A survey of emerging threats in cybersecurity

被引:367
|
作者
Jang-Jaccard, Julian [1 ]
Nepal, Surya [1 ]
机构
[1] CSIRO ICT Ctr, Marsfield, NSW, Australia
关键词
Cybersecurity; Malware; Emerging technology trends; Emerging cyber threats; Cyber attacks and countermeasures; SECURITY; INTERNET; SYSTEMS; CHALLENGES; MANAGEMENT; NETWORKS; PRIVACY;
D O I
10.1016/j.jcss.2014.02.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cybersecurity community. To assist in achieving this goal, we first present an overview of the most exploited vulnerabilities in existing hardware, software, and network layers. This is followed by critiques of existing state-of-the-art mitigation techniques as why they do or don't work. We then discuss new attack patterns in emerging technologies such as social media, cloud computing, smartphone technology, and critical infrastructure. Finally, we describe our speculative observations on future research directions. Crown Copyright (c) 2014 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:973 / 993
页数:21
相关论文
共 50 条
  • [31] Managing Cybersecurity Threats and Increasing Organizational Resilience
    Trim, Peter R. J.
    Lee, Yang-Im
    BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (04)
  • [32] Introduction to the special issue on insider threats in cybersecurity
    Da Veiga, Adele
    Furnell, Steven
    Hong, Yuxiang
    Warkentin, Merrill
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [33] Cybersecurity threats and preparedness: Implications for dental schools
    Nalliah, Romesh P.
    Praveen, Suvesha
    Allareddy, Trishul V.
    Gajendrareddy, Praveenkumar
    Lee, Min Kyeong
    Oubaidin, Maysaa
    Allareddy, Veerasathpurush
    JOURNAL OF DENTAL EDUCATION, 2024,
  • [34] Text Mining in Cybersecurity: Exploring Threats and Opportunities
    de Boer, Maaike H. T.
    Bakker, Babette J.
    Boertjes, Erik
    Wilmer, Mike
    Raaijmakers, Stephan
    van der Kleij, Rick
    MULTIMODAL TECHNOLOGIES AND INTERACTION, 2019, 3 (03)
  • [35] Cybersecurity threats and experimental testbed for a generator system
    Werth, Aaron W.
    Griffith, SueAnne N.
    Hairston, Jesse R.
    Morris, Thomas H.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2022, 19 (01): : 23 - 35
  • [36] Cybersecurity Threats and the WTO National Security Exceptions
    Peng, Shin-yi
    JOURNAL OF INTERNATIONAL ECONOMIC LAW, 2015, 18 (02) : 449 - 478
  • [37] Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem
    Darem, Abdulbasit
    Alhashmi, Asma A.
    Jemal, H. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (03): : 303 - 311
  • [38] Explainability of Cybersecurity Threats Data Using SHAP
    Alenezi, Rafa
    Ludwig, Simone A.
    2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [39] Cybersecurity: Public Health Increasingly Facing Threats
    Krisberg, Kim
    AMERICAN JOURNAL OF PUBLIC HEALTH, 2017, 107 (08) : 1195 - 1195
  • [40] Cybersecurity Threats in Military Robotic and Autonomous Systems
    Borges, Jose
    Rosado, David Pascoal
    ROBOT 2023: SIXTH IBERIAN ROBOTICS CONFERENCE, VOL 2, 2024, 978 : 237 - 243