A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently, many private companies...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Yuchong Li, Qinghui Liu
Formato: article
Lenguaje:EN
Publicado: Elsevier 2021
Materias:
Acceso en línea:https://doaj.org/article/5acade719e17481999590bcaf07824fe
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:5acade719e17481999590bcaf07824fe
record_format dspace
spelling oai:doaj.org-article:5acade719e17481999590bcaf07824fe2021-11-28T04:34:07ZA comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments2352-484710.1016/j.egyr.2021.08.126https://doaj.org/article/5acade719e17481999590bcaf07824fe2021-11-01T00:00:00Zhttp://www.sciencedirect.com/science/article/pii/S2352484721007289https://doaj.org/toc/2352-4847At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently, many private companies and government organizations around the world are facing the problem of cyber-attacks and the danger of wireless communication technologies. Today’s world is highly dependent on electronic technology, and protecting this data from cyber-attacks is a challenging issue. The purpose of cyber-attacks is to harm companies financially. In some other cases, cyber-attacks can have military or political purposes. Some of these damages are: PC viruses, knowledge breaks, data distribution service (DDS) and other assault vectors. To this end, various organizations use various solutions to prevent damage caused by cyber-attacks. Cyber security follows real-time information on the latest IT data. So far, various methods had been proposed by researchers around the world to prevent cyber-attacks or reduce the damage caused by them. Some of the methods are in the operational phase and others are in the study phase. The aim of this study is to survey and comprehensively review the standard advances presented in the field of cyber security and to investigate the challenges, weaknesses and strengths of the proposed methods. Different types of new descendant attacks are considered in details. Standard security frameworks are discussed with the history and early-generation cyber-security methods. In addition, emerging trends and recent developments of cyber security and security threats and challenges are presented. It is expected that the comprehensive review study presented for IT and cyber security researchers will be useful.Yuchong LiQinghui LiuElsevierarticleInformation technologyCyber-attacksCyber securityEmerging trendsKey managementElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENEnergy Reports, Vol 7, Iss , Pp 8176-8186 (2021)
institution DOAJ
collection DOAJ
language EN
topic Information technology
Cyber-attacks
Cyber security
Emerging trends
Key management
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Information technology
Cyber-attacks
Cyber security
Emerging trends
Key management
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Yuchong Li
Qinghui Liu
A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
description At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently, many private companies and government organizations around the world are facing the problem of cyber-attacks and the danger of wireless communication technologies. Today’s world is highly dependent on electronic technology, and protecting this data from cyber-attacks is a challenging issue. The purpose of cyber-attacks is to harm companies financially. In some other cases, cyber-attacks can have military or political purposes. Some of these damages are: PC viruses, knowledge breaks, data distribution service (DDS) and other assault vectors. To this end, various organizations use various solutions to prevent damage caused by cyber-attacks. Cyber security follows real-time information on the latest IT data. So far, various methods had been proposed by researchers around the world to prevent cyber-attacks or reduce the damage caused by them. Some of the methods are in the operational phase and others are in the study phase. The aim of this study is to survey and comprehensively review the standard advances presented in the field of cyber security and to investigate the challenges, weaknesses and strengths of the proposed methods. Different types of new descendant attacks are considered in details. Standard security frameworks are discussed with the history and early-generation cyber-security methods. In addition, emerging trends and recent developments of cyber security and security threats and challenges are presented. It is expected that the comprehensive review study presented for IT and cyber security researchers will be useful.
format article
author Yuchong Li
Qinghui Liu
author_facet Yuchong Li
Qinghui Liu
author_sort Yuchong Li
title A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
title_short A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
title_full A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
title_fullStr A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
title_full_unstemmed A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
title_sort comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments
publisher Elsevier
publishDate 2021
url https://doaj.org/article/5acade719e17481999590bcaf07824fe
work_keys_str_mv AT yuchongli acomprehensivereviewstudyofcyberattacksandcybersecurityemergingtrendsandrecentdevelopments
AT qinghuiliu acomprehensivereviewstudyofcyberattacksandcybersecurityemergingtrendsandrecentdevelopments
AT yuchongli comprehensivereviewstudyofcyberattacksandcybersecurityemergingtrendsandrecentdevelopments
AT qinghuiliu comprehensivereviewstudyofcyberattacksandcybersecurityemergingtrendsandrecentdevelopments
_version_ 1718408319400411136