SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1170
Latest Cybersecurity Trends
Kajal Kadam1, Aliya Shaikh2, Asst.Prof. P.S.Gade3
1Kajal Kadam, YTC, Satara, Maharastra India
2Aliya Shaikh, YTC, Satara Maharastra India
3Asst.Prof.P.S.Gade,YTC, Satara, Maharastra India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The likelihood of a security breach has never
been higher due to the variety of new threats that are
developing from both inside and outside your network. The
combination of all these risk variables with a significant
human component presupposes that everything has been set
up and configured correctly to get the best results possible
from each security instrument. In order to address this issue,
organisations often spend more money on security controls,
which increases management visibility and makesiteasierfor
team like Security operation to see better results and provide
good return on investment.
The author covers the current trends in
cybersecurity in this research report. Investigations have also
focused on cybersecurity trends advantages and potential
growth. The conceptual analysis of trends as a whole in the
research has also given consideration to future evolution.
Key Words: Cyber Security, Data, Attacks, Threats,
Cryptocurrency, Breach
1. INTRODUCTION
The cyber security domain growing faster as
both offensive and defensive security service providers
compete to outwit one another. Technology is constantly
developing and improving, and new threats and creative
solutions to combat them are constantly emerging. As more
people started working from home recently due to the
pandemic, fraudsters discovered new techniques, tactics,
and strategies to take over networks and steal data in order
to exact a ransom.
The newest developments in cyber security are
discussed in this overview.
2. CYBER SECURITY TRENDS
2.1 Machine Learning
Although it is one of the newest technologies in
cybersecurity, machine learningisplayinga biggerandmore
proactive role. One of the reasons is that machine learning
makes cybersecurity easier, more efficient, and less
expensive (ML). This system builds patterns and
manipulates them, anticipating and responding to active
attacks in real-time using sophisticated algorithms that are
based on complex data. To put it another way, applying ML
to cybersecurity systems helps them to assess threat
patterns and learn the habits of hackers, assisting in the
prevention of future attacks and decreasing the amount of
time cybersecurity experts must dedicate to repetitive
operations.
ML makes cybersecurity easier to use, more
efficient, and more affordableall atonce.MLcreatespatterns
and uses algorithms to alter them froma complexsetofdata.
It can therefore anticipate dangers in real time and respond
to them accordingly. In order to create efficient algorithms,
this technology primarily depends on complexandrichdata.
The information must come from everywhere and must
cover as many probable outcomes as is practical. In order to
assess attack trends and learn hackers'tactics,cybersecurity
systems can now use machine learning (ML)
2.2. Artificial Intelligence (AI)
It is impossible for human beingtooperatelarge
number of cyber security threats. As a result, organisations
are increasingly turning to AI and ML to hone their security
infrastructure. Al has played a key role in developing
automatic threat detection, face recognition, natural
language processing, and security automation systems. Al
also enables the much quicker analysis of enormous
amounts of danger data. This is advantageous for both huge
enterprises dealing with massive amounts of data and small
or mid-sized businesses with sometimes under-resourced
security teams. While Al has enormous potential for
businesses to detect threats more thoroughly, thieves are
also leveraging the technology to automate their attacks by
using model-stealing and data-poisoning methods.
2.3 Need of Multi-Factor Authentication
Password protection is no longer enough due to the
sophistication of modern cyberattacks. Compared to a basic
password, a multi-factor authentication(MFA)ismuchmore
secure. By simply adding an additional layer of security,
multi-factor authentication helps to prevent illegal accessto
online accounts. MFA makes sure that businesses can better
safeguard employee data and manage access. Every time
someone signs in, they must additionally provide a
verification code that is sent to their registered phone
number or through an authenticator app. The "gold
standard" of authentication is multi-factor authentication
(MFA).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1171
In order to solve this problem, organisations will
increasingly use on application-based MFA tools like
Microsoft Authenticator, Google Authenticator, One Span
Authenticator, and others. Despite this, because SMS and
voice MFAs are not end-to-end encrypted, they are still
susceptible to attacks. Microsoft also suggested their
customers to use app-based authenticator with the keys
instead of phone-based authenticator. Despite this SMS and
voice MFA continue to be vulnerable as these channels are
not encrypted.
2.4 Rise of Ransomware
Even though ransomware has been a threat for over 20
years, it is still becoming worse. The frequency of
ransomware cyberattacks is consideredtohavesignificantly
grown now a days. In this cyberattack attacker finds access
to the sensitive data of a person, a group, or a organization
and then encrypt it so they cannot access it. They then
convey a threat to reveal personal information if a ransomis
not paid, which is typically made in bitcoin.
The burden of this cyber threat is significant given the
sensitive data at stake as well economic impact ofpayingthe
Ransome. Remote working and the growing digitization of
many enterprises have given ransomware new targets.
As the number of attacks is increased, the quantity of
Ransome paid is also increased. Most of the time, hackers
demand such payments in obscure cryptocurrency.
5. Breach and Attack Simulation (BAS)
In the last two decades, cyberattacks have
undergone a significant evolution in terms of their
capabilities, reach, consequences, and variety of targets.
Cybercrime is causing record-breaking losses worldwide,
and it appears that this trend will continue. Security
managers and executives are aiming to improve their
company's security posture because of the increaseddanger
of attacks. BAS technologies are described as technology
"that enable enterprises to continuously and consistently
simulate the full attack cycle against enterprise
infrastructure, using software agents, virtual machines, and
other means, including insider threats, lateral movement,
and data exfiltration."
The uniqueness ofBASresidesinitscapabilityto
deliver consistent and reliable simulation assessment with
minimal risk, as well as its use in warning IT and business
stakeholders about existing security posture gaps or
confirming that security infrastructure, configuration
settings, and detection technologies are functioning as
intended. When utilised in addition to red team or
penetration testing assessment, BAS can help validate to
identify whether security operations and the SOC staff can
detect certain cyberattacks.
2.6. Cloud Security
More and more businesses are moving to the
cloud as a result of the significant benefits it provides. To
combat online criminals, a cutting-edge predictive security
model must be used if the cloud is to be secure. Attacks on
cloud services have grown over the past ten years, making
them a risky way to store or transfer sensitive data. Secure
encryption, authentication, and audit logging are not
typically provided by cloud services. Others do not properly
separate user data from that of other cloud tenants who
share the same space. Security experts believe that cloud
security needs to be strengthened as a result.
Threats can now be detected by predictive
security before an attacker even makes a move. It has the
ability to identify attacks that get past other endpoint
security. In order to strengthen security, businesses are
implementing predictive security clouds, and some
industries have also turned to multi-factor authentication.
Although cloud computing has many advantages, including
cost-effectiveness, scalability, and efficiency, it also has
drawbacks that cannot be avoided. They are a top target for
attackers as well. Insecure interfaces,accounttheft,anddata
breaches are all frequently brought on by improperly
configured cloud settings.
2.7 IOT
The Internet of Things (loT) has completely
changed the way we interact with devices. Despite some
security issues with loT devices, which are common, most
consumers have a high level of confidence in them. loT
devices are currently dominating the consumer markets.
Smart gadgets, air conditioning with built-in intelligence,
wearable fitness trackers, and voice assistants like Google
Home and Amazon Echo are a few examples of loT devices.
Despite the fact that loTprovidemoreconvenience,theyalso
pose greater risks to a user's data. In the event that a device
is compromised or taken over, it could essentially act as a
listening device and steal data from the network.
3. ADVANTAGES
Hackers have discovered a new entry point for
information and are making the most of it. To gain access to
security systems, for instance, hackers frequentlyattemptto
hack into connected camera networks or devices. If proper
security measures aren't taken, the network is also exposed
to software bugs or vulnerabilities by the communication
protocols used to connect with various devices, increasing
the possibility of outbreaks.
 Unauthorized access to data and network is
protected.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1172
 Early detection of threats and vulnerabilities.
 Protection from cyber-attacks/breaches.
4. CONCLUSION
With new and complex risks emerging every day, the
cyberworld is continually evolving. Although most people
think they are protectedfromcyberthreats,almosteveryone
is actually vulnerable. There are always new strategies to
defend your firm against these threats as new trends
emerge. Keeping an eye out for any new cybersecurity
trends you can ensure the security of your organisation.
There are numerous new trends that you need carefully
investigate in order to choose the one that best suits your
demands.
REFERENCES
 CISSP: Certified Information Systems Security
Professional Study Guide (Sybex)
 Isc2 Cissp Certified Information Systems Security
Professional Official Study Guide

Weitere ähnliche Inhalte

Ähnlich wie Latest Cybersecurity Trends

Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 

Ähnlich wie Latest Cybersecurity Trends (20)

5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
Be wp cybersmart_buildings
Be wp cybersmart_buildingsBe wp cybersmart_buildings
Be wp cybersmart_buildings
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
 
Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 

Latest Cybersecurity Trends

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1170 Latest Cybersecurity Trends Kajal Kadam1, Aliya Shaikh2, Asst.Prof. P.S.Gade3 1Kajal Kadam, YTC, Satara, Maharastra India 2Aliya Shaikh, YTC, Satara Maharastra India 3Asst.Prof.P.S.Gade,YTC, Satara, Maharastra India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The likelihood of a security breach has never been higher due to the variety of new threats that are developing from both inside and outside your network. The combination of all these risk variables with a significant human component presupposes that everything has been set up and configured correctly to get the best results possible from each security instrument. In order to address this issue, organisations often spend more money on security controls, which increases management visibility and makesiteasierfor team like Security operation to see better results and provide good return on investment. The author covers the current trends in cybersecurity in this research report. Investigations have also focused on cybersecurity trends advantages and potential growth. The conceptual analysis of trends as a whole in the research has also given consideration to future evolution. Key Words: Cyber Security, Data, Attacks, Threats, Cryptocurrency, Breach 1. INTRODUCTION The cyber security domain growing faster as both offensive and defensive security service providers compete to outwit one another. Technology is constantly developing and improving, and new threats and creative solutions to combat them are constantly emerging. As more people started working from home recently due to the pandemic, fraudsters discovered new techniques, tactics, and strategies to take over networks and steal data in order to exact a ransom. The newest developments in cyber security are discussed in this overview. 2. CYBER SECURITY TRENDS 2.1 Machine Learning Although it is one of the newest technologies in cybersecurity, machine learningisplayinga biggerandmore proactive role. One of the reasons is that machine learning makes cybersecurity easier, more efficient, and less expensive (ML). This system builds patterns and manipulates them, anticipating and responding to active attacks in real-time using sophisticated algorithms that are based on complex data. To put it another way, applying ML to cybersecurity systems helps them to assess threat patterns and learn the habits of hackers, assisting in the prevention of future attacks and decreasing the amount of time cybersecurity experts must dedicate to repetitive operations. ML makes cybersecurity easier to use, more efficient, and more affordableall atonce.MLcreatespatterns and uses algorithms to alter them froma complexsetofdata. It can therefore anticipate dangers in real time and respond to them accordingly. In order to create efficient algorithms, this technology primarily depends on complexandrichdata. The information must come from everywhere and must cover as many probable outcomes as is practical. In order to assess attack trends and learn hackers'tactics,cybersecurity systems can now use machine learning (ML) 2.2. Artificial Intelligence (AI) It is impossible for human beingtooperatelarge number of cyber security threats. As a result, organisations are increasingly turning to AI and ML to hone their security infrastructure. Al has played a key role in developing automatic threat detection, face recognition, natural language processing, and security automation systems. Al also enables the much quicker analysis of enormous amounts of danger data. This is advantageous for both huge enterprises dealing with massive amounts of data and small or mid-sized businesses with sometimes under-resourced security teams. While Al has enormous potential for businesses to detect threats more thoroughly, thieves are also leveraging the technology to automate their attacks by using model-stealing and data-poisoning methods. 2.3 Need of Multi-Factor Authentication Password protection is no longer enough due to the sophistication of modern cyberattacks. Compared to a basic password, a multi-factor authentication(MFA)ismuchmore secure. By simply adding an additional layer of security, multi-factor authentication helps to prevent illegal accessto online accounts. MFA makes sure that businesses can better safeguard employee data and manage access. Every time someone signs in, they must additionally provide a verification code that is sent to their registered phone number or through an authenticator app. The "gold standard" of authentication is multi-factor authentication (MFA).
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1171 In order to solve this problem, organisations will increasingly use on application-based MFA tools like Microsoft Authenticator, Google Authenticator, One Span Authenticator, and others. Despite this, because SMS and voice MFAs are not end-to-end encrypted, they are still susceptible to attacks. Microsoft also suggested their customers to use app-based authenticator with the keys instead of phone-based authenticator. Despite this SMS and voice MFA continue to be vulnerable as these channels are not encrypted. 2.4 Rise of Ransomware Even though ransomware has been a threat for over 20 years, it is still becoming worse. The frequency of ransomware cyberattacks is consideredtohavesignificantly grown now a days. In this cyberattack attacker finds access to the sensitive data of a person, a group, or a organization and then encrypt it so they cannot access it. They then convey a threat to reveal personal information if a ransomis not paid, which is typically made in bitcoin. The burden of this cyber threat is significant given the sensitive data at stake as well economic impact ofpayingthe Ransome. Remote working and the growing digitization of many enterprises have given ransomware new targets. As the number of attacks is increased, the quantity of Ransome paid is also increased. Most of the time, hackers demand such payments in obscure cryptocurrency. 5. Breach and Attack Simulation (BAS) In the last two decades, cyberattacks have undergone a significant evolution in terms of their capabilities, reach, consequences, and variety of targets. Cybercrime is causing record-breaking losses worldwide, and it appears that this trend will continue. Security managers and executives are aiming to improve their company's security posture because of the increaseddanger of attacks. BAS technologies are described as technology "that enable enterprises to continuously and consistently simulate the full attack cycle against enterprise infrastructure, using software agents, virtual machines, and other means, including insider threats, lateral movement, and data exfiltration." The uniqueness ofBASresidesinitscapabilityto deliver consistent and reliable simulation assessment with minimal risk, as well as its use in warning IT and business stakeholders about existing security posture gaps or confirming that security infrastructure, configuration settings, and detection technologies are functioning as intended. When utilised in addition to red team or penetration testing assessment, BAS can help validate to identify whether security operations and the SOC staff can detect certain cyberattacks. 2.6. Cloud Security More and more businesses are moving to the cloud as a result of the significant benefits it provides. To combat online criminals, a cutting-edge predictive security model must be used if the cloud is to be secure. Attacks on cloud services have grown over the past ten years, making them a risky way to store or transfer sensitive data. Secure encryption, authentication, and audit logging are not typically provided by cloud services. Others do not properly separate user data from that of other cloud tenants who share the same space. Security experts believe that cloud security needs to be strengthened as a result. Threats can now be detected by predictive security before an attacker even makes a move. It has the ability to identify attacks that get past other endpoint security. In order to strengthen security, businesses are implementing predictive security clouds, and some industries have also turned to multi-factor authentication. Although cloud computing has many advantages, including cost-effectiveness, scalability, and efficiency, it also has drawbacks that cannot be avoided. They are a top target for attackers as well. Insecure interfaces,accounttheft,anddata breaches are all frequently brought on by improperly configured cloud settings. 2.7 IOT The Internet of Things (loT) has completely changed the way we interact with devices. Despite some security issues with loT devices, which are common, most consumers have a high level of confidence in them. loT devices are currently dominating the consumer markets. Smart gadgets, air conditioning with built-in intelligence, wearable fitness trackers, and voice assistants like Google Home and Amazon Echo are a few examples of loT devices. Despite the fact that loTprovidemoreconvenience,theyalso pose greater risks to a user's data. In the event that a device is compromised or taken over, it could essentially act as a listening device and steal data from the network. 3. ADVANTAGES Hackers have discovered a new entry point for information and are making the most of it. To gain access to security systems, for instance, hackers frequentlyattemptto hack into connected camera networks or devices. If proper security measures aren't taken, the network is also exposed to software bugs or vulnerabilities by the communication protocols used to connect with various devices, increasing the possibility of outbreaks.  Unauthorized access to data and network is protected.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1172  Early detection of threats and vulnerabilities.  Protection from cyber-attacks/breaches. 4. CONCLUSION With new and complex risks emerging every day, the cyberworld is continually evolving. Although most people think they are protectedfromcyberthreats,almosteveryone is actually vulnerable. There are always new strategies to defend your firm against these threats as new trends emerge. Keeping an eye out for any new cybersecurity trends you can ensure the security of your organisation. There are numerous new trends that you need carefully investigate in order to choose the one that best suits your demands. REFERENCES  CISSP: Certified Information Systems Security Professional Study Guide (Sybex)  Isc2 Cissp Certified Information Systems Security Professional Official Study Guide