Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

1.

rapid technological advancements


2. evolving nature of cyber threats
3. shortage of skilled cybersecurity professionals

1.The process of digitization in all aspects of human life, like healthcare, education,
business, etc., has gradually led to the storage of all sorts of information, including sensitive
data. Security, is the process of protecting the digitized information from theft or from
physical damage while maintaining the confidentiality and availability of information but as
technology is growing rapidly, the cybercrime rate also increases both in number and
complexity. The reason behind this tremendous growth in cyber-crime is the usage of
inadequate software, expired security tools, design flaws, programming errors, easily
available online hacking tools, lack of awareness in public, high rates of financial returns,
etc. In order to explore the vulnerabilities in the target and thereby to attack the victim, more
powerful attack tools are developed by the technical attackers. With this, new attacks in
different variations are coming which are difficult to detect. Increase in internet dependency
in all walks of life, digital nature of data in huge amounts getting accumulated through online
transactions and decentralization of data repositories, has led to the development of
effective security algorithms. The continuously changing nature of cybercrime also leads to
the difficulty of handling and avoiding emerging threats. The task of securing cyber-space is
the most difficult and challenging task as advanced threats play a very active role. Therefore,
it is necessary to get insights into the concepts of security defense mechanisms, different
techniques and trending topics in the area of information security. There are significant risks
for many industry agencies, public and private organization’s (especially critical
infrastructure) for companies and governments alike, it will be necessary for future growth,
innovation and competitive advantage to have a cyber-security role in all its components.
Every New Year, the security of data, continues to differ from cybercrime by entirely different
methods. The newest and most turbulent innovations, along with emerging cyber techniques
and regular attacks, are difficult organisations that not only protect their infrastructure but
also need new channels and intelligence. However, we do have to do our hardest to
attenuate cybercrime so that we can have a healthy and stable future in cyber - houses. The
technologies of stable Internet and efficient systems of the next century have been
proposed as important research fields for the future. The advancement of global identity
management and monitoring techniques to monitor opponents have also become an
important issue in the future.

References
Ravi Sharma Study of Latest Emerging Trends on Cyber Security and its Challenges to
Society International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-
2012 1ISSN 2229-5518.
[2] Lee, H.; Lee, Y.; Lee, K.; Yim, K. Security Assessment on the Mouse Data using Mouse
Loggers. In Proceedings of the International Conference on Broadband and Wireless
Computing, Communication and Applications, Asan, Korea, 5–7 November 2016
[3] Mellado, D.; Mouratidis, H.; Fernández-Medina, E. Secure Tropos Framework for
Software Product Lines Requirements Engineering. Comput. Stand. Interfaces 2014, 36,
711–722
[4] Mohsin, M.; Anwar, Z.; Zaman, F.; Al-Shaer, E. IoTChecker: A data-driven framework
for security analytics of Internet of Things configurations. Comput.Secur. 2017, 70, 199–223
[5] VeenooUpadhyay, SuryakantYadav Study of Cyber Security Challenges Its Emerging
Trends: Current Technologies International Journal of Engineering Research and
Management (IJERM) ISSN: 2349- 2058, Volume-05, Issue-07, July 2018
[6] Yim, K. A new noise mingling approach to protect the authentication password. In
Proceedings of the 2010 International Conference on Complex, Intelligent and
Software Intensive Systems, Seoul, Korea, 30 June–2 July 2012
[7] Nikita TresaCyriacLipsaSadath Is Cyber Security Enough- A study on Big Data Security
Breaches in Financial Institutions 2019 4th International Conference on Information Systems
and Computer Networks (ISCON) GLA University, Mathura, UP, India. Nov 21-22, 2019
[8] MdLiakat Ali Kutub Thakur Beatrice Atobatele Challenges of Cyber Security and the
Emerging Trends BSCI’19, July 8, 2019, Auckland, New Zealand

[9] Kutub Thakur1, Meikang Qiu2, Keke Gai3, MdLiakat Ali4 An Investigation on Cyber Security Threats and Securit

[10] J. Li. The research and application of multi-firewall technology in enterprise network
security. Int’l J. of Security and Its Applications, 9(5):153–162, 2015

2. The landscape of cybersecurity confronts incessant challenges amidst evolving threats.


The growing sophistication of cyberattacks, driven by AI and automation, poses formidable
hurdles in detection and mitigation. Rapid technological advancements introduce
vulnerabilities faster than defences can adapt. Human error, prevalent in phishing and social
engineering, remains a significant risk. Supply chain complexities expand the attack surface,
exposing vulnerabilities across interconnected systems. Compliance demands and resource
constraints further compound these challenges. A comprehensive strategy, integrating
advanced technologies, continual education, stringent assessments, and vigilant monitoring,
becomes imperative to counter these multifaceted challenges and fortify cybersecurity
measures against the ever-evolving threat landscape.

Fadziso, T., Thaduri, U. R., Dekkati, S., Ballamudi, V. K. R., & Desamsetti, H. (2023).
Evolution of the Cyber Security Threat: An Overview of the Scale of Cyber Threat.
Digitalization & Sustainability Review, 3(1), 1-12.

3. Organisations today face severe challenges recruiting the talent they need to protect their
systems
from cybersecurity threats. While shortages exist across the board, the greatest need is for
professionals with deep technical training who are able to take on high-value roles like
secure system design, tool development, and penetration testing. Cybersecurity
encompasses a broad range of specialty areas and work roles, and no single education
program can be expected to cover all of the specialized skills and sector-specific knowledge
desired by each employer. However, there are certain knowledge sets and skills that are
essential for any new employee in a critical technical work role, regardless of the field they
are in or the specialty they adopt. This includes an understanding of computer architecture,
data, cryptography, networking, secure coding principles, and operating system internals, as
well as working proficiency with Linux-based systems, fluency in low-level programming
languages, and familiarity with common exploitation methods and mitigation techniques.
Employers are finding that graduates are lacking this foundation. Employers find graduates
from many programs to be lacking in fundamental knowledge, practical experience, and
critical soft skills. One of the most consistent complaints against cybersecurity education
programs is that an over-emphasis on theory and book learning prevents students from
building the practical skills they need. Theory alone does not prepare graduates for the
tasks they will face once they step onto the job. Practical training and hands-on experience
is necessary to equip students with the tangible skills employers expect.Surveys consistently
show that organizations rate hands-on experience above all other factors when evaluating
new hires, and the integration of a hands-on learning environment where students work on
realistic cybersecurity challenges has been identified as one of the key factors setting apart
leading education programs in the eyes of cybersecurity practitioners. The cybersecurity
training nonprofit organization U.S. Cyber Challenge notes, “The common thread across the
most effective public, private, domestic, or international cyber workforce training programs is
hands-on, applied learning methods.”20 Despite this, many organizations continue to find
that students emerging from cybersecurity programs lack hands-on experience. According to
the professional association ISACA, “Their training is also most often based in theory. They
receive very little hands-on training; thus, the skill sets need to be developed on the job.” As
a result, the very value of a cybersecurity degree has begun to decline in the eyes of
employers, with surveys indicating that as many as 80 percent of hiring managers no longer
believe a four-year degree adequately prepares students for cybersecurity jobs.One solution
to the deficit of practical skills in cybersecurity graduates is to expand apprenticeship,
internship, and work-study offerings for students. These opportunities give students a
chance to apply what they have learned in a real-world environment, developing tangible
skills in the process and giving a grounding to the theory-based components of their
education. While these opportunities serve as useful supplements to existing education
programs, there are also ways for instructors to do more to incorporate hands-on learning
opportunities directly within the curricula themselves.

Crumpler, W., & Lewis, J. A. (2019). The cybersecurity workforce gap (p. 10). Washington,
DC, USA: Center for Strategic and International Studies (CSIS).

You might also like