A Literature Review of Cyber Security
A Literature Review of Cyber Security
Security
Abstract
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world.
Online criminality, on the other hand, has risen in tandem with the growth of Internet activity.
Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in
cyberspace.
Cyber security refers to the methods that a country or organization can use to safeguard its products and
information in cyberspace.
Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't
just a problem that affects individuals but it also applies to an organization or a government. Everything has
recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart
phones, and Internet of Things techniques, among others.
Cyber security safeguards the data and integrity of computing assets that are part of or connected to an
organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of
a cyber-attack
INTRODUCTION
Cyber security has developed into a topic of global significance and value. More than 50
countries have already officially published some form of strategy paper outlining their
official stance on cyberspace, cybercrime and/or cyber security.
Cyber security is used, in most literature, as an all-inclusive term. Definitions of this
word differ, e.g. the Merriam Webster dictionary defines it as "measures taken to protect
a device or computer network from unauthorized access or attack" The International
Telecommunications Union (ITU) describes the following for cyber security.
Cybersecurity is the array of resources, procedures, security principles, safety protocols,
rules, risk management strategies, activities, training, best practices, compliance, and
technology that can be used to secure the cyber environment and the properties of the
company and user.
The Most Significant Cyber Attacks from
2006-2020,by Country
What are the Most Common Types?
Specops highlights the four most commonly used for significant cyber crimes:
• A man-in-the-middle (MitM)
• Phishing Attack
• This paper examined the meanings of both the security of information and ICT. The paper then
argued that cyber security is distinct from information security, despite sometimes being used as an
equivalent concept for information security.
• the paper argues that cyber security reaches beyond conventional information security boundaries
to include not only the protection of information resources, but also that of other properties,
including the individual himself
• In cyber security this aspect has a further element, namely, humans as possible targets of cyber-
attacks or even engaging unknowingly in a cyber assault.
Cybercrime is estimated to have cost the global economy just under USD 1
trillion in 2020, indicating an increase of more than 50% since 2018. With
the average cyber insurance claim rising from USD 145,000 in 2019 to
USD 359,000 in 2020, there is a growing necessity for better cyber
information sources, standardised databases, mandatory reporting and
public awareness. This research analyses the extant academic and industry
literature on cybersecurity and cyber risk management with a particular
focus on data availability. From a preliminary search resulting in 5219
cyber peer-reviewed studies, the application of the systematic methodology
resulted in 79 unique datasets. We posit that the lack of available data on
cyber risk poses a serious problem for stakeholders seeking to tackle this
issue. In particular, we identify a lacuna in open databases that undermine
collective endeavours to better manage this set of risks. The resulting data
evaluation and categorisation will support cybersecurity researchers and
the insurance industry in their efforts to comprehend, metricise and
manage cyber risks.
AIM AND OBJECTIVE OF RESEARCH:
A.Extensive literature survey about various types of cyber attacks and defense
Methodologies
KEY WORDS:
Cyber Security,cyber attacks,
Risks Assesment,
Cyber Risk Management,
Cyber Attacks
Prediction Model.
Bayesian network (BN)