ABSTRACT
The information security problems include a wide range of possible threats that affect almost every aspect of human life. This article makes a survey about the trends of the latest problems in cybersecurity reviewing the security reports issued by some major information security companies. These problems are not static, nor equally distributed. Some of them have more significant impact than others in a specific time but at the next period the situation is changed. The purpose of this paper is to summarize the existing trends in the cyberspace security and to point out the future research tasks in the area.
- Internet Organised Crime Threat Assessment (IOCTA) Report 2018, Europol, 26.Google Scholar
- Threat Taxonomy, European Union Agency for Network and Information Security, 2016.Google Scholar
- KSN Report: Ransomware and malicious cryptominers 2016-2018, Kaspersky Security Network.Google Scholar
- Crist, Justin. Web Based Attacks, SANS Institute, 2007.Google Scholar
- Cybersecurity threatscape Q4 2018, Positive Technologies.Google Scholar
- Threat Landscape Report 2018, European Union Agency for Network and Information Security, 2019.Google Scholar
- 'Ransomware, botnets, and other malware insights', 2018 Data Breach Investigations Report, Verizon, 2018.Google Scholar
- "Global Overview. 2018 Cost of a Data Breach Study: Benchmark research", Ponemon Institute LLC.Google Scholar
- ENISA's Hardware Threat Landscape and Good Practice Guide, 2017, https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2017, accessed March 2019.Google Scholar
- Internet Security Threat Report, volume 23, Symantec, 2018.Google Scholar
- R. Alguliyev et al., Cyber-physical systems and their security issues, Computers in Industry, Volume 100, 2018, 212--223, ISSN 0166-3615.Google ScholarCross Ref
- Leandros A. Maglaras, et al. Cyber security of critical infrastructures, ICT Express, Volume 4, Issue 1, 2018, 42--45, ISSN 2405-9595.Google ScholarCross Ref
- "Cyber Operations Tracker", Council on Foreign Relations, https://www.cfr.org/interactive/cyber-operations, accessed March 2019.Google Scholar
- "LoJax - First UEFI rootkit found in the wild, courtesy of the Sednit group", ESET Research White papers, 2018.Google Scholar
- IBM X-Force Threat Intelligence Index 2019, 12.Google Scholar
- AV-TEST Institute, Statistics, https://www.av-test.org/en/statistics/malware/, accessed March 2019.Google Scholar
- Threat Predictions for 2019, Kaspersky Security Bulletin.Google Scholar
- Internet Security Threat Report, volume 24, Symantec, 2019.Google Scholar
- The criminal cyberservices market 2018, Positive Technologies.Google Scholar
- Global Threat Intelligence Report, NTT Security, 2018.Google Scholar
- "State of the Internet - Security: Web Attacks", Akamai, summer 2018.Google Scholar
- NETSCOUT Arbor's 14th Annual Worldwide Infrastructure Security Report, 2019. https://www.netscout.com/report/, accessed March 2019.Google Scholar
- NourheneEllouze, et al. Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform, Journal of Network and Computer Applications, Volume 107, 2018, 1--21, ISSN 1084-8045.Google ScholarCross Ref
- Story of the year: miners, Report.Kaspersky Security Bulletin, 2018.Google Scholar
- McAfee Labs Threats Report, September 2018.Google Scholar
- Rountree. Derrick, Security for Microsoft Windows System Administrators, Syngress, 2011, 71--107, ISBN 9781597495943.Google Scholar
- Tracking the People Behind Botnets: A List of Top 20 IoTBlackhat Hackers, NewSky Security, 30 October 2018.Google Scholar
- State of the Internet - Security: Credential Stuffing Attacks, Akamai, volume 4, issue 4, 2018.Google Scholar
- APT Report - Operation ShadowHammer, SecureList, March 2019.Google Scholar
- Cyber Threatscape Report 2018, Accenture Security.Google Scholar
- Machine-Learning Era In Cybersecurity - A Step Towards A Safer World Or The Brink Of Chaos?, White Paper ESET, 2019.Google Scholar
- Public hacker test on Swiss Post's e-voting system, 07.02.2019, accessed March 2019. https://www.evoting-blog.ch/en/pages/2019/public-hacker-test-on-swiss-post-s-e-voting-systemGoogle Scholar
- Discontinuation of Coinhive, https://coinhive.com/blog/en/discontinuation-of-coinhive, accessed March 2019.Google Scholar
Index Terms
- Trends Review of the Contemporary Security Problems in the Cyberspace
Recommendations
Ransomware threat success factors, taxonomy, and countermeasures
The paper surveys state-of-the-art studies on ransomware analysis, detection, and prediction.The work describes the enabling technologies and factors that contribute to successful ransomware attacks.The paper proposes a general taxonomy for the ...
Ransomware early detection: A survey
AbstractIn recent years, ransomware attacks have exploded globally, and it has become one of the most significant cyber threats to digital infrastructure. Such attacks have been targeting ranging from individuals to critical infrastructure or large ...
IoT Security: Ongoing Challenges and Research Opportunities
SOCA '14: Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and ApplicationsThe Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private information, preserving information ...
Comments