Nothing Special   »   [go: up one dir, main page]

Skip to main content

Threat Landscape

  • Chapter
  • First Online:
Securing an Enterprise
  • 58 Accesses

Abstract

With the progressive development of the digital landscape, threats are continually evolving, leading to several challenges in technological applications. Threats have developed based on their capacity to affect cyber systems, necessitating understanding the threats and providing remarkable steps to mitigate and prevent them reasonably.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 37.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, “Phishing attacks: A recent comprehensive study and a new anatomy,” Frontiers in Computer Science, vol. 3, p. 563060, 2021.

    Google Scholar 

  2. R. Alabdan, “Phishing attacks survey: Types, vectors, and technical approaches,” Future Internet, vol. 12, no. 10, p. 168, 2020.

    Google Scholar 

  3. K. Chetioui, B. Bah, A. O. Alami, and A. Bahnasse, “Overview of social engineering attacks on social networks,” Procedia Computer Science, vol. 198, pp. 656–661, 2022.

    Google Scholar 

  4. H. Oz, A. Aris, A. Levi, and A. S. Uluagac, “A survey on ransomware: Evolution, taxonomy, and defense solutions,” ACM Computing Surveys (CSUR), vol. 54, no. 11s, pp. 1–37, 2022.

    Google Scholar 

  5. H. Owen, J. Zarrin, and S. M. Pour, “A survey on botnets, issues, threats, methods, detection and prevention,” Journal of Cybersecurity and Privacy, vol. 2, no. 1, pp. 74–88, 2022.

    Google Scholar 

  6. D. Ghelani, “Cyber security, cyber threats, implications and future perspectives: A review,” Authorea Preprints, 2022.

    Google Scholar 

  7. B. Guembe, A. Azeta, S. Misra, V. C. Osamor, L. Fernandez-Sanz, and V. Pospelova, “The emerging threat of AI-driven cyber attacks: A review,” Applied Artificial Intelligence, vol. 36, no. 1, p. 2037254, 2022.

    Google Scholar 

  8. N. Kaloudi and J. Li, “The AI-based cyber threat landscape: A survey,” ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1–34, 2020.

    Google Scholar 

  9. H. Riggs et al., “Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure,” Sensors, vol. 23, no. 8, p. 4060, 2023.

    Google Scholar 

  10. M. Ahsan, K. E. Nygard, R. Gomes, M. M. Chowdhury, N. Rifat, and J. F. Connolly, “Cybersecurity threats and their mitigation approaches using machine learning—A review,” Journal of Cybersecurity and Privacy, vol. 2, no. 3, pp. 527–555, 2022.

    Google Scholar 

  11. S. Chng, H. Y. Lu, A. Kumar, and D. Yau, “Hacker types, motivations and strategies: A comprehensive framework,” Computers in Human Behavior Reports, vol. 5, p. 100167, 2022.

    Google Scholar 

  12. G. M. Chiong, “The rise of ransomware: Motivations, contributing factors, and defenses,” Ph.D. dissertation, Utica University, 2023.

    Google Scholar 

  13. N. Brubaker, D. K. Zafra, K. Lunden, K. Proska, and C. Hildebrandt, “Financially motivated actors are expanding access into OT: Analysis of kill lists that include OT processes used with seven malware families,” 2020.

    Google Scholar 

  14. L. Burita and D. T. Le, “Cyber security and APT groups,” in 2021 Communication and Information Technologies (KIT), 2021, pp. 1–7.

    Google Scholar 

  15. T. Miller, A. Staves, S. Maesschalck, M. Sturdee, and B. Green, “Looking back to look forward: Lessons learned from cyber-attacks on industrial control systems,” International Journal of Critical Infrastructure Protection, vol. 35, p. 100464, 2021.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 Saurav Bhattacharya

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Khanna, A. (2024). Threat Landscape. In: Securing an Enterprise . Apress, Berkeley, CA. https://doi.org/10.1007/979-8-8688-1029-9_2

Download citation

Publish with us

Policies and ethics