Cybersecurity: Protecting Networks, Systems, and Data from Cyberattacks
Main Article Content
Abstract
The prevalence of cyber risks presents an ever-increasing threat to the security of networks, systems, and sensitive data in an era where digital connectivity rules. This study explores the complex field of cybersecurity with the goal of offering a thorough grasp of the tactics used to defend against cyberattacks.
The first section of the study examines the historical background of cybersecurity, showing how it developed from simple computer security measures to the complex array of modern threats. The focus is on describing the wide range of cyberthreats, such as ransomware, phishing, and malware, and illustrating how they appear and what happens in the real world. A large amount of research is devoted to analyzing the vulnerabilities present in operating systems, networks, and data storage, providing insight into the complex interactions between technological flaws and human variables. The paper explores the role of human error as a crucial trigger for cybersecurity breaches in addition to clarifying the various attack surfaces.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
References
Anderson, R., & Moore, T. (2009). Information security economics—and beyond. In T. M. Moore (Ed.),
Economics of Information Security (Vol. 1, pp. 187-198). Springer.
Clarke, R., & Knake, R. K. (2010). Cyber war: The next threat to national security and what to do about it.
HarperCollins..
Disterer, G. (2012). Cyber security and the politics of time. In Proceedings of the 2012 European Conference
on Information Warfare and Security (pp. 71-79). Academic Conferences International Limited.
Eren, S., & Batur, D. (2017). Cybersecurity challenges in critical infrastructure protection. In Advances in
Information Security, Privacy, & Ethics (pp. 19-43). IGI Global.
Goodman, S. E. (Ed.). (2015). The dynamics of cyberspace: Understanding complex and unpredictable
behavior. Oxford University Press.
Herold, R. V. (2016). Data privacy for the smart grid. Springer.
Kizza, J. M. (2015). Guide to computer network security (3rd ed.). Springer.
Landwehr, C. E., & Bull, J. M. (2012). Cyber security: A critical review of several key issues. In Proceedings
of the 45th Hawaii International Conference on System Sciences (pp. 1032-1041). IEEE.
NIST. (2018). Framework for improving critical infrastructure cybersecurity. National Institute of Standards
and Technology. https://www.nist.gov/cyberframework.
Ozdemir, Z. D. (2017). Cybersecurity in smart grid communication networks. In Security and Privacy in
Communication Networks (pp. 199-224). Springer.
Ransbotham, S., Kiron, D., & Prentice, P. (2015). Beyond the hype: The hard work behind analytics success.
MIT Sloan Management Review, 56(4), 1-31.
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.
W. Norton & Company..
Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford
University Press.
World Economic Forum. (2018). "Digital Transformation Initiative: Unlocking $100 Trillion for Business
and Society from Digital Transformation."
Whitman, M. E., & Mattord, H. J. (2018). Management of Information Security (6th ed.). Cengage Learning.
R. K. Kaushik Anjali and D. Sharma, "Analyzing the Effect of Partial Shading on Performance of Grid
Connected Solar PV System", 2018 3rd International Conference and Workshops on Recent Advances and
Innovations in Engineering (ICRAIE), pp. 1-4, 2018.