Emerging Trends and Future Prospects of Cybersecurity Technologies: Addressing Challenges and Opportunities

Authors

  • Harshada Umesh Salvi  Department of MCA, Finolex Academy of Management and Technology, Ratnagiri, Maharashtra, India
  • Supriya Santosh Surve  Department of MCA, Finolex Academy of Management and Technology, Ratnagiri, Maharashtra, India

DOI:

https://doi.org/10.32628/IJSRST52310432

Keywords:

Cybersecurity, Ransomware, Artificial Intelligence, Machine Learning, Quantum-safe encryption, post-quantum cryptography, Blockchain

Abstract

Cybersecurity is an ever-evolving domain, continuously challenged by sophisticated threats and rapidly advancing technologies. To safeguard digital assets and privacy in the face of emerging risks, it is imperative to explore and embrace the latest trends and innovations in cybersecurity technologies. This research paper investigates the most promising emerging trends in cybersecurity and their potential implications for the future landscape of cyber defense. By addressing the challenges and opportunities presented by these technologies, this paper aims to shed light on how organizations and policymakers can proactively strengthen their cybersecurity posture.

References

  1. Mascellino, “Global cyber attacks rise by 7% in Q1 2023,” Infosecurity Magazine, https://www.infosecurity-magazine.com/news/global-cyber-attacks-rise-7-q1-2023/.
  2. S. Shea, “Top 7 enterprise cybersecurity challenges in 2023,” Security, https://www.techtarget.com/searchsecurity/tip/Cybersecurity-challenges-and-how-to-address-them.
  3. T. Williams, “Artificial Intelligence in cyber security: A guide for 2023,” Artificial Intelligence In Cyber Security | A Guide for 2023, https://www.theknowledgeacademy.com/blog/artificial-intelligence-in-cyber-security/.
  4. ISARA Corporation, “What is quantum-safe cryptography?,” ISARA Corporation, https://www.isara.com/resources/what-is-quantum-safe.html.
  5. K. Ansari, “IOT cyber security: Trends, challenges and solutions,” KnowledgeHut, https://www.knowledgehut.com/blog/ security/Iot-cyber-security.
  6. O. Lage, S. de Diego, B. Urkizu, E. Gómez, and I. Gutiérrez, ‘Blockchain Applications in Cybersecurity’, Computer Security Threats. IntechOpen, Sep. 09, 2020. doi: 10.5772/intechopen.90061.
  7. Rose, S. W., Borchert, O., Mitchell, S., & Connelly, S., Zero trust architecture, NIST Special Publication 800-207, https://doi.org/10.6028/NIST.SP.800-207
  8. D. Sullivan and M. Bacon, What is a CASB? cloud access security brokers explained, https://www.techtarget.com/ searchcloudcomputing/definition/cloud-access-security-broker-CASB.
  9. “Biometrics: Definition, use cases, latest news,” Thales Group, https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/inspired/biometrics (accessed Aug. 1, 2023).
  10. “Cybersecurity - threats, challenges, opportunities,” Australian Computer Society, https://www.acs.org.au/insightsandpublications/ reports-publications/cybersecurity-threats-challenges-opportunities.html (accessed Aug. 1, 2023).
  11. D. Kozhuharova, A. Kirov, and Z. Al-Shargabi, “Ethics in cybersecurity. what are the challenges we need to be aware of and how to handle them?,” Cybersecurity of Digital Service Chains, pp. 202–221, Apr. 2022. doi:10.1007/978-3-031-04036-8_9
  12. Polyakov, “How to attack machine learning (evasion, poisoning, Inference, trojans, backdoors),” Medium, https://towardsdatascience.com/how-to-attack-machine-learning-evasion-poisoning-inference-trojans-backdoors-a7cb5832595c.
  13. Heather, “5 Ways Legacy Systems add to cybersecurity risks: Synchrony Systems,” 5 Ways Your Legacy Systems May Add to Cybersecurity Risks, https://sync-sys.com/5-ways-your-legacy-systems-may-add-to-cybersecurity-risks/.
  14. K. Scarfone, “Cybersecurity skills gap: Why it exists and how to address it: TechTarget,” Security, https:// www.techtarget.com/searchsecurity/tip/Cybersecurity-skills-gap-Why-it-exists-and-how-to-address-it.
  15. M. A. Mendoza, “Challenges and implications of cybersecurity legislation,” welivesecurity, https://www. welivesecurity.com/2017/03/13/challenges-implications-cybersecurity-legislation/.
  16. M. A. Mendoza, “Challenges and implications of cybersecurity legislation,” welivesecurity, https://www.welivesecurity.com/ 2017/03/13/challenges-implications-cybersecurity-legislation/.

Downloads

Published

2023-08-30

Issue

Section

Research Articles

How to Cite

[1]
Harshada Umesh Salvi, Supriya Santosh Surve "Emerging Trends and Future Prospects of Cybersecurity Technologies: Addressing Challenges and Opportunities" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 10, Issue 4, pp.399-406, July-August-2023. Available at doi : https://doi.org/10.32628/IJSRST52310432