A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
Dr.yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar,
Anurag Kumar Jaiswal
Abstract
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the
world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber
security has advanced greatly in recent years in order to keep up with the rapid changes that occur in
cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its
products and information in cyberspace. Two decades ago, the term "cyber security" was barely
recognized by the general public. Cyber security isn't just a problem that affects individuals but it also
applies to an organization or a government. Everything has recently been digitized, with cybernetics
employing a variety of technologies such as cloud computing, smart phones, and Internet of Things
techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial
compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks,
damage, and illegal access to networks, computers, programmes, and data. The primary goal of this article
is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber
security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data
and integrity of computing assets that are part of or connected to an organization's network, with the goal of
defending such assets from all threat actors throughout the life cycle of a cyber-attack.
Keywords: Cyber Security, Cyber Attacks, Phishing, Cyber Crime, Network Security, Internet of Things
(IoT) Security, Cyber Security Frameworks, Malware.
I. Introduction
The Internet is one of the most important inventions of the twenty-first century that has had a significant
impact on our lives [1]. Today, the internet has broken down all barriers and transformed the way we
communicate, play games, work, shop, make friends, listen to music, watch movies, order meals, pay bills,
and greet pals on their birthdays and anniversaries. Our world is becoming increasingly networked, with
digitized information underpinning key services and infrastructures [2]. Nation states, organizations, and end
users are all concerned about threats to the confidentiality, integrity, and availability of digitized information
[3]. In a digital world that is progressively pervading every area of our everyday lives, both public and
private, security is a must. The world will fall apart if there is no security. Attacks like WannaCry have
wreaked havoc on unprepared citizens, businesses, and organizations, putting their operations in jeopardy
[4]. In the sphere of information technology, cyber security plays a critical role. Over the previous few
decades, cyber security has progressed [5]. When we come across a fraud, cyber security is the first thing
that comes to mind. Protecting our personal data on the internet has become a major concern. The number of
[6] connected device has expanded at a rapid rate in recent years, surpassing 50 billion by 2020. The
The world's businesses are being transformed by data science [8]. Because "security is all about data," it is
vital for the future of intelligent cyber security systems and services. We analyse security data in the form of
files, logs, network packets, and other relevant sources when trying to detect cyber threats [9]. Hackers
could possibly acquire easy unauthorised access to information processed using big data [10] technologies
unless an emphasis is focused on attaining effective cyber security in big data [11]. As a result, it's evident
that big data [12] has both benefits and drawbacks. As a result, cyber security is a concern that affects
everyone throughout the world. Hackers are getting smarter all the time, and they're coming up with new
ways to create harmful software to abuse the data of individuals, businesses, and governments. Despite
adequate security precautions, cyber-attacks [13] are on the rise.
Malicious software, phishing, password attacks, drive-by downloads via hyperlinks, virus attacks, and so on
are all examples. In public debates, cyber security [14] is frequently confounded with other ideas such as
privacy, information exchange, intelligence collecting, and surveillance. When we encounter cybercrime, we
must also consider cyber security. People from various professional backgrounds work in the field of cyber
security [15]. As a result, each profession collaborates with others to protect the confidentiality, integrity,
and availability of information or data, all of which are critical components of cyber security.
Cyber security will ensure that authorized users have unrestricted access to information and that
unauthorized access or hacking of any system is prevented [16]. The core components of confidentiality,
integrity, and availability, as outlined above, are frequently used to explain system access. It should be
recognized that no system or environment is completely secure, regardless of security procedures, standards,
or technology. Cyber security [17] is an ever-expanding field. Every day, new hazards can be found in your
company or organization. New technologies are constantly being created to combat hazards, for example.
Anyone who has been following the [18] news understands how businesses are dealing with cyber security
issues. Until ransom demands are satisfied, files in organizations and institutions all across the world have
been encrypted. Cyber security isn't just an issue in the IT world. In fact, it has a fairly broad scope.
Everyone nowadays is familiar with the internet. Smart phones are used by even illiterate individuals [19],
and they have become indispensable in their daily lives. When someone states that individuals today live on
the internet [20], they are not exaggerating. Over time, the internet has evolved into an integral aspect of
human life. Using artificial intelligence [21] as an alternative security solution has revealed that leveraging
the predictive and defensive capabilities of artificial intelligence and machine learning [22] minimizes the
number of additional security solutions needed [23]. This will surely improve system efficiency and raise the
pace at which assaults are detected and averted.
This paper offers a comprehensive overview of current research into cyber security. We commence, section
2 provides the cyber security related work, in section 3, by introducing about cyber security. Section 4
outlines the history of cyber security. Section 5 why cyber security is essential, and section 6 cyber security
types. In section 7 varieties of cyber threats, section 8 classification of cyber attackers, section 9 cyber
security framework, and section 10 cyber security tools. Finally, in section 11 cyber security challenges.
While today's attacks are more sophisticated and targeted to specific victims based on the attacker's goal,
such as financial gain, espionage, coercion, or retribution, opportunistic untargeted attacks are still common.
"Opportunistic attacks" are defined as attacks that target victims based on their vulnerability to attack [28].
Camellia is a 128-bit block cypher proposed in this publication. Camellia supports 128-bit block sizes and
128-, 192-, and 256-bit keys, i.e. the Advanced Encryption Standard's interface specifications (AES).
Camellia is notable for its efficiency on both software and hardware platforms, in addition to its high level
of security [29]. Camellia has been proven to give good security against both differential and linear
cryptanalysis. Camellia has at least comparable encryption speed in software and hardware to the AES
finalists, namely MARS, RC6, Rijndael, Serpent, and Twofish.
The author of this [30] utilized machine learning and sentiment analysis to cyber security in order to
establish a way for detecting cyber risks that were previously undetectable by traditional technologies.
Greenfield et al. [31] provide a methodology for experimentally assessing harm that includes a number of
processes. Functional integrity, material support and amenity, freedom from humiliation, privacy or
autonomy, and reputation are the five fundamental dimensions where injury might appear. They also
establish five levels of scale for various sorts of harm and investigate the cascading nature of harm by
looking at real-world crimes that have generated significant societal impact. Grant et al. coined the term
"cyberspace cartography" and applied the concept of "cyber-geography" to military operations. They also
suggest that their ontology might be used in research to help solve the attribution problem of being unable to
quickly identify hostile actors in cyberspace [32]. Chertoff et al. [33] describe the state of Internet
jurisdiction law and the problem of assigning legal authority to a particular forum when a suit traverses
multiple states. They present four possible formulations for defining the controlling jurisdiction in situations
in a clear and equitable manner. These regulations are based on either the citizenship of the offending
information, data, or system's subject, the location where the harm occurred, the citizenship of the data
creator, or the citizenship of the data holder or custodian. A high-quality standalone literature review,
according to Mathieu and Guy [34], provides reliable information and insights into previous research,
allowing other researchers to seek new directions on similar issues of interest. Furthermore, the findings of
this study can be utilized as references in related fields or as a basis for future research. Lin [35] compares
nuclear and cyber technology and regulation, outlining a slew of contrasts, as well as a few parallels,
between the potential difficulties that these two technologies bring, which he categorizes as strategy,
operations, acquisition, and arms control. The author of paper [36] claimed that online security attacks have
been carried out by hacker-activist organizations with the goal of causing harm to web services in a specific
context. On Twitter content, the author demonstrated a sentiment analysis method. The author's strategy was
based on a daily collection of tweets from users who utilize the platform to share their opinions on pertinent
subjects and to deliver content connected to web security assaults. The information was transformed into
data that could be statistically examined to determine whether an attack was likely or not. The latter was
accomplished by examining the aggregate sentiment of users and hacktivist groups in response to a
worldwide incident. Edwards et al. [37] use a publicly available dataset of data breaches to uncover trends in
data breaches using a Bayesian Generalized Linear Model. They conclude that while the amount and
frequency of data breaches have remained consistent in recent years, their impact is increasing as threat
actors improve their ability to monetize personal information and the quantity of electronic financial
transactions grows. A concentrated literature analysis of machine learning and data mining methods for
cyber analytics in support of intrusion detection was reported in a survey study [38]. Van Slyke et al. [39]
create taxonomy of harms for white-collar crimes by focusing on the victimization aspect of these crimes.
The author of paper [40] recommended that timely intelligence on cyber security risks and vulnerabilities is
necessary to secure key personal and organizational systems. Overt and covert sources of information
regarding these dangers include the National Vulnerability Database, CERT warnings, blog posts, social
media, and dark web services. Other initiatives are centered on the evolution of risk frameworks and the
modeling of business system resilience [41]. Researchers use these models to try to figure out how disasters
can impair global essential services by looking at the interconnection of assets. A threat-based model is
developed, with each threat being associated with various processes of destruction, specific vulnerabilities,
and different obstacles for system resilience. In order to handle a massive problem like this, some solutions
need to be figured out. Even though not everyone is willing to come up with solutions, a few people have
stepped in to contribute a possible answer. Kennedy, proposes continuous and timely updates of security
[42] software, as well as network and application software for both business and personal devices. The
author offers a simulation-based training scenario in which student trainees experience the symptoms and
effects of a DDos assault, [43] practice their response in a virtual environment with the purpose of preparing
them for real attacks, utilizing a simulator and hacking tools. In paper [44], the author used a semi
supervised method to classify cyber security logs into three categories: attack, unsure, and no attack, by first
breaking the data into three clusters using Fuzzy K Mean (FKM), then manually labeling a small sample,
and finally training the neural network classifier Multi-Layer Perception (MLP) on the manually labeled
data. An interesting approach, based on the „top-down‟ methodology described in the criminology field, is
presented by Nguyen et al. [45]. The authors attempted to elicit „premiums‟ that some users would be
willing to pay to protect their assets from cyber-incidents. Our current knowledge about cyber security relies
heavily on data from commercial threat reporting and news reports. Yet this data provides a partial and
biased view of cyber threat activity, because it is often politicized and influenced by the demands of
powerful buyers and the interests of capable providers [46].
Cyber-attacks can endanger patient safety by compromising data integrity or affecting medical device
operation, for example. Recent examples include the WannaCry and NotPetya ransomware attacks, as well
as flaws in [47] Medtronic implantable cardiac device programmers, which have harmed health-care
delivery capabilities. It is apparent that cybercrime is here to stay due to its profitable nature [48] and low
risk level (since cyber thieves can launch assaults from anywhere on the planet). The author of paper [49]
feels that social media is now an important component of people's everyday lives and the livelihood of
some. He describes a method for calculating consumer loyalty based on Twitter data. When fighting cyber-
crime, it's critical to understand who might be the target of a cyber-attack and why tracking down their
perpetrators might be tough. While everyone can theoretically become a victim of a cyber-attack, certain
people are far more vulnerable than others. For example, in the past, an elderly person's personal
information was particularly vulnerable to being taken by someone looking to make a lot of money. While
this circumstance does not necessarily involve hacking, an elderly person can become a victim in other
ways. Teenagers and the elderly are seen to be the most vulnerable victims, as they are the ones who are
least aware that these attackers exist [50]. Traditional solutions, as well as the use of analytic models,
machine learning, [51] and big data, might be improved by giving relevant knowledge to control or restrict
the repercussions of threats, according to the author of article.
Cybercrime can manifest itself in the form of cyber bullying and online harassment, which are referred to as
cyber enabled crimes, or through security risks that affect the computer itself, such as malware infections,
ransomware infections, and theft and misuse of personal data, which are referred to as cyber dependent
crimes [52]. An approach for tracking social data that can be used to launch cyber-attacks is presented in
paper [53]. The monthly prediction of tweets with content linked to security attacks and the incidents
discovered using l1 regularization is their key contribution. Cyber-threats are extremely dangerous for
health-care institutions. According to Verizon's 2018 Data Breach Investigation Report, data breaches
impacted the health care industry the most, accounting for 24 percent of all investigated breaches across all
industries [54].
Cybercrime is defined as the commission of a crime using technology, such as computers, smartphones, or
tablets. As a result, this type of criminality has been tremendously costly to the economy, with estimations
of $575 billion lost annually worldwide, according to the report. When the Internet first became widely
available around the world, China saw it differently than other countries. Because radio and television shows
were uploading their recordings to the Internet for anyone to view whenever they wished, China appeared to
treat the Internet as a new [60] type of media. Cybercrime, on the other hand, occurs in a different setting
than traditional crimes, which may result in different risk factors for both offending and victimization [61].
Traditional offending and victimizations necessitate physical interaction between victims and offenders;
however, there is no physical convergence in space or time between offenders and victims in cybercrime.
The author of this research offered a framework to help us fight cybercrime no matter where we are by
monitoring the actions we undertake on our electronic devices [62]. Scammers take advantage of the fact
that cyber criminals are difficult to track down. An in-depth examination of cyber-crime in India has been
conducted in this article. According to the author, fraud cases are on the rise, and the majority of victims are
between the ages of 20 and 29. Children and women are disproportionately affected. As a result, awareness
campaigns are essential in India to prevent or minimize cybercrime [63].
Cyber security is a set of strategies and processes for defending computers, networks, databases, and
applications against assaults, illegal access, modification, or destruction. It can also play a vital role in the
development of information technology and Internet services. There are various trends in cyber security, the
most prominent of which is Web application. Web applications are now one of the most widely used
platforms for delivering information and services via the Internet. Cyber security refers to the technologies,
techniques, and procedures that are used to prevent computers, programmes, networks, and data from being
hacked, damaged, or accessed without authorization [65]. Specialists in cyber security and forensics are
increasingly dealing with a wide range of cyber threats in near-real-time. The capability to detect, analyze,
The first computer “worm” was built in the 1970s by Robert Thomas, a researcher for BBN Technologies in
Cambridge, Massachusetts. The Creeper was the name of the creature. “I'M THE CREEPER: CATCH ME
IF YOU CAN”, said the Creeper, who attacked computers by bouncing from system to system. The first
antivirus software was built by Ray Tomlinson, the inventor of email, who created a replicating programme
called The Reaper, which would track down Creeper and delete it. Cyber-crime grew more powerful after
Creeper and Reaper. As computer software and hardware improves, so do security breaches. With each new
breakthrough, hackers discovered a new vulnerability or a means to circumvent security measures. The
Russians were the first to use cyber power as a weapon, in 1986. Marcus Hess, a German citizen, gained
access to 400 military systems, including Pentagon CPUs. He intended to sell secrets to the KGB, but an
American astronomer, Clifford Stoll, caught him before that could happen. In 1988, a man named Robert
Morris had an idea: he wanted to test the size of the internet. To do this, he wrote a program that went
through networks, invaded UNIX terminals, and copied itself. The Morris worm was extremely aggressive,
slowing systems to the point where they were unusable. He subsequently became the first person to be
convicted under Computer Fraud and Abuse Act.
The Melissa virus was released in late 1999. This was a macro-virus that was specifically designed to infect
email accounts. The virus would get access to these emails with the goal of sending out mass emails. The
author was one of the first to be found guilty of creating malware. He was given a five-year term after being
accused of causing $80 million in damages. In 2013 and 2014, Yahoo was the target of one of the most
serious cyber-attacks [69]. Yahoo accounts belonging to nearly 3 billion people were compromised as a
result of the assaults. The attacks took advantage of vulnerabilities that had not yet been addressed. The
hackers installed malware on Yahoo's systems using spear phishing techniques, giving them unrestricted
backdoor access. They gained access to Yahoo's backup databases and stole sensitive data such as names,
emails, passwords, and password recovery questions and answers.
Viruses were becoming more lethal, invasive, and difficult to regulate. We've already seen big cyber-attacks,
and the year isn't even halfway through yet. These are only a few examples, but they demonstrate that cyber
security is a must-have for both enterprises and small businesses. As shown in the timeline above, cyber
security is a never-ending cat and mouse game. Attackers are gaining new talents and employing new
methods and techniques as the internet evolves. Defenders, on the other hand, react by playing catch-up.
According to Gartner Inc.'s projection [70], global cyber security spending would reach $133.7 billion by
2022. Cyber-attacks are becoming more sophisticated, prompting businesses to invest more in establishing
data breach prevention solutions.
Education is a critical component of any cyber-crime plan, and it is critical that everyone in your
organisation, from the CEO to the clerical staff, is aware of the hazards associated with using your network
and apps [74]. Our youth are one of the most crucial populations to educate about cyber security. While kids
may not be banking or shopping online with credit cards, they can make it very easy for cyber criminals to
gain access to data by opening insecure personal accounts. Weak passwords and improper email or social
media practises make it much easier for others to get into your account and access the information of your
friends and family. No one wants to be accountable for cybercrime on their loved ones, whether it's a bank
account number [75], and a photo that should be kept secret or complete identity theft. Because of the above
reasons, cyber security has become an important part of the business and the focus now is on developing
appropriate response plans that minimize the damage in the event of a cyber-attack and it is critically
important because it helps to preserve the lifestyles we have come to know and enjoy.
Organizations require cyber security experts and specialists to deal with the numerous types [93] of cyber
security attacks that come with varying technicalities. Over the past 12 months, the typical cost to businesses
of cyber events and breaches increased to $57,000 [94]. This is nearly a six-fold increase over the $10,000
raised the previous year. Hackers are increasingly employing phishing, malware infestations, and DDoS
operations. The larger organisations, on average, are the ones who have paid the most for an internet
presence. This is unsurprising given that they were also the most extensively targeted. More than half of all
businesses with 1,000 or more employees (51%) reported they have had at least one cyber incident.
Cybercrime has a significantly higher cost and intensity. Figures 1 and 2 show that cyber thieves are
increasingly targeting energy and manufacturing companies, on top of a sector that has been a target for
years. Individuals all over the world are affected by numerous forms of cyber security assaults. The most
prevalent types of cyber-attacks are discussed in the section below.
7.1.1 Spear
Spear phishing is the most popular type of cyber-attack, owing to its ease of execution and startling
effectiveness. Spear phishing is a sort of phishing attack that targets a specific group or type of person, such
as a company's system administrators. If you go fishing, you might catch an old boot, a tuna, or a flounder,
or any other type of fish. When spearfishing, you select a certain fish to pursue, hence the name. The goals
are just those goals.
7.1.2 Whaling
Whaling is a sort of phishing that is even more targeted than spear phishing because it targets whales, the big
fish. The CEO, CFO, or any Cxx within an industry or even a specific corporation is the target of these
attacks. A whaling email can inform them that their company is being sued and that they should click on the
link for more information. The link then directs them to a page where they can enter all of their company's
important information, such as their Tax ID number and bank account numbers. It's an unfortunate mix-up
of nomenclature, because whales aren't fish.
7.1.3 Smishing
Smishing is a type of assault that targets us via text message or SMS. A smishing attack occurs when you
receive an SMS message that contains a link to click or a phone number to call. An SMS that appears to be
[96] from your bank and informs you that your account has been compromised and that you must contact
Dr.Yusuf Perwej, IJSRM Volume 09 Issue 12 December 2021 [www.ijsrm.in] EC-2021-679
your bank immediately is a common occurrence. The attacker will next ask you to verify your bank account
number, SSN, and other personal information. The attacker now has complete access of your bank account.
7.1.6 Vishing
Vishing is a type of cybercrime that employs the use of a phone to collect personal information from
victims. Cyber criminals utilize smart social engineering strategies to persuade victims to act, giving them
sensitive information and access to bank accounts. This is known as voice phishing. To deceive consumers
into giving critical information, vishings use phoney phone numbers, voice-altering software, SMS
messaging, and social engineering. Voice is commonly used by vishing to deceive users.
7.2 Malware
Malware is software that is designed to disrupt the normal operation of any device, including mobile phones,
desktop computers, and servers. The user clicks on the malware source, which is usually provided as a script
or executable code, and accidentally installs the malware. Some malware strains are aimed to gain persistent
network access, while others are designed to spy on the user in order to obtain credentials or other useful
information, and still others are just designed to cause disruption. [97] Some malware is designed to extract
money from the victim in some way. The most well-known type of malware is ransomware, a programme
that encrypts the victim's files and then demands a payment in exchange for the decryption key. The most
frequent types of Malware assaults are discussed in this section.
7.2.1 Ransomware
It is a specialized malware distributed to extort money from targets and is one of the most prevalent and
known cases of cyber-attacks.
Figure 4: Ransomware
To gain access to the target computer's hard disc, the attacker distributes the malware as a virus. It then
encrypts the data and renders the computer and its contents inaccessible until the user pays the ransom
demanded by the attacker. It is frequently impossible to decrypt the contents of a file [98] on one's own.
WannaCry and Maze ransomware are two recent examples of how malware can cause havoc, compelling
many businesses to pay Bitcoins or money to recover their infected equipment and data.
7.2.2 Virus
These viruses affect Microsoft Word and Excel, among other programmes. Macro viruses attach themselves
to the initialization sequence of an application. The virus executes instructions before handing control to the
programme when it is opened. The virus replicates and attaches itself to other programmes on the computer
system.
7.2.6 Trojans
A Trojan, often known as a Trojan horse, is a malicious programme that hides in a useful application. The
trojan is a virus delivery technique that cleverly disguises its purpose, hence the term, which is drawn from
Greek mythology. It usually [99] lurks in a legitimate programme (such as games, software, or other such
items) and creates a back door for attackers to exploit and cause significant damage. As a result, a Trojan
horse is a way for attackers to obtain access to a user's device and abuse it further. They do not self-replicate
in the same way as viruses do. A Trojan, for example, can be configured to open a high-numbered port so
that a hacker can listen and then launch an assault.
7.2.7 Worm
Unlike viruses and Trojans, which are designed for specialised localised attacks, the worm is a special
malware designed to propagate from targeted devices to other nodes in the network. These self-contained
programmes are frequently distributed as email attachments and are triggered when the user opens them. It
is capable of swiftly disseminating itself (by sending emails to contacts and attaching itself as and
attachment) and spreading to other systems. Its potential to cause damage is amplified by its complete lack
of identification and ability to self-propagate without the attacker's active participation. A worm spreading
throughout the internet and overloading email servers can cause denial-of-service attacks against network
nodes in addition to undertaking malicious activities.
7.2.11 Droppers
A dropper is an application that is used to infect computers with viruses. Virus-scanning software may not
detect the dropper in many cases since it is not infected with dangerous code. A dropper can also connect to
the internet and download updates to virus software that is resident on a compromised system.
7.2.12 Adware
Advertising banners are displayed while any programme is running, and adware is a software application
utilized by businesses for marketing goals. Adware can be downloaded to your system automatically while
surfing any website and viewed through pop-up windows or a bar that displays on your computer screen.
7.2.13 Spyware
Spyware is a type of programme that is installed on a user's computer or browser to collect information
about them. It secretly records everything you do and delivers the information to a remote user. It can also
use the internet to obtain and install additional malicious apps. Spyware is similar to adware in that it is a
separate programme that is installed unintentionally when you install another freeware programme.
An attacker uses the buffer space during a Transmission Control Protocol (TCP) session initialization
handshake in this attack, as seen in figure 6. The attacker's device sends a torrent of connection requests to
the target system's small in-process queue [103], but it does not respond when the target system responds to
Another effect of this attack is on network and security elements along the path to the target server,
particularly firewalls. As a result of UDP flooding, the firewall attached to the server can get overwhelmed,
causing the system to shut down, as seen in Figure 8. Firewalls create a state for each UDP packet and are
quickly overwhelmed by the influx of connections.
7.4.6 Botnets
Botnets are the millions of systems infected with malware under hacker control in order to carry out DDoS
attacks shown in figure 11.
It happens because of flaws in the application's own client-side scripts, not because of any payload provided
by the attacker. Figure 15 shows how an attacker can exploit the DOM's various objects to develop XSS
attacks. The attacker injects malicious script into the target browser using the vulnerable client-side script.
The attacker transmits false/spoofed ARP messages using ARP spoofing, as demonstrated in Figure 18. As a
result, their MAC address corresponds to that of a genuine computer on the network. As a result, the attacker
obtains data meant for the original system, intercepting and altering it while in route.
The hijacking of a user's session is a common MiTM attack vector. SSL stripping is the process of removing
the security layer from HTTPS in order to allow ARP or DNS spoofing.
Intercepting packets allows attackers to convert secure HTTP requests to non-secure HTTP requests, which
convey sensitive data as unencrypted plain [108] text data. An attacker hijacks a session between a trusted
client and a network server in this form of MitM attack, as depicted in figure 19. While the server continues
the session, believing it is conversing with the trusted client, the attacking machine replaces its IP address
for the trusted client.
7.6.5 IP Spoofing
An attacker uses IP spoofing to persuade a system that it is interacting with a known, trusted entity, allowing
the attacker to gain access to the system. Instead of sending a packet to a target host with its own IP source
address, the attacker sends a packet with the IP source address of a known, trustworthy host. The target host
might accept the packet and act upon it.
Figure 20 shows Alice (the unsuspecting end user) obtaining tickets to authenticate to her mail server. Bob,
the malicious hacker, is secretly monitoring all network activity between Alice, the mail server, and the
Kerberos Key Distribution Centre (KDC). Because the TGT must be decrypted with Alice's password,
which Bob does not know, Bob is unable to utilise it immediately in the first stage. However, when Alice
sends her encrypted ticket and authenticator, Bob can intercept that message and replay it to impersonate
Alice to the mail server.
8.2 Hacktivists
They want to spread a non-financial message. They may carry out an attack in order to strengthen their
belief system, which could be a political agenda, social ideology, religious ideology, or a cause that they
want to be known for through their online misbehaviour. Hacktivism is a form of digital disobedience,
according to Dan Lohrmann, chief security officer for Security Mentor, a national security training firm that
works with states. It's hacking for a cause. Hacktivists are not like cybercriminals who hack computer
networks to steal data for the cash. Depending on the political beliefs they hold, they can be described as
progressive, ethical, or plain disruptions among other categories.
8.4.1 Malicious
Insider threats are attempts by an insider to gain access to an organization's data, systems, or IT
infrastructure with the intent of causing harm. Insider threats are frequently attributed to disgruntled
employees or ex-employees who believe the organisation has wronged them in some way and believe they
are justified in seeking retaliation. When malevolent outsiders use financial incentives or extortion to
masquerade insiders, they can pose a threat.
8.4.2 Accidental
Insider threats are threats that are made by mistake by insider employees. In this type of hazard, an
employee may accidently delete critical files or share confidential information with a business partner in
violation of corporate policy or legal requirements.
8.4.3 Negligent
Detect: Organizations must put in place the necessary procedures to detect cyber security incidents
as quickly as feasible.
Protect: Organizations must create and put in place suitable controls to limit or contain the
consequences of potential cyber security incidents.
Respond: Businesses must be able to build reaction plans to mitigate the effects of cyber-attacks.
Recover: Businesses must devise and implement effective strategies for restoring capabilities or
services that have been harmed as a result of cyber security incidents.
The cyber security Framework is intended for businesses of all sizes, divisions, and stages of development.
The framework was created with flexibility in mind. The framework can be customised to be utilised by any
organisation thanks to the built-in customisation option.
9.1.3 Profiles
Profiles are an organization's unique arrangement of organisational requirements, goals, and assets in
relation to the Framework Core's desired outcomes. Profiles are primarily used to identify and categorise
10.1 Firewalls
The firewall, as we all know, is at the heart of security technologies, and it has evolved into one of the most
critical security tools. Its job is to keep unauthorised users from accessing or leaving a private network. It
can take the form of hardware, software, or a hybrid of the two. Unauthorized internet users are prevented
from accessing private networks connected to the Internet via firewalls [124]. The firewall filters all
messages entering and leaving the intranet. Each message is examined by the firewall, and those that do not
fit the set security standards are blocked.
Network security monitoring solutions make network administration and monitoring easier while also
assisting in security compliance auditing. Anti-virus applications, firewalls, and intrusion detection systems
are examples of network security solutions that sit on the network's edge and collaborate to help assure its
11.11 5G Technology
The benefits of 5G technology will be enormous, including improved performance and speed, decreased
latency, and increased efficiency. One of the most likely and well-known benefits of 5G technology is that it
will enable even more IoT devices to connect to the internet and support more connections between them
[135]. This would allow consumers to connect to or monitor their IoT devices remotely over the internet,
implying that cyber-attacks are possible. As a result, IoT devices and sensors will require increasingly
complex authentication in order to prevent unwanted access. It will, however, come with hazards. To avoid
widespread service disruptions, malicious exploitation of IoT devices, and millions, if not billions, of dollars
in losses, it is now unavoidable to address the 5G security issue. The 5G standard will result in greater 5G
security risks and a wider, diverse attack surface due to the massive number of devices and the impending
use of virtualization and the cloud. To comprehend a healthy and strong communications future, the industry
needs to preserve a laser focus on 5G security.
Finally, we may take basic steps to protect our devices and data against cyber threats [145] by using the
most up-to-date hardware and software for our digital needs. We'll also need to take more advanced
precautions, such as setting up a firewall to add an extra layer of security.
XII. Conclusion
With the rapid advancement of technology, our lives are becoming increasingly digitalized. People now live
in a cyber-world where all data and information is stored digitally and online. Whether it's for business,
education, shopping, or banking, practically everything is now done online. The focus on cyber security is
frequently on attempting to characterize the problem and determine the genuine threat level. All individuals,
professionals, legislators, and, more broadly, all decision makers are concerned about cyber security. Cyber
security is critical to the advancement of both information technology and Internet services. Cyber-attacks
will be on the rise in 2021-22, and not just from the solitary hackers we've come to associate with them, but
also from nation-state actors looking to steal data from governments and organizations. Because cyberspace
has no borders, a nation's cyberspace is a component of the global cyberspace and cannot be isolated to
define its bounds. It has never been easy to maintain cyber security. And, because assaults are becoming
more innovative every day, it's vital to define cyber security and determine what constitutes excellent cyber
security. Cyber security is a technology that was designed to protect data and information systems kept on
computers. This paper comprehensive review covers cyber security, its history, and many types of cyber
Dr.Yusuf Perwej, IJSRM Volume 09 Issue 12 December 2021 [www.ijsrm.in] EC-2021-701
security. Explores the various forms of cyber dangers and discusses how cyber attackers are classified once
more. The state or process of safeguarding and recovering networks, devices, and programmes from any sort
of cyber-attack is known as cyber security.
References
1. Barry M. Leiner at. al., “A Brief History of the Internet,” ACM SIGCOMM Computer
Communication Review, Volume 39, Number 5, October 2009
2. M. Gallaher, A. Link and B. Rowe, Cyber Security: Economic Strategies and Public Policy
Alternatives, Edward Elgar Publishing, 2008
3. T. Rid and B. Buchanan, "Attributing cyber-attacks", Journal of Strate St., vol. 38, no. 1-2, pp. 4-37,
2015
4. B. Zhu, A. Joseph and S. Sastry, "A taxonomy of cyber-attacks on SCADA systems", 2011
International conference on internet of things and 4th international conference on cyber physical and
social computing, pp. 380-388, 2011
5. Lillian Ablon, Martin C. Libicki and Andrea A. Golay, Markets for Cybercnme Tools and Stolen
Data: Hackers‟ Bazaar, pp. 1-85, 2014
6. Dawson, J. and Thomson, R., “The future cybersecurity workforce: Going beyond technical skills for
successful cyber performance”, Frontiers in Psychology, 9(JUN), pp. 1–12, 2018, doi:
10.3389/fpsyg.2018.0074
7. C. L. Philip, Q. Chen and C. Y. Zhang, "Data-intensive applications challenges techniques and
technologies: A survey on big data", Information Sciences, vol. 275, pp. 314-347, 2014
8. Yusuf Perwej, “An Experiential Study of the Big Data”, International Transaction of Electrical and
Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281,
Science and Education Publishing, Volume 4, No. 1, Pages 14-25, 2017, DOI: 10.12691/iteces-4-1-3
9. Yusuf Perwej ,“ The Hadoop Security in Big Data: A Technological Viewpoint and Analysis ”,
International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE) , E-
ISSN: 2320-7639, Volume 7, Issue 3, Pages 1- 14, June 2019, DOI: 10.26438/ijsrcse/v7i3.1014
10. Nikhat Akhtar, Firoj Parwej, Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop
Technology”, International Transaction of Electrical and Computer Engineers System (ITECES),
USA, Volume 4, No. 1, Pages 26-38, 2017 , DOI: 10.12691/iteces-4-1-4
11. Firoj Parwej, Nikhat Akhtar, Yusuf Perwej, “A Close-Up View About Spark in Big Data
Jurisdiction”, International Journal of Engineering Research and Application (IJERA), ISSN : 2248-
9622, Volume 8, Issue 1, ( Part -I1), Pages 26-41, January 2018, DOI: 10.9790/9622-0801022641
12. Cagri B Aslan, Rahime Belen Saglam and Shujun Li, "Automatic Detection of Cyber Security
Related Accounts on Online Social Networks: Twitter as an example", SMSociety, July 2018.
13. Igor Skrjanc, Seiichi Ozawa, Tao Ban and Dejan Dovzan, "Large-scale cyber-attacks monitoring
using Evolving CauchyPossibilistic Clustering" in Applied Soft Computing, Elsevier, vol. 62, pp.
592-601, 2018
14. Praveen Paliwal, "Cyber Crime", Nations Congress on the Prevention of Crime and Treatment of
Offenders, March 2016
15. M. Kjaerland, "A taxonomy and comparison of computer security incidents from the commercial and
government sectors", Comput. Secur., vol. 25, no. 7, pp. 522-538, 200
16. M. A. Faysel and S. S. Haque, "Towards Cyber Defense: Research in Intrusion Detection and
Intrusion Prevention Systems", IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 10, no. 7, 2010
17. Le Compte, D. Elizondo and T. Watson, "A renewed approach to serious games for cyber security",
2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, pp. 203-216,
2015
18. N. Virvilis, A. Mylonas, N. Tsalis and D. Gritzalis, "Security Busters: Web browser security vs.
rogue sites", Comput. Secur., vol. 52, pp. 90-105, 2015
19. P. Chen, L. Desmet and C. Huygens, "A study on advanced persistent threats" in Communications
and Multimedia Security, Springer, pp. 63-72, 2014
20. Yusuf Perwej, “An Evaluation of Deep Learning Miniature Concerning in Soft Computing”,
International Journal of Advanced Research in Computer and Communication Engineering, ISSN
Volume 4, Issue 2, Pages 10 - 16, February 2015 DOI: 10.17148/IJARCCE.2015.4203