skip to main content
10.1145/3351556.3351560acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbciConference Proceedingsconference-collections
short-paper

Trends Review of the Contemporary Security Problems in the Cyberspace

Published:26 September 2019Publication History

ABSTRACT

The information security problems include a wide range of possible threats that affect almost every aspect of human life. This article makes a survey about the trends of the latest problems in cybersecurity reviewing the security reports issued by some major information security companies. These problems are not static, nor equally distributed. Some of them have more significant impact than others in a specific time but at the next period the situation is changed. The purpose of this paper is to summarize the existing trends in the cyberspace security and to point out the future research tasks in the area.

References

  1. Internet Organised Crime Threat Assessment (IOCTA) Report 2018, Europol, 26.Google ScholarGoogle Scholar
  2. Threat Taxonomy, European Union Agency for Network and Information Security, 2016.Google ScholarGoogle Scholar
  3. KSN Report: Ransomware and malicious cryptominers 2016-2018, Kaspersky Security Network.Google ScholarGoogle Scholar
  4. Crist, Justin. Web Based Attacks, SANS Institute, 2007.Google ScholarGoogle Scholar
  5. Cybersecurity threatscape Q4 2018, Positive Technologies.Google ScholarGoogle Scholar
  6. Threat Landscape Report 2018, European Union Agency for Network and Information Security, 2019.Google ScholarGoogle Scholar
  7. 'Ransomware, botnets, and other malware insights', 2018 Data Breach Investigations Report, Verizon, 2018.Google ScholarGoogle Scholar
  8. "Global Overview. 2018 Cost of a Data Breach Study: Benchmark research", Ponemon Institute LLC.Google ScholarGoogle Scholar
  9. ENISA's Hardware Threat Landscape and Good Practice Guide, 2017, https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2017, accessed March 2019.Google ScholarGoogle Scholar
  10. Internet Security Threat Report, volume 23, Symantec, 2018.Google ScholarGoogle Scholar
  11. R. Alguliyev et al., Cyber-physical systems and their security issues, Computers in Industry, Volume 100, 2018, 212--223, ISSN 0166-3615.Google ScholarGoogle ScholarCross RefCross Ref
  12. Leandros A. Maglaras, et al. Cyber security of critical infrastructures, ICT Express, Volume 4, Issue 1, 2018, 42--45, ISSN 2405-9595.Google ScholarGoogle ScholarCross RefCross Ref
  13. "Cyber Operations Tracker", Council on Foreign Relations, https://www.cfr.org/interactive/cyber-operations, accessed March 2019.Google ScholarGoogle Scholar
  14. "LoJax - First UEFI rootkit found in the wild, courtesy of the Sednit group", ESET Research White papers, 2018.Google ScholarGoogle Scholar
  15. IBM X-Force Threat Intelligence Index 2019, 12.Google ScholarGoogle Scholar
  16. AV-TEST Institute, Statistics, https://www.av-test.org/en/statistics/malware/, accessed March 2019.Google ScholarGoogle Scholar
  17. Threat Predictions for 2019, Kaspersky Security Bulletin.Google ScholarGoogle Scholar
  18. Internet Security Threat Report, volume 24, Symantec, 2019.Google ScholarGoogle Scholar
  19. The criminal cyberservices market 2018, Positive Technologies.Google ScholarGoogle Scholar
  20. Global Threat Intelligence Report, NTT Security, 2018.Google ScholarGoogle Scholar
  21. "State of the Internet - Security: Web Attacks", Akamai, summer 2018.Google ScholarGoogle Scholar
  22. NETSCOUT Arbor's 14th Annual Worldwide Infrastructure Security Report, 2019. https://www.netscout.com/report/, accessed March 2019.Google ScholarGoogle Scholar
  23. NourheneEllouze, et al. Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform, Journal of Network and Computer Applications, Volume 107, 2018, 1--21, ISSN 1084-8045.Google ScholarGoogle ScholarCross RefCross Ref
  24. Story of the year: miners, Report.Kaspersky Security Bulletin, 2018.Google ScholarGoogle Scholar
  25. McAfee Labs Threats Report, September 2018.Google ScholarGoogle Scholar
  26. Rountree. Derrick, Security for Microsoft Windows System Administrators, Syngress, 2011, 71--107, ISBN 9781597495943.Google ScholarGoogle Scholar
  27. Tracking the People Behind Botnets: A List of Top 20 IoTBlackhat Hackers, NewSky Security, 30 October 2018.Google ScholarGoogle Scholar
  28. State of the Internet - Security: Credential Stuffing Attacks, Akamai, volume 4, issue 4, 2018.Google ScholarGoogle Scholar
  29. APT Report - Operation ShadowHammer, SecureList, March 2019.Google ScholarGoogle Scholar
  30. Cyber Threatscape Report 2018, Accenture Security.Google ScholarGoogle Scholar
  31. Machine-Learning Era In Cybersecurity - A Step Towards A Safer World Or The Brink Of Chaos?, White Paper ESET, 2019.Google ScholarGoogle Scholar
  32. Public hacker test on Swiss Post's e-voting system, 07.02.2019, accessed March 2019. https://www.evoting-blog.ch/en/pages/2019/public-hacker-test-on-swiss-post-s-e-voting-systemGoogle ScholarGoogle Scholar
  33. Discontinuation of Coinhive, https://coinhive.com/blog/en/discontinuation-of-coinhive, accessed March 2019.Google ScholarGoogle Scholar

Index Terms

  1. Trends Review of the Contemporary Security Problems in the Cyberspace

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        BCI'19: Proceedings of the 9th Balkan Conference on Informatics
        September 2019
        225 pages

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 September 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Acceptance Rates

        BCI'19 Paper Acceptance Rate24of73submissions,33%Overall Acceptance Rate97of250submissions,39%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader