Babate, A. I., Musa, M. A., Kida, A. M., & Saidu, M. K. (2015). Sate of cybersecurity: Emerging threats landscape. International Journal of Advanced Research in Computer Science & Technology, 3(1), 113-119.
This article recognizes the significance of cybersecurity and the challenges associated with implementing it. Notably, it considers the development of mobile devices and the integration of the internet in many activities, which increase the risks associated with this mode of communication. It reviews existing literature between the years 2011 and 2013, leading to the identification of threats such as network attacks, spamming, phishing, among other risks. The article states that even though protection measures are always improving, cybercriminals are also developing advanced methods of evading protection measures. Therefore, this will be an essential article for this paper since it provides information regarding the ways that attackers use and how one can protect him or herself.
Bendovschi, A. (2015). Cyber-attacks - Trends, patterns, and security countermeasures. Procedia Economics and Finance, 28(2015), 24-31.
Information and communication technology is one of the fastest evolving sectors in the world. Currently, it is used in almost all areas of human lives such as in social interaction, home appliances, financial services, cloud computing, biometric systems, and many other areas. This high integration exposes individuals and their privacy to cyber-based attacks. Furthermore, with each improvement of internet-based technology, cybercrime also evolves, thus, demanding the application of more measures to protect an organization. Bendovschi (2015) studies the trends of cybercrime by focusing on incidences in the last three years to identify any patterns in them. Knowing these trends could allow businesses to protect themselves against all problems that they may face. Therefore, this article will be highly important to this paper since it provides ways that an organization can protect itself from emerging risks.
Cabaj, K., Kotulski, Z., Ksiezopolski, B., & Mazurczyk, W. (2018). Cybersecurity: Trends, issues, and challenges. EURASIP Journal on Information Security, 1, 1-3.
Internet security poses a serious challenge to organizations and individuals alike. Currently, based on the fast rate with which technology changes, it is becoming harder each day to find and fight threats. Cabaj, Kotulski, Ksiezopolski, and Mazurczyk(2018) state that in some cases, it is only possible to achieve this goal using intelligent processes, machine learning, and big data to assess the situations. Specifically, these technologies allow their users to identify threats to their systems and protect them appropriately. When studying this area, this article reviewed other research papers to find the trends in methods of securing the internet and online communications. Thus, this article will provide crucial information for this paper.
Goutam, R. K. (2015). Importance of cybersecurity. International Journal of Computer Applications, 111(7), 14-17.
This article focuses on critical installations such as the military, universities, hospitals, businesses, and financial institutions and their use of the internet to transmit confidential information. This author states that an attack on any of these institutions could be highly lethal since it could lead to the breaching of private information, which could lead to the loss of life or property. Moreover, this article shows how insecure it is to transmit data over the internet following the advancement of hacking techniques. Therefore, based on the discussion of this article, it will be highly valuable to this paper since it sheds light on the risks that exist towards internet-based communication.
Hadlington, L. (2018). Employees attitude towards cybersecurity and risky online behaviors: An empirical Assessment in the United Kingdom. International Journal of Cyber Criminology, 12(1), 269-281.
The knowledge of the workers of an organization regarding internet security could affect their actions and behaviors. Specifically, if they know much about this topic, then they are highly likely to engage in practices that promote cybersecurity. However, if they do not know much about this topic, or if they have a negative attitude about it, then they are likely to engage in activities that jeopardize their security. Hadlington (2018) reached this conclusion after conducting a study of 515 employees of companies aged between 18 and 84 years old. The study found that the knowledge that a person has on this topic affects his or her attitude, which determines whether he or she will engage in risky behaviors. This study will have high importance to this paper since it provides information regarding factors that could jeopardize the cybersecurity of an organization.
Jain, J., & Pal, P. R. (2017). A recent study over cybersecurity and its elements. International Journal of Advanced Research in Computer Science, 8(3), 791-793.
This article studies cybersecurity while focusing on how people can protect themselves against threats against their security. These authors propose that in the context of computing and information technology, security refers to the protection of applications, software, and also the physical computer systems that a person or organization uses. While many researchers in this area usually focus on the protection of information in computers, this article considers factors that threaten the use of physical systems and other harms that may come from cyber systems. Therefore, this paper provides an excellent opportunity to study this area while focusing on all aspects of internet security.
Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy, 2(2), 155-184. doi:10.1080/23738871.2017.1366536
Currently, many aspects of human lives depend on the internet. A good example is the use of internet-connected devices such as home appliances, biometric devices, and other implements. These systems have a connection to the internet, which allows their users to monitor and control them appropriately, and they are called the internet of things (IoT). While these IoT devices help improve people's lives, some of them are highly vulnerable to cybercrime since they do not have well-developed security capabilities. MapleCITATION Map17 \n \t \l 1033 (2017) considers the methods of protecting them and improving the security of their users. This article will, therefore, be helpful to this paper since it helps show ways of protecting these devices against attacks.
Pardini, D. J., Heinisch, A. M., & Parreiras, F. S. (2017). Cybersecurity governance and management for smart grids in Brazilian energy utilities. Journal of Information Systems and Technology Management, 14(3), 385-400. doi:10.4301/S1807-17752017000300006
Currently, many government systems and other critical infrastructure are integrated with online systems for control and monitoring of their operations. These infrastructures include energy utilities, regulatory agencies, and other critical government sectors. This article considers the security and risks associated with these systems and how an attack can impact people. The authors propose the need for finding alternative methods for governing the security of these key systems to protect the public. The article uses statistical methods of validation to find the significance of a good security system. This article will be advantageous to this study since it sheds light on the significance of having a good security system to protect the public.
Sharma, R. (2012). Study of latest emerging trends in cybersecurity and its challenges to society. International Journal of Scientific & Engineering Research, 3(6), 1-4. Retrieved from https://www.ijser.org/researchpaper/Study-of-Latest-Emerging-Trends-on-Cyber-Security-and-its-challenges-to-Society.pdf
Many times, people usually wait for a cybercrime incident to occur for them to start paying attention to cybersecurity. This af...
Cite this page
Annotated Bibliography on Cybersecurity. (2022, Mar 03). Retrieved from https://proessays.net/essays/annotated-bibliography-on-cybersecurity
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Roots of Conflict in Northern Ireland Essay and Cybersecurity Case Study
- Factors to Consider When Adopting an E-portfolio Assessment Paper Example
- Essay Example on Data Center Risks: Identifying & Mitigating Negative Effects
- Paper Example on Essential Role of Information in Clarifying Existing Problems
- Essay on Working Remotely: The Future of Job Market in the Digital Ag
- Life Without the Internet: A Boring Existence? - Essay Sample
- Wireless Local Area Network: Improving the Value of IT in Daily Lives - Essay Example