Research Context and Aims: The swift expansion of internet technologies has rendered the digital network essential to contemporary life, highlighting the significance of cybersecurity. Network data not only encompasses personal information management and communication but also pertains to the protection of confidential corporate, governmental, and vital national infrastructures. Consequently, cybersecurity has become a critical issue in current society. Frequent occurrences like privacy violations, data thefts, and national security threats underline the critical need for enhanced network defenses and protective measures. Research Approach: This study examines the state of cybersecurity by assessing pertinent studies across public databases such as PubMed, CNKI, and CrossRef. It compiles and evaluates significant cybersecurity events including data breaches, malware attacks, and phishing, outlining key security challenges faced by networks. The paper also evaluates the current cybersecurity technologies and methods, pinpointing their effectiveness and limitations in addressing network threats. Research Findings: The findings reveal that cyber attackers have refined their methods, employing sophisticated, covert techniques for prolonged periods, which often outpace current defenses. In cases of data breaches, perpetrators frequently utilize precise social engineering or deploy advanced persistent threats (APTs). Additionally, the proliferation of IoT technology has not only obscured the boundaries of cybersecurity but also broadened potential attack vectors. Despite the implementation of security measures like encryption and multi-factor authentication, these can be compromised by managerial or operational oversights. Research Conclusions: With the cybersecurity landscape becoming increasingly challenging, future defenses will likely prioritize the adoption of integrated, proactive strategies. It is crucial to foster the development of smart security solutions, such as leveraging artificial intelligence to detect and respond to anomalies. Furthermore, boosting security awareness among users and ensuring standardized practices are imperative. Ultimately, formulating future cybersecurity policies will require a holistic approach, integrating technological, managerial, legal, and educational initiatives to forge a robust network defense architecture.
Published in | Internet of Things and Cloud Computing (Volume 12, Issue 1) |
DOI | 10.11648/j.iotcc.20241201.12 |
Page(s) | 10-16 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2024. Published by Science Publishing Group |
Encryption, Firewall, Vulnerability, Malware, Authentication, Intrusion Detection, Security Awareness Training, Cybersecurity
DDos | Distributed Denial of Service |
APT | Advanced Persistent Threats |
IDS | Intrusion Detection Systems |
MFA | Multi-Factor Authentication |
AI | Artificial Intelligence |
ML | Machine Learning |
[1] | Qi Pengyun. Research on National Defense Network Security and Data Governance [J]. Big Data, 2024, 10(03): 149-162. |
[2] | Cao Wensheng. Exploration of Network Security Management in Smart Campus of Higher Vocational Colleges—A Case Study of Guizhou Electronic Information Vocational and Technical College [J]. Western Quality Education, 2024, 10(09): 146-150. |
[3] | Jia Long. Current Situation and Protection Strategy of Hospital Network Security under Internet Medical Mode [C]//Metallurgical Industry Education Resources Development Center. Proceedings of the Fourth Steel Industry Digital Education and Training Seminar. Second People's Hospital of Kashgar Region; 2024: 3. |
[4] | Xiong Xin. Research on Computer Network Security Defense System Based on Big Data and Artificial Intelligence Technology [C]//China Cultural Information Association, Professional Committee for Exchange of Educational Achievements of China Cultural Information Association. Proceedings of the 2024 Cultural Information Development Forum. Naval Engineering University; 2024: 3. |
[5] | Xue Xiaoping. Theoretical Interpretation and Practical Approach of Ideological and Political Security Education in Ethnic Minority Colleges and Universities in the New Era [J]. Heilongjiang Education (Theory and Practice), 2024, (05): 40-44. |
[6] | Peng Lizhi, Hu Shiyuan, Zhang Jinting, et al. Reconstruction of Ecological Security Network in Central Urban Area Considering Ecological Service Value of Suburban Farmland [J/OL]. Acta Ecologica Sinica, 2024, (13): 1-15 [2024-05-28]. |
[7] | Li Zhiyi, Xiao Yong, Shen Shaowu. Analysis and Thinking on the Current Situation of Network Security Construction in Traditional Chinese Medicine Hospitals in Hubei Province [J]. Journal of Medical Informatics, 2024, 45(04): 91-96+102. |
[8] | Lü Lian, Xie Donggang. Automatic Detection of Communication Network Security Vulnerabilities Based on Weighted k-Nearest Neighbor [J]. Automation and Instrumentation, 2024, (04): 21-24+31. |
[9] | Yu Gaofeng, Li Dengfeng. Multi-Dimensional Preference Rating Method for Network Security Situation Awareness Considering Group Trust [J]. Control and Decision, 2024, 39(05): 1718-1726. |
[10] | Li Kuansheng, Li Jiadong, Zhang Xu, et al. Research on Hospital Network Security Closed-loop Management Mode under the Background of Smart Hospital Construction [J]. Modern Hospital Management, 2024, 22(02): 110-113. |
[11] | Zhang Guohong, Jiao Xiong. Method of Dynamic Early Warning of Confidential Information Security in Large-scale Communication Networks [J]. Computer Simulation, 2024, 41(04): 387-390+440. |
[12] | Long Yong. Research on Computer Teaching Method and Network Security Based on Project Teaching Method—Review of "Computer Teaching and Network Security Management" [J]. Applied Chemical Industry, 2024, 53(04): 1006. |
[13] | He Yinjie, Li Chenxin, Wei Chunxian. Research on Mine Network Security System Based on Boundary Isolation and System Protection [J]. Industrial Automation of Mining and Metallurgy, 2024, 50(03): 14-21. |
[14] | Huang Zhiyong, Lin Renming, Liu Hong, et al. Fusion Model of Multi-source Network Security Data Based on DS Evidence Theory [J]. Modern Electronics Technology, 2024, 47(07): 115-121. |
[15] | Ru Suyan. Characteristics, Risks, and Public Policy Choices of Artificial Intelligence Activities from the Perspective of Network Social Security [J]. Journal of Guangzhou Institute of Socialism, 2024, (01): 110-116. |
[16] | Zhao Dongmei, Sun Mingwei, Su Mengyue, et al. Network Security Situation Assessment Based on Improved SKNet-SVM [J]. Journal of Applied Sciences, 2024, 42(02): 334-349. |
[17] | Zhou Ruijue. Logic of Compensation for Loss of Network Security Loss Insurance and Determination of Insurance Liability [J]. Journal of Jinan University (Philosophy and Social Sciences Edition), 2024, 46(02): 149-164. |
[18] | Su Shan, Zhang Guanzhu, Li Guoxin, et al. Dynamic Identification Method of Network Information Transmission Security Threats Based on Greedy Iterative Algorithm [J]. Automation and Instrumentation, 2024, (03): 87-90+96. |
[19] | Du Yuhong, Hou Shouming. Risk Level Assessment Method of Optical Communication Network Security Based on Edge Computing [J]. Laser Journal, 2024, 45(03): 209-213. |
[20] | Li Jing. Architectural Design of Information Security System Based on Computer Technology [J]. Information Technology and Informatization, 2024, (03): 188-191. |
[21] | Wei Min. Research on Network Security Construction of Railway Communication Comprehensive Network Management System [J]. Railway Communication and Signal Engineering Technology, 2024, 21(03): 42-46+88. |
[22] | Zhang Aijun, Zong Yaning. Negative Bias of Communication: Identification and Disposal of Network Political Security Risks [J]. Journal of Harbin Institute of Technology (Social Sciences Edition), 2024, 26(02): 34-42. |
[23] | Gong Wenbo. Compliance Obligations for Network Platforms to Handle Personal Information and Paths to Crime [J]. Journal of East China University of Political Science and Law, 2024, 27(02): 52-66. |
[24] | Zhang Tingting, Wang Zhiqiang. Simulation of Network Security Situation Awareness Based on Backpropagation Algorithm [J]. Computer Simulation, 2024, 41(03): 436-440. |
[25] | Tang, Guangyan. Analysis of Network Security Measures for IP-based System Construction."Broadcasting & Television Information 31.03 (2024): 105-107. |
[26] | Ding, Zixuan, and Chen Guo. Internal Network Security Threat Detection Method Based on XGBoost Algorithm. Journal of Jilin University (Information Science Edition) 42.02 (2024): 366-371. |
[27] | Zhang, Yinghui. Analysis on Optimization Strategy of Enterprise Network Security Organization Management System. China Intelligent Transportation 2024.03 (2024): 28-30. |
[28] | Yang, Fan, Ding Zhi, Wang Yang, et al. Industrial Control Network Security Protection System Based on SDN and Ensemble Learning. Modern Electronics Technique 47.06 (2024): 22-26. |
[29] | Lu, Jie. Integrated Network Security Operation Solution Based on Universities. Jiangxi Communication Science & Technology 2024.01 (2024): 49-51. |
[30] | Chen, Gongping, and Wang Hong. Communication Network Security Situation Prediction Technology Based on Big Data Clustering. Journal of Huaiyin Normal University (Natural Science Edition) 23.01 (2024): 20-26. |
[31] | Zhou, Ruijue. Intervention Path of Cybersecurity Insurance in Data Leakage Risk Governance. Northern Methodology 18, no. 02 (2024): 76-90. |
[32] | Shi, Lingshan. Active Obligation, Criminalization, and Governance of Information Network Crime. Law Review 42, no. 02 (2024): 112-121. |
[33] | Chang, Zuguo. Construction of Security Protection System for Broadcasting and Television Networks in the Smart Radio and Television Field." Television Technology 48, no. 03 (2024): 180-182. |
[34] | Yan, Tanglin. "Design of Intelligent Broadcasting and Television Network Security Dispatching Early Warning Architecture Based on Situation Awareness Technology. Television Technology 48, no. 03 (2024): 189-192+205. |
[35] | Zhang, Shuo. Analysis of Criminal Protection of Network Data Security. Legal Review (2024), no. 06: 46-48. |
[36] | Chen, Lu, Hui Li, and Chang Liu. Research on Security Audit System of 5G-R Network Based on eBPF and ConvLSTM. Railway Standard Design 68, no. 04 (2024): 203-210. |
[37] | Hu, Chunhui, and Jianfeng Chen. Mechanism and Development Strategy of Frontiers of Network Security Technology. National Defense Science and Technology 45, no. 01 (2024): 87-93. |
[38] | Zeng, Xiaowan, Haijun Wang, Lei Huang, et al. Algorithm for Resource Allocation of Security Communication in UAV-Assisted D2D Communication Network. Journal of Communications 45, no. 02 (2024): 115-126. |
[39] | Zhang, Jia, Jian Han, and Jinyu Han. Situation Awareness of Laser Sensor Network Security under Logistic Regression Model. Laser Journal 45, no. 02 (2024): 174-180. |
[40] | Xiao, Zhenhuai. Challenges and Countermeasures of Network Data Security Protection in Smart Education Environment of Universities. Journal of Wuhan Shipbuilding College 23, no. 01 (2024): 7-11+23. |
[41] | Li, L. (2024). Instant Messaging Network Security Vulnerability Identification Method Based on Dependency Search Tree. Information Technology and Informatization, (02), 151-154. |
[42] | Yang, Y., Yang, Y., Shu, H., et al. (2024). Research on the Path of Network Security Education for College Students from the Perspective of Ideological and Political Education. China Educational Technology Equipment, (04), 21-23+30. |
[43] | Guo, M. (2024). Research on Key Technologies of Network Security for Medical Equipment Based on IEC TR 60601-4-5. Instrumentation Standardization and Metrology, (01), 1-4. |
[44] | Ran, X. (2024). Analysis of Computer Network Security Management and Maintenance Measures. Electronic Components and Information Technology, 8(02), 179-181+185. |
[45] | Cui, B., & Yang, L. (2024). Dissemination Strategy of Advocating International Norms in Cyberspace by Science and Technology Enterprises—Taking Microsoft's Practice of International Network Security Norms as an Example. Future Communication, 31(01), 9-20+124. |
[46] | Su, H., Liu, Y., Li, G., et al. (2024). Research on the Construction of Industrial Control System Network Security Protection System. Automation Instrumentation, 45(02), 111-115. |
[47] | Yang, D. (2024). Network Ideological Security in Colleges and Universities from the Perspective of Overall National Security Concept: Connotation, Methods, and Countermeasures. Party and Government Cadres Journal, (02), 42-49. |
[48] | Zhang, W. (2024). Analysis of Computer Network Security Issues and Countermeasures—Evaluation of Computer Network Security Experimental Guide. China Security Science Journal, 34(02), 250. |
[49] | Yang, Z., & Li, L. (2024). Research on the Security Development of Communication Network Technology in the New Era—Evaluation of Communication Network Security. China Security Science Journal, 34(02), 252. |
[50] | Wang, K., Yang, C., & Zhu, L. (2024). Research on Network Security Protection Strategy Based on Penetration Testing. Broadcasting & Television Information, 31(02), 106-110. |
[51] | Luo, K., & Xu, J. (2024). The Origin, Logic, and Path of Building a Community of Shared Future in Cyberspace Security. Modern Communication (Journal of Communication University of China), 46(02), 119-128. |
[52] | Qian, Z., & Zhu, T. (2024). Application of Big Data Technology in Computer Network Information Security Issues—Evaluation of Computer Network Information Security. Applied Chemical Industry, 53(02), 511. |
APA Style
Sun, X. (2024). The Current Status and Challenges of Cybersecurity Risks. Internet of Things and Cloud Computing, 12(1), 10-16. https://doi.org/10.11648/j.iotcc.20241201.12
ACS Style
Sun, X. The Current Status and Challenges of Cybersecurity Risks. Internet Things Cloud Comput. 2024, 12(1), 10-16. doi: 10.11648/j.iotcc.20241201.12
AMA Style
Sun X. The Current Status and Challenges of Cybersecurity Risks. Internet Things Cloud Comput. 2024;12(1):10-16. doi: 10.11648/j.iotcc.20241201.12
@article{10.11648/j.iotcc.20241201.12, author = {Xudong Sun}, title = {The Current Status and Challenges of Cybersecurity Risks }, journal = {Internet of Things and Cloud Computing}, volume = {12}, number = {1}, pages = {10-16}, doi = {10.11648/j.iotcc.20241201.12}, url = {https://doi.org/10.11648/j.iotcc.20241201.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20241201.12}, abstract = {Research Context and Aims: The swift expansion of internet technologies has rendered the digital network essential to contemporary life, highlighting the significance of cybersecurity. Network data not only encompasses personal information management and communication but also pertains to the protection of confidential corporate, governmental, and vital national infrastructures. Consequently, cybersecurity has become a critical issue in current society. Frequent occurrences like privacy violations, data thefts, and national security threats underline the critical need for enhanced network defenses and protective measures. Research Approach: This study examines the state of cybersecurity by assessing pertinent studies across public databases such as PubMed, CNKI, and CrossRef. It compiles and evaluates significant cybersecurity events including data breaches, malware attacks, and phishing, outlining key security challenges faced by networks. The paper also evaluates the current cybersecurity technologies and methods, pinpointing their effectiveness and limitations in addressing network threats. Research Findings: The findings reveal that cyber attackers have refined their methods, employing sophisticated, covert techniques for prolonged periods, which often outpace current defenses. In cases of data breaches, perpetrators frequently utilize precise social engineering or deploy advanced persistent threats (APTs). Additionally, the proliferation of IoT technology has not only obscured the boundaries of cybersecurity but also broadened potential attack vectors. Despite the implementation of security measures like encryption and multi-factor authentication, these can be compromised by managerial or operational oversights. Research Conclusions: With the cybersecurity landscape becoming increasingly challenging, future defenses will likely prioritize the adoption of integrated, proactive strategies. It is crucial to foster the development of smart security solutions, such as leveraging artificial intelligence to detect and respond to anomalies. Furthermore, boosting security awareness among users and ensuring standardized practices are imperative. Ultimately, formulating future cybersecurity policies will require a holistic approach, integrating technological, managerial, legal, and educational initiatives to forge a robust network defense architecture. }, year = {2024} }
TY - JOUR T1 - The Current Status and Challenges of Cybersecurity Risks AU - Xudong Sun Y1 - 2024/07/04 PY - 2024 N1 - https://doi.org/10.11648/j.iotcc.20241201.12 DO - 10.11648/j.iotcc.20241201.12 T2 - Internet of Things and Cloud Computing JF - Internet of Things and Cloud Computing JO - Internet of Things and Cloud Computing SP - 10 EP - 16 PB - Science Publishing Group SN - 2376-7731 UR - https://doi.org/10.11648/j.iotcc.20241201.12 AB - Research Context and Aims: The swift expansion of internet technologies has rendered the digital network essential to contemporary life, highlighting the significance of cybersecurity. Network data not only encompasses personal information management and communication but also pertains to the protection of confidential corporate, governmental, and vital national infrastructures. Consequently, cybersecurity has become a critical issue in current society. Frequent occurrences like privacy violations, data thefts, and national security threats underline the critical need for enhanced network defenses and protective measures. Research Approach: This study examines the state of cybersecurity by assessing pertinent studies across public databases such as PubMed, CNKI, and CrossRef. It compiles and evaluates significant cybersecurity events including data breaches, malware attacks, and phishing, outlining key security challenges faced by networks. The paper also evaluates the current cybersecurity technologies and methods, pinpointing their effectiveness and limitations in addressing network threats. Research Findings: The findings reveal that cyber attackers have refined their methods, employing sophisticated, covert techniques for prolonged periods, which often outpace current defenses. In cases of data breaches, perpetrators frequently utilize precise social engineering or deploy advanced persistent threats (APTs). Additionally, the proliferation of IoT technology has not only obscured the boundaries of cybersecurity but also broadened potential attack vectors. Despite the implementation of security measures like encryption and multi-factor authentication, these can be compromised by managerial or operational oversights. Research Conclusions: With the cybersecurity landscape becoming increasingly challenging, future defenses will likely prioritize the adoption of integrated, proactive strategies. It is crucial to foster the development of smart security solutions, such as leveraging artificial intelligence to detect and respond to anomalies. Furthermore, boosting security awareness among users and ensuring standardized practices are imperative. Ultimately, formulating future cybersecurity policies will require a holistic approach, integrating technological, managerial, legal, and educational initiatives to forge a robust network defense architecture. VL - 12 IS - 1 ER -