Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers
DOI:
https://doi.org/10.30953/bhty.v7.302Keywords:
comparative analysis, cyber defense, cybersecurity, digital threat landscape, innovative framework, safeguard informationAbstract
In an era dominated by digital advancements, cybersecurity plays a pivotal role in safeguarding information and systems from evolving threats. The escalating sophistication of cyber threats necessitates a critical examination of the efficacy of contemporary defenses. Recognizing the limitations and gaps in current solutions, this research introduces a pioneering framework aimed at fortifying cyber defenses. Motivated by a comprehensive exploration of research articles, surveys, online media, and practical studies, this study scrutinizes the intricacies of cyber threats and assesses the strengths and weaknesses of existing solutions. The proposed frameworks emerge from a meticulous feasibility and practicality study, leveraging insights garnered from diverse online sources. The 'how' encompasses a comparative analysis, evaluating the novel framework against established solutions to delineate their respective merits and shortcomings. The impetus behind this research lies in offering valuable insights to researchers, practitioners, and policymakers grappling with the multifaceted challenges of cybersecurity. By navigating through the complexities of existing solutions and introducing innovative frameworks, this paper aims to guide efforts in bolstering cyber defenses. Ultimately, this research envisions a continuous cycle of improvement and evolution in the realm of cybersecurity, as stakeholders collectively strive to adapt to the ever-changing digital threat landscape.
Downloads
References
“Enigma,” Bletchley Park. Accessed: Jan. 13, 2024. [Online]. Available: https://bletchleypark.org.uk/our-story/enigma/
“Timeline of computer viruses and worms,” Wikipedia. Jan. 10, 2024. Accessed: Jan. 13, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Timeline_of_computer_viruses_and_worms&oldid=1194773804
cybercrimemag, “Global Cybersecurity Spending Predicted To Exceed $1 Trillion From 2017-2021,” Cybercrime Magazine. Accessed: Jan. 13, 2024. [Online]. Available: https://cybersecurityventures.com/cybersecurity-market-report/
“Top Cybersecurity Threats in 2023,” Cisco. Accessed: Jan. 13, 2024. [Online]. Available: https://www.cisco.com/c/en/us/products/security/top-cybersecurity-threats-2023.html
M. C. D. O. C. (CDOC) Intelligence Microsoft Threat, “Deep dive into the Solorigate second-stage activation: From SUNBURST to TEARDROP and Raindrop,” Microsoft Security Blog. Accessed: Jan. 15, 2024. [Online]. Available: https://www.microsoft.com/en-us/security/blog/2021/01/20/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop/
“What is the Mirai Botnet?,” Cloudflare. Accessed: Jan. 12, 2024. [Online]. Available: https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/
“The OPM hack explained: Bad security practices meet China’s Captain America,” CSO Online. Accessed: Jan. 12, 2024. [Online]. Available: https://www.csoonline.com/article/566509/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html
“What is the WannaCry Ransomware Attack? | UpGuard.” Accessed: Jan. 12, 2024. [Online]. Available: https://www.upguard.com/blog/wannacry
“Colonial Pipeline ransomware attack,” Wikipedia. Dec. 14, 2023. Accessed: Jan. 12, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Colonial_Pipeline_ransomware_attack&oldid=1189897140
F. Times, “A phone call to helpdesk was likely all it took to hack MGM,” Ars Technica. Accessed: Jan. 12, 2024. [Online]. Available: https://arstechnica.com/security/2023/09/a-phone-call-to-helpdesk-was-likely-all-it-took-to-hack-mgm/
T. C. Helmus, “Artificial Intelligence, Deepfakes, and Disinformation: A Primer,” RAND Corporation, Jul. 2022. Accessed: Jan. 12, 2024. [Online]. Available: https://www.rand.org/pubs/perspectives/PEA1043-1.html
“Rashmika Mandanna deepfake case: Delhi Police track down 4 suspects, hunt for key conspirator on,” Hindustan Times. Accessed: Jan. 12, 2024. [Online]. Available: https://www.hindustantimes.com/india-news/rashmika-mandanna-deepfake-case-delhi-police-track-down-4-suspects-hunt-for-key-conspirator-on-101703043714888.html
“2019 Capital One Cyber Incident | What Happened,” Capital One. Accessed: Jan. 12, 2024. [Online]. Available: https://www.capitalone.com/digital/facts2019/
“Marriott Data Breach FAQ: What Really Happened?,” Hotel Tech Report. Accessed: Jan. 12, 2024. [Online]. Available: https://hoteltechreport.com/news/marriott-data-breach
C. Page, “Tesla says data breach impacting 75,000 employees was an insider job,” TechCrunch. Accessed: Jan. 12, 2024. [Online]. Available: https://techcrunch.com/2023/08/21/tesla-breach-employee-insider/
A. Hern and A. H. U. technology editor, “Pentagon leak traced to video game chat group users arguing over war in Ukraine,” The Guardian, Apr. 11, 2023. Accessed: Jan. 12, 2024. [Online]. Available: https://www.theguardian.com/world/2023/apr/11/pentagon-leak-traced-to-video-game-chat-group-users-arguing-over-war-in-ukraine
“Stuxnet,” Wikipedia. Jan. 10, 2024. Accessed: Jan. 12, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Stuxnet&oldid=1194687512
“AI in Cybersecurity: Defend Your Digital Realm.” Accessed: Jan. 13, 2024. [Online]. Available: https://www.veritis.com/blog/ai-in-cybersecurity-defending-against-evolving-threats/
“Machine Learning (ML) in Cybersecurity: Use Cases - CrowdStrike,” crowdstrike.com. Accessed: Jan. 15, 2024. [Online]. Available: https://www.crowdstrike.com/cybersecurity-101/machine-learning-cybersecurity/
R. Chandramouli and Z. Butcher, “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments,” National Institute of Standards and Technology, NIST Special Publication (SP) 800-207A, Sep. 2023. doi: 10.6028/NIST.SP.800-207A.
L. Zhou, “What is Zero Trust Architecture (ZTA)? | NextLabs Data-Centric Security,” NextLabs. Accessed: Jan. 13, 2024. [Online]. Available: https://www.nextlabs.com/what-is-zero-trust-architecture-zta/
“NIST: Blockchain Provides Security, Traceability for Smart Manufacturing,” NIST, Feb. 2019, Accessed: Jan. 13, 2024. [Online]. Available: https://www.nist.gov/news-events/news/2019/02/nist-blockchain-provides-security-traceability-smart-manufacturing
“Innovation Insight for Decentralized Identity and Verifiable Claims,” Gartner. Accessed: Jan. 13, 2024. [Online]. Available: https://www.gartner.com/en/documents/4004851
“What is Deception Technology? Importance & Benefits| Zscaler.” Accessed: Jan. 13, 2024. [Online]. Available: https://www.zscaler.com/resources/security-terms-glossary/what-is-deception-technology
X. Han, N. Kheir, and D. Balzarotti, “Deception Techniques in Computer Security: A Research Perspective,” ACM Comput. Surv., vol. 51, no. 4, p. 80:1-80:36, Jul. 2018, doi: 10.1145/3214305.
“Home Page | CISA.” Accessed: Jan. 13, 2024. [Online]. Available: https://www.cisa.gov/
“The Council of Europe: guardian of Human Rights, Democracy and the Rule of Law for 700 million citizens - Portal - www.coe.int,” Portal. Accessed: Jan. 13, 2024. [Online]. Available: https://www.coe.int/en/web/portal
“What Is Behavioral Biometrics?” Accessed: Jan. 13, 2024. [Online]. Available: https://www.biocatch.com/blog/what-is-behavioral-biometrics
Y. Liang, S. Samtani, B. Guo, and Z. Yu, “Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective,” IEEE Internet Things J., vol. 7, no. 9, pp. 9128–9143, Sep. 2020, doi: 10.1109/JIOT.2020.3004077.
L. Du, Q. Shang, Z. Wang, and X. Wang, “Robust image hashing based on multi-view dimension reduction,” J. Inf. Secur. Appl., vol. 77, p. 103578, Sep. 2023, doi: 10.1016/j.jisa.2023.103578.
C. Qin, E. Liu, G. Feng, and X. Zhang, “Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints,” IEEE Trans. Circuits Syst. Video Technol., vol. 31, no. 11, pp. 4523–4537, Nov. 2021, doi: 10.1109/TCSVT.2020.3047142.
“Uncovering the Hidden WebP vulnerability: a tale of a CVE with much bigger implications than it originally seemed,” The Cloudflare Blog. Accessed: Jan. 14, 2024. [Online]. Available: https://blog.cloudflare.com/uncovering-the-hidden-webp-vulnerability-cve-2023-4863
“Decentralized Identifiers (DIDs) v1.0.” Accessed: Jan. 14, 2024. [Online]. Available: https://www.w3.org/TR/did-core/
E. Barker, “Recommendation for key management:: part 1 - general,” National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800-57pt1r5, May 2020. doi: 10.6028/NIST.SP.800-57pt1r5.
G. Fenzi, “Zero Knowledge Proofs Theory and Applications”.
D. H. Mahlool and M. H. Abed, “A Comprehensive Survey on Federated Learning: Concept and Applications.” arXiv, Jan. 23, 2022. doi: 10.48550/arXiv.2201.09384.
L.-H. Merino and J. Cabrero-Holgueras, “Secure Multi-Party Computation,” in Trends in Data Protection and Encryption Technologies, V. Mulder, A. Mermoud, V. Lenders, and B. Tellenbach, Eds., Cham: Springer Nature Switzerland, 2023, pp. 89–92. doi: 10.1007/978-3-031-33386-6_17.
O. Arewa, “Data Collection, Privacy, and Children in the Digital Economy.” Rochester, NY, Oct. 30, 2023. doi: 10.2139/ssrn.4617953.
“World Economic Forum,” World Economic Forum. Accessed: Jan. 14, 2024. [Online]. Available: https://www.weforum.org/publications/realizing-the-potential-of-blockchain/
D. Lee, D. Kohlbrenner, S. Shinde, K. Asanović, and D. Song, “Keystone: an open framework for architecting trusted execution environments,” in Proceedings of the Fifteenth European Conference on Computer Systems, in EuroSys ’20. New York, NY, USA: Association for Computing Machinery, Apr. 2020, pp. 1–16. doi: 10.1145/3342195.3387532.
R. Kaur, D. Gabrijelčič, and T. Klobučar, “Artificial intelligence for cybersecurity: Literature review and future research directions,” Inf. Fusion, vol. 97, p. 101804, Sep. 2023, doi: 10.1016/j.inffus.2023.101804.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Taskeen Zaid, PhD, Suman Garai, MBA
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors retain copyright of their work, with first publication rights granted to Blockchain in Healthcare Today (BHTY). Read the full Copyright Statement.