Cyber Threats Mega Trends in Cyber Space

被引:0
|
作者
Rusi, Tarja [1 ]
Lehto, Martti [1 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
关键词
cyber threat; mega trend; cyber space; global cyber threat situation; cyber risk; cyber actor;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitalization has become a fundamental part of human and corporate life and is deeply embedded in their daily activities. Products and services are becoming more intelligent and are connected with each other and humans in new ways. Digitalization also brings new threats. Criminals find new opportunities in new digital knowledge, utilizing, stealing and selling it. The possibility of a malicious attempt to damage or disrupt a computer network or system or device is called a cyber threat. The most important cyber threat areas identified in this study are: (1) smart phones, mobile devices and Internet-of-Things, (2) web interface, (3) social media, (4) targeted attacks, (5) information leaks and privacy, and (6) cloud services. In the future, the cyber security environment will be shaped by an ever more broadening cyberattack surface, the industrialization of hacking and the complexity and fragmentation of IT security market. Findings also suggest that the future will witness an increase in competence of cyber attackers, an increase in costs of information leakages, a lack of compatible security technologies, and a lack of skilled professionals. Cyber attackers discover new possibilities in the areas of Internet-of-Things, cloud services, big data, and mobility, bring-your-own device philosophy. The purpose of this research was to get an understanding of the global cyber threat situation. The research aimed to answer the following questions: (1) what kind of mega trends can be identified? (2) What are the most important cyber threats and how can the risks relating to them be mitigated? (3) Who are the cyber actors? (4) What kind of longer term threat trends can be identified? The research covered 19 global and national threat reports. The reports were published by security firms, IT companies and national institutions in 2015 and 2016. The method used in this study was content analysis.
引用
收藏
页码:323 / 331
页数:9
相关论文
共 50 条
  • [31] A REVIEW OF CYBER THREATS TO SAFTEY CRUCIAL, SPACE-BASED FRAMEWORK
    Sharma, Smita
    Singh, Akanksha
    Kumar, Shipra Ravi
    Yadav, Suman Avdesh
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 11 - 16
  • [32] Generative AI in Cyber Security of Cyber Physical Systems: Benefits and Threats
    Mavikumbure, Harindra S.
    Cobilean, Victor
    Wickramasinghe, Chathurika S.
    Drake, Devin
    Manic, Milos
    [J]. 2024 16TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, HSI 2024, 2024,
  • [33] Protecting the Besieged Cyber Fortress: Russia's Response to Cyber Threats
    Kari, Martti
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 685 - 691
  • [34] Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
    Presekal, Alfan
    Jorjani, Mohsen
    Rajkumar, Vetrivel Subramaniam
    Goyel, Himanshu
    Cibin, Nicola
    Semertzis, Ioannis
    Stefanov, Alexandru
    Palensky, Peter
    [J]. IEEE Access, 2024, 12 : 165756 - 165773
  • [35] Identifying and Modeling the Impact of Cyber Threats in the Field of Cyber Risk Insurance
    Pavlik, Lukas
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND INDUSTRY (MCSI 2018), 2018, : 118 - 121
  • [36] Upgrading space debris mitigation measures to cope with proliferating cyber threats to space activities
    Li, Du
    [J]. ADVANCES IN SPACE RESEARCH, 2023, 71 (10) : 4185 - 4195
  • [37] Trends in Smart Grid Cyber-Physical Security: Components, Threats, and Solutions
    Khalifa University, College of Engineering and Physical Sciences, Department of Electrical Engineering, Abu Dhabi, United Arab Emirates
    不详
    ON
    M5S 3G4, Canada
    不详
    MI
    48109, United States
    不详
    不详
    [J]. IEEE Access, 2024, (161329-161356)
  • [38] Cyber threats to the Private Academic Cloud
    Lakhno, Valerii
    Akhmetov, Bakhytzhan
    Kryvoruchko, Olena
    Chubaievskyi, Vitalyi
    Desiatko, Alona
    Bereke, Madina
    Shalabaeva, Maria
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2023, 70 (02) : 413 - 420
  • [39] Cyber threats place infrastructure at risk
    [J]. Aviat Week Space Technol (New York), 27 (51):
  • [40] Assessing cyber threats for storyless systems
    Meland, Per Hakon
    Nesheim, Dag Atle
    Bernsmed, Karin
    Sindre, Guttorm
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 64