RMIT University
Browse

A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications

chapter
posted on 2024-11-01, 01:53 authored by Gaganjot Saini, Malka N HalgamugeMalka N Halgamuge, Pallavi Sharma, James Purkis
Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.

History

Start page

98

End page

126

Total pages

29

Outlet

Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications

Editors

Information Resources Management Association

Publisher

Information Science Reference

Place published

Hershey, United States

Language

English

Copyright

Copyright © 2020, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

Former Identifier

2006117562

Esploro creation date

2022-11-26

Usage metrics

    Scholarly Works

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC