Cyber Threats Mega Trends in Cyber Space

被引:0
|
作者
Rusi, Tarja [1 ]
Lehto, Martti [1 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
关键词
cyber threat; mega trend; cyber space; global cyber threat situation; cyber risk; cyber actor;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitalization has become a fundamental part of human and corporate life and is deeply embedded in their daily activities. Products and services are becoming more intelligent and are connected with each other and humans in new ways. Digitalization also brings new threats. Criminals find new opportunities in new digital knowledge, utilizing, stealing and selling it. The possibility of a malicious attempt to damage or disrupt a computer network or system or device is called a cyber threat. The most important cyber threat areas identified in this study are: (1) smart phones, mobile devices and Internet-of-Things, (2) web interface, (3) social media, (4) targeted attacks, (5) information leaks and privacy, and (6) cloud services. In the future, the cyber security environment will be shaped by an ever more broadening cyberattack surface, the industrialization of hacking and the complexity and fragmentation of IT security market. Findings also suggest that the future will witness an increase in competence of cyber attackers, an increase in costs of information leakages, a lack of compatible security technologies, and a lack of skilled professionals. Cyber attackers discover new possibilities in the areas of Internet-of-Things, cloud services, big data, and mobility, bring-your-own device philosophy. The purpose of this research was to get an understanding of the global cyber threat situation. The research aimed to answer the following questions: (1) what kind of mega trends can be identified? (2) What are the most important cyber threats and how can the risks relating to them be mitigated? (3) Who are the cyber actors? (4) What kind of longer term threat trends can be identified? The research covered 19 global and national threat reports. The reports were published by security firms, IT companies and national institutions in 2015 and 2016. The method used in this study was content analysis.
引用
收藏
页码:323 / 331
页数:9
相关论文
共 50 条
  • [1] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [2] Cyber Threats and Cyber Deception in Hybrid Warfare
    Steingartner, William
    Galinec, Darko
    [J]. ACTA POLYTECHNICA HUNGARICA, 2021, 18 (03) : 25 - 45
  • [3] Cyber Threats Against and in the Space Domain: Legal Remedies
    Dilworth, Seth W.
    Osborne, D. Daniel
    [J]. 2022 14TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: KEEP MOVING (CYCON), 2022, : 235 - 247
  • [4] Prepare for cyber threats
    Gill, Suzanne
    [J]. Control Engineering, 2019, 66 (10)
  • [5] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    [J]. LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [6] Addressing cyber threats
    Radler, Marilyn
    [J]. OIL & GAS JOURNAL, 2011, 109 (17) : 22 - 22
  • [7] Aviation cyber security: legal aspects of cyber threats
    Klenka, Michal
    [J]. JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 177 - 195
  • [8] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    [J]. 2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [9] Aviation cyber security: legal aspects of cyber threats
    Michal Klenka
    [J]. Journal of Transportation Security, 2021, 14 : 177 - 195
  • [10] Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities
    Awan, Jawad Hussain
    Memon, Shahzad
    Memon, Sheeraz
    Pathan, Kamran Taj
    Arijo, Niaz Hussain
    [J]. MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2018, 37 (02) : 359 - 366