JOURNAL ARTICLE

A Cumulation of the Cyber Security Vulnerabilities in Latest Technologies

Karan Chawla

Year: 2023 Journal:   International Journal of Science and Research (IJSR) Vol: 12 (2)Pages: 797-801

Abstract

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.It's also known as information technology security or electronic information security.Different kinds of cyber attacks include Malware, Ransomware, Distributed denial of service (DDoS) attacks, Spam and Phishing, Corporate Account Takeover (CATO), Automated Teller Machine (ATM) Cash Out.Cybersecurity is a must in the digital age.Millions of people's personal information may be exposed as a result of a single security breach. These violations have a negative financial impact on the businesses as well as a loss of client confidence. Therefore, it is crucial to have cyber security to shield both persons and businesses from spammers and online crooks. This paper reviews information about the latest methodologies used to defend against potential cyber attacks in the latest technologies, critiques the current methods and provides references for future works. The review paper is a cumulation of Artificial Intelligence based detection models for cybersecurity threat analysis for modern day systems. A systematic search was performed on various electronic databases (SCOPUS, Science Direct, IEEE Xplore, Web of Science, ACM, and MDPI). This Review paper discusses artificial intelligence based detection methods for cyber threat analysis for modern day systems which include, cloud computing, connected and automated vehicles (CAVs) which include CAN (Controller Area Network) Buses, Internet of Things (IOT), Fintech (Financial Technology), Vehicle to Infrastructure Applications. The drawbacks of the three technologies under review have been underlined in the conclusion and are further explained using particular statistics. Some of the problems mentioned include the lack of adequate testing done by the manufacturers when the software is deployed in the context of smart cities. There is little to no overlap in the methodologies utilized for any of the aforementioned technologies, such as gradient boost in CAVs, and each has its own literature. There aren't enough datasets and, consequently, detection algorithms because the majority of research only addresses theoretical difficulties.Finding methods to apply a methodology from system 1 to system 2 or vice versa is one strategy to improve efficiency or wiser development.

Keywords:
Computer security Computer science Business

Metrics

1
Cited By
0.62
FWCI (Field Weighted Citation Impact)
19
Refs
0.76
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Vulnerabilities and Cyber Security Technologies

Michael P. GallaherAlbert N. LinkBrent R. Rowe

Edward Elgar Publishing eBooks Year: 2008 Pages: 33-59
JOURNAL ARTICLE

Cyber Security Challenges with Latest Technologies

Aman KumarAnand PandeyAshutosh SangamManjot Kaur Bhatia

Journal:   International Journal for Research in Applied Science and Engineering Technology Year: 2022 Vol: 10 (12)Pages: 207-210
JOURNAL ARTICLE

Cyber Security Challenges and its Emerging Trends on Latest Technologies

K. M. RajasekharaiahChhaya S DuleE. C. G. Sudarshan

Journal:   IOP Conference Series Materials Science and Engineering Year: 2020 Vol: 981 (2)Pages: 022062-022062
© 2026 ScienceGate Book Chapters — All rights reserved.