by Sayantani Sanyal
January 31, 2022
Cybersecurity is one of the most crucial aspects of the modern tech domain
Since our world has moved into cyberspace, we have developed different ways of protecting information from cyber criminals. With the emergence of the Covid-19 pandemic, industries across the globe were forced to reconsider their regular working conditions and stayed home while transitioning to a completely digital process of working. This led to an increase in data and sensitive document transfers occurring in the cloud. So, companies are seeking new and inventive methods to protect against hackers and data breaches. As we step into 2022, cybersecurity experts are chasing new innovative techniques to realize the different ways in which cyber criminals can attack and unknown vulnerabilities that should immediately be eradicated. So, in this article, we have enlisted top cybersecurity research papers that professionals or aspiring cybersecurity professionals should know about in 2022.
Â
Cyberbullying among Saudi’s Higher-Education Students: Implications for Educators and Policymakers by Dr. Abdulrahman M Al-Zahrani
The aim of this research study was to investigate the instances of cyberbullying among Saudi’s higher-education students. It is also purposed to identify the possible factors that might impact cyberbullying at large. The research yielded that maximum higher-education students would prefer the cyberbullying to stop, but by avoiding fighting back. Also, it revealed that male students are more involved in cyberbullying than female students.
Â
Research Paper on Cyber Security by Mrs. Ashwini Sheth, Mr. Sachin Bhosale, and Mr. Farish Kurupkar
The modern world is run by technology and network connections, but it is also crucial for business leaders and individuals to know the nitigrities of cybersecurity. Sensitive and personal information might be at risk if someone is not aware of the existing critical virtual risks. The paper states that cybersecurity is crucial because the military, government, financial, medical, and corporate organizations accumulate, analyze, and stock unprecedented amounts of data nowadays.
Â
Supporting the Cyber Analytic Process using Visual History on Large Displays by Ankit Singh, Alex Endert, Christopher Andrews, Lauren Bradel, Robert Kincaid, Chris NorthÂ
This paper focuses on cyber analytics which revolves around increasing the safety and soundness of the digital infrastructure. A cyber analytics work environment should enable multiple, simultaneous investigations, information foraging, and such others. Through this paper, the researchers attempt to present a prototype workspace for analysts where the analytic process is maintained in the workspace.Â
Â
Issues regarding cybersecurity in modern world by H. Geldiyev, M. Churiyev, and R. Mahmudov
In this paper, the authors try to define such concepts as cyberspace, cybersecurity, as well as assess the degree of danger related to cyber attacks and cyber wars. The researchers believe analyzing the threat beforehand is crucial to building a protective way around it. So, the work examines some properties of the registry of the operating system, that can be used in both computer attack information and ensure its security.Â
Â
FUZZBUSTER: Towards adaptive immunity from cyber threats by Paul Robertson
Modern computer systems face constant attacks from sophisticated adversaries, and the number of such attacks is increasing every day. This paper aims to develop Puzzbuster, which is an automated system that provides adaptive immunity against a wide variety of cyber threats to protect against such incoming threats.
Â
Cyberspace in Space: Fragmentation, Vulnerability, and Uncertainty by Johan Eriksson
This work examines new and challenging political aspects of cybersecurity and presents it as an issue defined by socio-technological uncertainty and political fragmentation. The paper is structured along with two broad themes that provide examples of how socio-economic and political responses interact with the current use of cyberspace. The researcher aims to make this paper more interactive for students of cybersecurity, global governance, technology studies, and international relations.
Â
Artificial Intelligence in Cyber Security by Matthew N.O. Sadiku, Omobayode I. Fagbohungbe, and Sarhan M. Musa
As we all know, cybersecurity is the process of protecting computer networks from cyberattacks or unintended authorization. Currently, it is the need of the era, and the integration of artificial intelligence is supposed to provide great solutions for this. This paper aims to provide an introduction to the use of AI in cybersecurity applications.
Â
WOMEN’S AWARENESS OF THE CYBER BULLYING RISK IN DIGITAL MEDIA DURING THE ENFORCEMENT OF THE MOVEMENT CONTROL ORDER (MCO) by Mohd Farhan Md Ariffin and Dr. Mohammad Fahmi Abdul Hamid
This study aims to analyze the exposure of women to the risk of cyberbullying in digital media during the enforcement of movement control orders. The research was conducted through the quantitative way by designing a set of questionnaires for the survey and was distributed among women. The results revealed after the survey showed that there is a need to raise awareness of safety and harmony among digital media users.
Â
Survey On The Applications Of Artificial Intelligence In Cyber Security by Shidawa Baba Atiku, Achi Unimke Aaron, Goteng Kuwunidi Job, Fatima Shittu, and Ismail Zahraddeen Yakubu
The rise in cyberattacks has overwhelmed monetary institutions and the human ability to analyze and combat every new form of cyber threat in the industry. And reports have revealed that the use of AI can advance such searches providing maximum security. So, this paper attempts to explore the use of artificial intelligence in the enhancement of cybersecurity.
Â
A Methodical Analysis of Medical Internet of Things (MIoT) Security and Privacy in Current and Future Trends by Dr. Yusuf Perwej, Dr. Nikhat Akhtar, Neha Kulshrestha, and Pavan Mishra
The modern healthcare system is constantly changing and the Medical Internet of Things (MIoT) is one of its prime drivers. This paper examines the present security and privacy challenges and needs that are connected to the data flow in the MIoT.Â
Share This Article
Do the sharing thingy