Abstract
With the progressive development of the digital landscape, threats are continually evolving, leading to several challenges in technological applications. Threats have developed based on their capacity to affect cyber systems, necessitating understanding the threats and providing remarkable steps to mitigate and prevent them reasonably.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, “Phishing attacks: A recent comprehensive study and a new anatomy,” Frontiers in Computer Science, vol. 3, p. 563060, 2021.
R. Alabdan, “Phishing attacks survey: Types, vectors, and technical approaches,” Future Internet, vol. 12, no. 10, p. 168, 2020.
K. Chetioui, B. Bah, A. O. Alami, and A. Bahnasse, “Overview of social engineering attacks on social networks,” Procedia Computer Science, vol. 198, pp. 656–661, 2022.
H. Oz, A. Aris, A. Levi, and A. S. Uluagac, “A survey on ransomware: Evolution, taxonomy, and defense solutions,” ACM Computing Surveys (CSUR), vol. 54, no. 11s, pp. 1–37, 2022.
H. Owen, J. Zarrin, and S. M. Pour, “A survey on botnets, issues, threats, methods, detection and prevention,” Journal of Cybersecurity and Privacy, vol. 2, no. 1, pp. 74–88, 2022.
D. Ghelani, “Cyber security, cyber threats, implications and future perspectives: A review,” Authorea Preprints, 2022.
B. Guembe, A. Azeta, S. Misra, V. C. Osamor, L. Fernandez-Sanz, and V. Pospelova, “The emerging threat of AI-driven cyber attacks: A review,” Applied Artificial Intelligence, vol. 36, no. 1, p. 2037254, 2022.
N. Kaloudi and J. Li, “The AI-based cyber threat landscape: A survey,” ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1–34, 2020.
H. Riggs et al., “Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure,” Sensors, vol. 23, no. 8, p. 4060, 2023.
M. Ahsan, K. E. Nygard, R. Gomes, M. M. Chowdhury, N. Rifat, and J. F. Connolly, “Cybersecurity threats and their mitigation approaches using machine learning—A review,” Journal of Cybersecurity and Privacy, vol. 2, no. 3, pp. 527–555, 2022.
S. Chng, H. Y. Lu, A. Kumar, and D. Yau, “Hacker types, motivations and strategies: A comprehensive framework,” Computers in Human Behavior Reports, vol. 5, p. 100167, 2022.
G. M. Chiong, “The rise of ransomware: Motivations, contributing factors, and defenses,” Ph.D. dissertation, Utica University, 2023.
N. Brubaker, D. K. Zafra, K. Lunden, K. Proska, and C. Hildebrandt, “Financially motivated actors are expanding access into OT: Analysis of kill lists that include OT processes used with seven malware families,” 2020.
L. Burita and D. T. Le, “Cyber security and APT groups,” in 2021 Communication and Information Technologies (KIT), 2021, pp. 1–7.
T. Miller, A. Staves, S. Maesschalck, M. Sturdee, and B. Green, “Looking back to look forward: Lessons learned from cyber-attacks on industrial control systems,” International Journal of Critical Infrastructure Protection, vol. 35, p. 100464, 2021.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2024 Saurav Bhattacharya
About this chapter
Cite this chapter
Khanna, A. (2024). Threat Landscape. In: Securing an Enterprise . Apress, Berkeley, CA. https://doi.org/10.1007/979-8-8688-1029-9_2
Download citation
DOI: https://doi.org/10.1007/979-8-8688-1029-9_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 979-8-8688-1028-2
Online ISBN: 979-8-8688-1029-9
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)