• E-ISSN 2583-6811
  • Follow us

Journal of Contemporary Politics

Article

Journal of Contemporary Politics

Year: 2024, Volume: 3, Issue: 4, Pages: 140-147

Original Article

Cyber Security in Cyberspace: Changing Trends in the Security Aspects of Cyberspace

Received Date:24 December 2024, Accepted Date:28 December 2024, Published Date:31 December 2024

Abstract

Cyberspace is increasingly vital in this new era of information and communication technology. With the advancement of the internet and related technologies, everything has been bought at a fingertip. In such a way, cyberspace has made progress. Even though there are so many factors that are making cyberspace the most valued innovation of the time, there are also so many issues related to this. The increasing number of cyber threats and attacks is the most important among them. Increasing cyber security concerns can be considered as the most important reason for these threats and issues. Related to the development of cyberspace, there are so many rules and regulations to cope with the threats, attacks, and other issues; all these laws seem to be insufficient to control the fundamental problem of cyber security, which is the root cause of all of the other concerns. These issues have been getting national or international importance when these aspects become a loophole for different kinds of attacks between countries by affecting the overall international peace. In such a way, in this new era, cyber security can influence global peace. In earlier days, the security was outside the cyber platform, which has been shifted to the cyber platform, creating adverse effects in society. In this aspect, the paper analyzes the changing dynamics of security in this new era and its impact. The paper primarily seeks help from secondary sources like articles, books, and journals. It tries to find solutions for the existing issues and suggests possible measures to tackle this concern.

Keywords

Cyberspace, Cybersecurity, Cyber Threat, Cyber-attacks, Cyber Laws

References

  1. Goodall JR, Lutters WG, Komlodi A. Developing expertise for network intrusion detectionInformation Technology & People2009;22(2):92108. Available from: http://dx.doi.org/10.1108/09593840910962186
  2. Cavelty MD. Cyber-Security. In: JPB., ed. The Routledge Handbook of New Security Studies. (pp. 154-162) London. Routledge. 2010.
  3. Craigen D, Diakun-Thibault N, Purse R. Defining CybersecurityTechnology Innovation Management Review2014;4(10):1321. Available from: http://timreview.ca/article/835
  4. Wiener N. Cybernetics: Or Control and Communication in the Animal and the Machine. Cambridge, MA. MIT University Press. 1948.
  5. Gibson W. Neuromancer. New York. Ace Books. 1982.
  6. Strate L. The Varieties of Cyberspace: Problems in Definition and DelimitationWestern Journal of Communication1999;63(3):382412. Available from: https://doi.org/10.1080/10570319909374648
  7. King Z, Henshel D, Flora L, Cains MG, Hoffman B, Sample C. Characterizing and measuring maliciousness for cybersecurity risk assessmentFrontiers in Psychology2018;9:119. Available from: https://doi.org/10.3389/fpsyg.2018.00039
  8. Weinberg D, et al. Internet of Things: Convenience vs. privacy and secrecyBusiness Horizons2015;58(6):615624. Available from: https://doi.org/10.1016/j.bushor.2015.06.005
  9. Holm E. The role of the refrigerator in identity crimeInternational Journal of Cyber-Security and Digital Forensics 2016;5(1):19. Available from: http://dx.doi.org/10.17781/P001974
  10. Arias O, Wrum J, Hoang K, Jin Y. Privacy and security in Internet of Things and wearable devicesIEEE Transactions on Multi-Scale Computing Systems2015;1(2):99109. Available from: https://doi.org/10.1109/TMSCS.2015.2498605
  11. Billingsley L, McKee SA. Cybersecurity in the Clinical Setting: Nurses' Role in the Expanding "Internet of Things" The Journal of Continuing Education in Nursing2016;47(8):347349. Available from: https://doi.org/10.3928/00220124-20160715-03
  12. Singh D, Mohanty NP, Swagatika S, Kumar S. Cyber-hygiene: The key Concept for Cyber Security in CyberspaceTest Engineering and Management2020;83:81458152. Available from: https://www.researchgate.net/publication/342069141_Cyber-hygiene_The_key_Concept_for_Cyber_Security_in_Cyberspace
  13. Ehrenfeld JM. WannaCry, Cybersecurity and Health Information Technology: A Time to ActJournal of Medical Systems2017;41(7):104. Available from: https://doi.org/10.1007/s10916-017-0752-1
  14. Joshi A. Study of Cybersecurity Laws and RegulationsIndian Journal of Law2024;2(3):714. Available from: https://doi.org/10.36676/ijl.v2.i3.27
  15. Al-Janabi S, Al-Shourbaji I. A Study of Cyber Security Awareness in Educational Environment in the Middle East. Journal of Information & Knowledge Management2016;15(01). Available from: https://dx.doi.org/10.1142/s0219649216500076

Copyright

© 2024 Published by Bangalore University. This is an open-access article under the CC BY license (https://creativecommons.org/licenses/by/4.0/

DON'T MISS OUT!

Subscribe now for latest articles and news.