol. 3, No. 6, 2022, pp. 12-19
K. M Rajasekharaiah et al 2020 IOP Conf. Ser.: Mater. Sci. Eng. 981 022062, DOI:10.1088/1757-899X/981/2/022062
Security strategies to overcome cyber measures, factors and barriers, L Jawad Hussain Awan etl, ENGINEERING SCIENCE AND TECHNOLOGY INTERNATIONAL RESEARCH JOURNAL, VOL.1, NO.1, APR, 2017.
Moti Zwilling, Galit Klien, Dušan Lesjak, Łukasz Wiechetek, Fatih Cetin & Hamdullah Nejat Basim (2020): Cyber Security Awareness, Knowledge and Behavior: A Comparative Study, Journal of Computer Information Systems, DOI: 10.1080/08874417.2020.1712269.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.