To see the other types of publications on this topic, follow the link: Cybersecurity Solutions.

Journal articles on the topic 'Cybersecurity Solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity Solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

o‘g‘li, Atakulov Bekzod Abduhalil. "Cybersecurity: threats, challenges, solutions." International Journal of Law And Criminology 5, no. 1 (2025): 5–8. https://doi.org/10.37547/ijlc/volume05issue01-02.

Full text
Abstract:
Reliable and secure operation of data networks, computer systems and mobile devices is the most important condition for the functioning of the state and for maintaining economic stability. The safe operation of key information systems in common use is influenced by many factors: cyberattacks, disorders caused by physical impact, failure of hardware and software, humane mistakes. These events demonstrate how modern society depends on stability of information systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Khudhur, Mokhalad Eesee. "Cybersecurity challenges and solutions." International Journal of Cloud Computing and Database Management 6, no. 1 (2025): 01–08. https://doi.org/10.33545/27075907.2025.v6.i1a.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sarker, Sree Pradip Kumer, and Raza Zahir Khan. "Cybersecurity Considerations for Smart Bangladesh: Challenges and Solutions." Asian Journal of Research in Computer Science 17, no. 6 (2024): 145–56. http://dx.doi.org/10.9734/ajrcos/2024/v17i6464.

Full text
Abstract:
Cybersecurity stands as a cornerstone for safeguarding the integrity, security, and prosperity of a nation in the digital era. It involves a multifaceted approach to protect interconnected digital systems, critical infrastructure, and sensitive data. In the context of a smart nation, where interconnected devices, sensors, and systems are integrated to enhance efficiency and quality of life, cybersecurity becomes even more crucial. As Bangladesh progresses towards its vision of becoming a Smart Nation, characterized by extensive integration of digital technologies into various sectors, cybersec
APA, Harvard, Vancouver, ISO, and other styles
4

Alexander, Cheryl Ann, and Lidong Wang. "Offensive and defensive cybersecurity solutions in healthcare." Computing and Artificial Intelligence 3, no. 2 (2025): 2220. https://doi.org/10.59400/cai2220.

Full text
Abstract:
Healthcare services usually implement defensive data strategies; however, offensive data strategies offer new opportunities because they focus on improving profitability or revenues. Offensive data also helps develop new medicine, diagnosis, and treatment due to the ease of data-sharing rather than data control or other restrictions. Balancing defensive data and offensive data is balancing data control and flexibility. It is a challenge to keep a balance between the two. Sometimes, it is necessary to favor one over the other, depending on the situation. A robust cybersecurity program is contin
APA, Harvard, Vancouver, ISO, and other styles
5

Ms. Reshma Owhal, Viraj Shewale, Aniket Sorate, Mayur Swami, and Dipak Waghmode. "CYBERVIDYA: Rag Infused Cyber Solutions." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 456–64. https://doi.org/10.47392/irjaeh.2025.0063.

Full text
Abstract:
As cyber threats grow more sophisticated, the need for intelligent, adaptive security solutions has never been greater. CyberVidya: RAG-Infused Cyber Solutions offers a groundbreaking approach by integrating large language models (LLMs) with retrieval-augmented generation (RAG) to provide precise, real-time cybersecurity insights. Unlike traditional models that rely on static knowledge, CyberVidya continuously retrieves and processes information from a dynamic, indexed database of academic papers, ethical books, PDFs, and real-world case studies. What sets CyberVidya apart is its Non-Parametri
APA, Harvard, Vancouver, ISO, and other styles
6

Trim, Peter R. J., and Yang-Im Lee. "Advances in Cybersecurity: Challenges and Solutions." Applied Sciences 14, no. 10 (2024): 4300. http://dx.doi.org/10.3390/app14104300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Heier, Melanie, Penatiyana W. Chandana Prasad, and Md Shohel Sayeed. "Machine learning approaches to cybersecurity in the industrial internet of things: a review." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 4 (2025): 3851. https://doi.org/10.11591/ijece.v15i4.pp3851-3866.

Full text
Abstract:
The industrial internet of things (IIoT) is increasingly used within various sectors to provide innovative business solutions. These technological innovations come with additional cybersecurity risks, and machine learning (ML) is an emerging technology that has been studied as a solution to these complex security challenges. At time of writing, to the author’s knowledge, a review of recent studies on this topic had not been undertaken. This review therefore aims to provide a comprehensive picture of the current state of ML solutions for IIoT cybersecurity with insights into what works to infor
APA, Harvard, Vancouver, ISO, and other styles
8

Sadiqzade, Zarifa, and Hasan Alisoy. "Cybersecurity and Online Education – Risks and Solutions." Luminis Applied Science and Engineering 2, no. 1 (2025): 4–12. https://doi.org/10.69760/lumin.20250001001.

Full text
Abstract:
The swift proliferation of online education has transformed learning, providing accessibility, flexibility, and creativity. This transition has also engendered considerable cybersecurity threats, encompassing data breaches, identity theft, phishing schemes, and privacy issues. As educational institutions increasingly depend on digital platforms and cloud-based systems, they become attractive targets for cyber threats. This study examines the principal cybersecurity threats in e-learning settings, including illegal data access, malware infection, and ethical issues related to student surveillan
APA, Harvard, Vancouver, ISO, and other styles
9

Nurwanah, Andi. "Cybersecurity in Accounting Information Systems: Challenges and Solutions." Advances in Applied Accounting Research 2, no. 3 (2024): 157–68. http://dx.doi.org/10.60079/aaar.v2i3.336.

Full text
Abstract:
Purpose: This study explores the challenges and solutions in securing Accounting Information Systems (AIS) amidst increasing cybersecurity threats, emphasizing the integration of technological, human, and organizational factors. Research Design and Methodology: Utilizing a qualitative approach, the study employs case studies and expert interviews across various sectors. The research framework draws on the Technology-Organization-Environment (TOE) and Socio-Technical Systems (STS) theories to provide a comprehensive analysis of AIS security dynamics. Findings and Discussion: The research identi
APA, Harvard, Vancouver, ISO, and other styles
10

RAJ, ANGIRA. "ASSESSING THE IMPLICATIONS OF CYBERSECURITY THREATS ON THE ADOPTION OF FINTECH SOLUTIONS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33381.

Full text
Abstract:
This master's thesis delves into the critical intersection of cybersecurity threats and the adoption of fintech solutions. In an erawhere financial technology is rapidly transforming the landscape offinancial services, understanding the implications of cybersecurity threats is paramount. The study conducts a comprehensive analysisto explore how cybersecurity vulnerabilities impact the adoption of fintech solutions across various sectors. By employing a multidisciplinary approach, the thesis investigates the intricate relationship between cybersecurity threats and fintech adoption. It examines the p
APA, Harvard, Vancouver, ISO, and other styles
11

Ishamuddin Mustapha, Yamounah Vaicondam, Agha Jahanzeb, Burkhanov Aktam Usmanovich, and Siti Hawa Binti Yusof. "Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 22 (2023): 100–116. http://dx.doi.org/10.3991/ijim.v17i22.45261.

Full text
Abstract:
The rapid growth of the fintech industry, driven by the proliferation of mobile applications, has revolutionized financial services, providing unprecedented convenience to users. However, this innovation comes with inherent cybersecurity challenges that demand rigorous attention. This study delves into the complex and ever-evolving landscape of cybersecurity within the fintech mobile app ecosystem, aiming to identify challenges and present viable solutions. Cybersecurity threats in the fintech mobile app ecosystem encompass a broad spectrum, including data breaches, malware attacks, phishing s
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Zihe. "Problems and Solutions in US Stock Market." Advances in Economics, Management and Political Sciences 143, no. 1 (2024): 167–71. https://doi.org/10.54254/2754-1169/2024.ga18969.

Full text
Abstract:
This research explores critical challenges facing the U.S. stock market, specifically focusing on the impacts of algorithmic trading-induced market volatility and cybersecurity threats. Algorithmic trading, which utilizes high-speed computer systems to make trades, has increased market efficiency but also introduced risks of extreme price fluctuations and flash crashes. In parallel, the digitalization of financial markets has heightened exposure to cybersecurity threats, posing risks to trading integrity and data security. To address these issues, this study proposes two targeted solutions. Fo
APA, Harvard, Vancouver, ISO, and other styles
13

Shetty, Saiman, and Harsh Jaiswal. "Cybersecurity Threats and Solutions in Autonomous Vehicles." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37841.

Full text
Abstract:
Abstract—The integration of autonomous vehicles into modern transportation systems introduces both transformative potential and significant cybersecurity challenges. This paper examines the critical importance of cybersecurity in autonomous vehicles, highlighting key threats such as remote hacking, sensor spoofing, and data breaches that jeopardize vehicle safety and user privacy. Utilizing a mixed-methods approach, the study combines quantitative data analysis with qualitative case studies to thoroughly assess these vulnerabilities. Additionally, it evaluates a range of solutions, including a
APA, Harvard, Vancouver, ISO, and other styles
14

Kamuangu, Paulin. "A Review on Cybersecurity in Fintech: Threats, Solutions, and Future Trends." Journal of Economics, Finance and Accounting Studies 6, no. 1 (2024): 47–53. https://doi.org/10.5281/zenodo.10645599.

Full text
Abstract:
A Review on Cybersecurity in Fintech: Threats, Solutions, and Future Trends: This paper contributes to the literature in several significant ways: Comprehensive Overview: It provides a comprehensive overview of the cybersecurity landscape within the fintech industry, consolidating existing knowledge and research findings into a cohesive narrative. By synthesizing information from various sources, the paper offers readers a thorough understanding of the current state of cybersecurity in fintech. Identification of Emerging Trends: The paper identifies and discusses emerging trends in fintech cyb
APA, Harvard, Vancouver, ISO, and other styles
15

Sweety, Dr. "Exploring the Landscape of Cybersecurity: Challenges, Threats, and Solutions." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 7211–14. https://doi.org/10.22214/ijraset.2025.71744.

Full text
Abstract:
The abstract should be a brief overview of your research paper, summarizing the key points like the motivation behind the study, the types of cybersecurity challenges explored, and the solutions or recommendations . Cyber security is the process of preventing systems, networking devices, and data from unofficial or unapproved access, any harmful attempt, or Deterioration. It engages executing different technologies, policies, and procedures to shield information, maintain its integrity, and ensure its availability. Cybersecurity plays a vital role in safeguarding digital infrastructures, sensi
APA, Harvard, Vancouver, ISO, and other styles
16

Mohammed. I. Alghamdi. "Cybersecurity: A Survey of Threats, Technologies, and Solutions." Communications on Applied Nonlinear Analysis 32, no. 8s (2025): 654–63. https://doi.org/10.52783/cana.v32.3752.

Full text
Abstract:
This study provides a comprehensive survey of the current landscape in cybersecurity, focusing on the prevalent threats, emerging technologies, and viable solutions. Utilizing secondary data from a wide array of sources including academic publications, industry reports, and government documents, the research delineates the evolving nature of cyber threats such as malware, phishing, and ransomware. It also examines the role of advanced technologies like artificial intelligence, blockchain, and quantum computing in enhancing cybersecurity measures. Furthermore, the study explores strategic solut
APA, Harvard, Vancouver, ISO, and other styles
17

Oluwabunmi Layode, Henry Nwapali Ndidi Naiho, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "The role of cybersecurity in facilitating sustainable healthcare solutions: Overcoming challenges to protect sensitive data." International Medical Science Research Journal 4, no. 6 (2024): 668–93. http://dx.doi.org/10.51594/imsrj.v4i6.1228.

Full text
Abstract:
This study systematically reviews the intersection of cybersecurity and healthcare, aiming to identify the evolving threats, technological advancements, and the efficacy of current cybersecurity measures. Employing a systematic literature review and content analysis methodology, the research scrutinizes peer-reviewed articles, conference proceedings, and white papers from 2014 to 2023, focusing on the integration of advanced cybersecurity technologies, the impact of standards and regulations, and stakeholder implications in healthcare cybersecurity. Key findings reveal a dynamic cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
18

Wiratama, Ahmad Doni. "Cyber Security In 2023: The Latest Challenges And Solutions." Jurnal Komputer Indonesia 2, no. 1 (2023): 47–54. http://dx.doi.org/10.37676/jki.v2i1.569.

Full text
Abstract:
Cybersecurity has become a crucial issue in the digital age, especially in 2023 where technology continues to evolve rapidly. This article discusses the challenges faced in maintaining cybersecurity, such as the rise of increasingly sophisticated cyberattacks, and the latest solutions offered to deal with them. The research was conducted through literature analysis as well as relevant case studies. The results show that new approaches such as Zero Trust, artificial intelligence in threat detection, and collaboration between entities are key to strengthening cybersecurity in 2023.
APA, Harvard, Vancouver, ISO, and other styles
19

Darlington Eze Ekechukwu and Peter Simpa. "The future of Cybersecurity in renewable energy systems: A review, identifying challenges and proposing strategic solutions." Computer Science & IT Research Journal 5, no. 6 (2024): 1265–99. http://dx.doi.org/10.51594/csitrj.v5i6.1197.

Full text
Abstract:
This study provides a comprehensive examination of cybersecurity within renewable energy systems, highlighting the critical role of cybersecurity measures in ensuring the sustainability and reliability of these systems. With the increasing reliance on renewable energy sources, the need for robust cybersecurity frameworks to protect against evolving cyber threats has never been more pressing. Through a systematic literature review and content analysis, this research identifies the prevalent cyber threats and vulnerabilities specific to renewable energy infrastructures, evaluates the effectivene
APA, Harvard, Vancouver, ISO, and other styles
20

Maglaras, Leandros, Helge Janicke, and Mohamed Amine Ferrag. "Cybersecurity of Critical Infrastructures: Challenges and Solutions." Sensors 22, no. 14 (2022): 5105. http://dx.doi.org/10.3390/s22145105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Westerlund, Mika, and Risto Rajala. "Effective Digital Channel Marketing for Cybersecurity Solutions." Technology Innovation Management Review 4, no. 10 (2014): 22–32. http://dx.doi.org/10.22215/timreview/836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Westerlund, Mika, and Risto Rajala. "Effective Digital Channel Marketing for Cybersecurity Solutions." Technology Innovation Management Review 4, no. 10 (2014): 22–32. http://dx.doi.org/10.22215/timreview836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Khatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Akana, John, Bushra Marium Islam, Kartik Patel, Ikjot Saini, Gyan Chhipi-Shrestha, and Rajeev Ruparathna. "Comparative eco-efficiency assessment of cybersecurity solutions." Environmental Impact Assessment Review 100 (May 2023): 107096. http://dx.doi.org/10.1016/j.eiar.2023.107096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gopalakrishnan Mahadevan. "Cybersecurity in Banking and Financial Software Solutions." Economic Sciences 21, no. 1 (2025): 334–50. https://doi.org/10.69889/0btn6w55.

Full text
Abstract:
The rapid evolution of digital banking and financial transactions has brought unprecedented convenience, yet it has also exposed institutions and consumers to growing cyber threats. Cyberattacks, including data breaches, ransomware, phishing, and denial-of-service attacks, have significantly increased, targeting vulnerabilities in financial systems. This paper explores the cybersecurity landscape in banking and financial software solutions, emphasizing the critical need for robust security frameworks. Key concerns include unencrypted data, unreliable third-party services, and the rising cost o
APA, Harvard, Vancouver, ISO, and other styles
26

Darlington Eze Ekechukwu and Peter Simpa. "The importance of cybersecurity in protecting renewable energy investment: A strategic analysis of threats and solutions." Engineering Science & Technology Journal 5, no. 6 (2024): 1845–83. http://dx.doi.org/10.51594/estj.v5i6.1186.

Full text
Abstract:
This study explores the critical nexus between cybersecurity and the viability of renewable energy systems, emphasizing the importance of robust cybersecurity measures for the sustainability and success of renewable energy initiatives. Employing a systematic literature review and content analysis, the research scrutinizes peer-reviewed journals, conference proceedings, industry reports, and policy documents from 2014 to 2024. The methodology focuses on identifying gaps, opportunities, and strategic recommendations for enhancing cybersecurity resilience within the renewable energy sector. Key f
APA, Harvard, Vancouver, ISO, and other styles
27

pavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.

Full text
Abstract:
Abstract Social media platforms' rapid expansion has made cybersecurity a major issue that affects billions of users globally. This study examines cybersecurity's function, effects, and safeguards in relation to social media. Users of social media are more vulnerable to a variety of online dangers, such as dangerous software, phishing scams, cyberbullying, identity theft, and phony profiles. These risks impact users' emotional health and organizational security in addition to compromising personal data. Although the majority of platforms have built-in security protections, the study emphasizes
APA, Harvard, Vancouver, ISO, and other styles
28

Laxminarayana, Korada, Kartik Sikha Vijay, and Siramgari Dayakar. "Streamlining Enterprise Cybersecurity: Building Real-Time Threat Analytics Solutions." European Journal of Advances in Engineering and Technology 7, no. 12 (2020): 107–11. https://doi.org/10.5281/zenodo.13762555.

Full text
Abstract:
The proliferation of cybersecurity tools in enterprises has led to an overwhelming complexity in managing and responding to security threats. Since the 1990s, as organizations have increasingly invested in cybersecurity to combat growing threats and sophisticated attacks, they have accumulated a vast array of tools designed to address various aspects of their security needs. This accumulation has resulted in a fragmented security landscape where the effectiveness of individual tools is often undermined by their lack of integration. This paper explores the challenges associated with managing a
APA, Harvard, Vancouver, ISO, and other styles
29

Polishchuk, Volodymyr, Nataliia Fedirko, Dymytrii Grytsyshen, Kyrylo Ohdanskyi, and Volodymyr Kotkovskyy. "Analysis of the Impact of Cybersecurity on The Stability of Financial Institutions." International Journal of Religion 5, no. 9 (2024): 302–9. http://dx.doi.org/10.61707/hfrv6059.

Full text
Abstract:
The issue of the impact of cybersecurity is a top priority for the functioning of a financial institution. Therefore, its provision becomes a priority in organizing the further activities of the institution itself. The article aims to analyze the current trends in ensuring the cybersecurity of financial institutions and its role in their functioning. The paper describes the theoretical foundations of the cyber protection concept. The authors also outline the specifics of cybersecurity and the leading technological solutions for achieving these goals. Special attention is paid to modern, innova
APA, Harvard, Vancouver, ISO, and other styles
30

Polishchuk, Volodymyr, Nataliia Fedirko, Dymytrii Grytsyshen, Kyrylo Ohdanskyi, and Volodymyr Kotkovskyy. "Stability of financial institutions under the influence of cyber threats." Edelweiss Applied Science and Technology 8, no. 6 (2024): 2501–9. http://dx.doi.org/10.55214/25768484.v8i6.2498.

Full text
Abstract:
The issue of the impact of cybersecurity is a top priority for the functioning of a financial institution. Therefore, its provision becomes a priority in organizing the further activities of the institution itself. The article aims to analyze the current trends in ensuring the cybersecurity of financial institutions and its role in their functioning. The paper describes the theoretical foundations of the cyber protection concept. The authors also outline the specifics of cybersecurity and the leading technological solutions for achieving these goals. Special attention is paid to modern, innova
APA, Harvard, Vancouver, ISO, and other styles
31

Polishchuk, Volodymyr, Nataliia Fedirko, Dymytrii Grytsyshen, Kyrylo Ohdanskyi, and Volodymyr Kotkovskyy. "Stability of Financial Institutions Under the Influence of Cyber Threats." Journal of Lifestyle and SDGs Review 5, no. 3 (2025): e04008. https://doi.org/10.47172/2965-730x.sdgsreview.v5.n03.pe04008.

Full text
Abstract:
Objective: The article aims to analyze the current trends in ensuring the cybersecurity of financial institutions and its role in their functioning. Theoretical Framework: The issue of the impact of cybersecurity is a top priority for the functioning of a financial institution. Therefore, its provision becomes a priority in organizing the further activities of the institution itself. An important area of research is the disclosure of the practical experience of information corporations in providing technical solutions to ensure the security of financial transactions and support the global fina
APA, Harvard, Vancouver, ISO, and other styles
32

Bhanushali, Aastha. "AI-Driven Cybersecurity: A Cornerstone of National Security Amidst Emerging Threats and Innovative Solutions." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1265–69. https://doi.org/10.22214/ijraset.2025.67522.

Full text
Abstract:
In the current digital environment, cybersecurity has emerged as a key component of national security. Advanced defences have become necessary due to the quick evolution of cyberthreats, such as ransomware, cyberwarfare, and AI-driven attacks. Artificial intelligence (AI) including into cybersecurity systems has transformed security automation, incident response, and threat detection. The influence of AI in cybersecurity, new threats, legal frameworks governing cyber laws, real-world case studies of cyber frauds, and AI-driven cybersecurity solutions are all covered in this research paper. Add
APA, Harvard, Vancouver, ISO, and other styles
33

Vrhovec, Simon, and Blaž Markelj. "We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers." PLOS ONE 19, no. 10 (2024): e0312266. http://dx.doi.org/10.1371/journal.pone.0312266.

Full text
Abstract:
Cyberattacks pose a significant business risk to organizations. Although there is ample literature focusing on why people pose a major risk to organizational cybersecurity and how to deal with it, there is surprisingly little we know about cyber and information security decision-makers who are essentially the people in charge of setting up and maintaining organizational cybersecurity. In this paper, we study cybersecurity awareness of cyber and information security decision-makers, and investigate factors associated with it. We conducted an online survey among Slovenian cyber and information s
APA, Harvard, Vancouver, ISO, and other styles
34

Researcher. "HEALTHCARE CYBERSECURITY LANDSCAPE: CHALLENGES, SOLUTIONS, AND FUTURE DIRECTIONS." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 90–107. https://doi.org/10.5281/zenodo.13692084.

Full text
Abstract:
The healthcare industry's reliance on digital technologies has increased in recent years. With electronic health records, telemedicine, and connected healthcare medical devices, there is more and more dependency now than before to provide better health outcomes to patients, improve operational efficiency, and bolster medical research. However, cyberattackers are exploiting the industry’s reliance on technology, as evident from the rapidly changing threat landscape. Ransomware, phishing, and data breaches have become commonplace. This article aims to explore the cybersecurity challenges s
APA, Harvard, Vancouver, ISO, and other styles
35

Djurayev, Musurmon Avlakulovich, Oybek Valijonovich Tuyboyov, Sirojiddin Salimov, and Zumrad Zarifova. "CYBERSECURITY CHALLENGES AND SOLUTIONS IN BLOCKCHAIN-BASED IOT SYSTEMS." Innovative Development in Educational Activities 2, no. 23 (2023): 149–58. https://doi.org/10.5281/zenodo.10392082.

Full text
Abstract:
<em>The pervasive integration of the Internet of Things (IoT) is evident across diverse domains, including smart homes, cities, industrial automation, and healthcare. Nonetheless, the escalating utilization of IoT devices has given rise to notable apprehensions regarding cybersecurity and privacy. An emerging proposition to address these concerns involves leveraging blockchain technology, known for its distributed and immutable ledger characteristics, to fortify the security and privacy aspects of IoT systems. Blockchain-infused IoT systems present advantages like decentralization, transparenc
APA, Harvard, Vancouver, ISO, and other styles
36

Kingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Empowering users through AI-driven cybersecurity solutions: enhancing awareness and response capabilities." Engineering Science & Technology Journal 4, no. 6 (2023): 707–27. http://dx.doi.org/10.51594/estj.v4i6.1528.

Full text
Abstract:
Artificial Intelligence (AI)-driven cybersecurity solutions are revolutionizing how organizations and individuals address the growing complexity and sophistication of cyber threats. This paper explores the role of AI in empowering users by enhancing their awareness and response capabilities, making cybersecurity more accessible and effective. AI-driven tools and systems are designed to detect, predict, and mitigate potential threats in real-time, thereby enabling users to respond more swiftly and effectively to cyber incidents. By leveraging machine learning algorithms and advanced analytics,
APA, Harvard, Vancouver, ISO, and other styles
37

Mechev, Stoyan, Elisaveta Staneva, and Mariyan Rachev. "Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices." Information & Security: An International Journal 47, no. 3 (2020): 300–305. http://dx.doi.org/10.11610/isij.4721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Upendra, Priyanka. "Selecting a Passive Network Monitoring Solution for Medical Device Cybersecurity Management." Biomedical Instrumentation & Technology 55, no. 4 (2021): 121–30. http://dx.doi.org/10.2345/0890-8205-55.4.121.

Full text
Abstract:
Abstract The number of cyberattacks and information system breaches in healthcare have grown exponentially, as well as escalated from accidental incidents to targeted and malicious attacks. With medical devices representing a substantial repository of all the assets in a healthcare system, network security and monitoring are critical to ensuring cyber hygiene of these medical devices. Because of the unique challenges of connected medical devices, a passive network monitoring (PNM) solution is preferred for its overall cybersecurity management. This article is intended to provide guidance on se
APA, Harvard, Vancouver, ISO, and other styles
39

Mashrur, Rahman Mahin. "Cybersecurity Threats: State of Bangladeshi Cybersecurity Laws and Institutions." SCLS Law Review 3, no. 3 (2020): 103–10. https://doi.org/10.5281/zenodo.10209101.

Full text
Abstract:
In the present world, the concept of cybersecurity is as important as the physical security of a person, wealth and institution. Because of the growing interconnection of individuals through information and communication technology, the world is facing a major paradigm shift in regard to cyberspace technologies. Also, the criminals are changing their techniques fast, and the technologies to prevent crimes are rapidly becoming outdated and so are becoming the various legal and institutional arrangements to prevent such crimes. As part of the modern world, Bangladesh is bound to adapt to such a
APA, Harvard, Vancouver, ISO, and other styles
40

Jobanpreet Kaur, Syed Nazmul Hasan, Shuchona Malek Orthi, et al. "Advanced Cyber Threats and Cybersecurity Innovation - Strategic Approaches and Emerging Solutions." Journal of Computer Science and Technology Studies 5, no. 3 (2024): 112–21. http://dx.doi.org/10.32996/jcsts.2023.5.3.9.

Full text
Abstract:
Given that the size and complexity of digital ecosystems are constantly growing, cybersecurity is constantly under attack by increasingly complex threats ranging from ransomware attacks to cyber-attacks based on artificial intelligence. Thus, this paper focuses on these new generation cyber threats and assesses the old and advanced security technologies that address them. This study addresses the future of advanced threats and emerging solutions deep diving into the application of AI, blockchain and the use of Zero Trust architectural concepts in mitigating cybersecurity risks. Moreover, a num
APA, Harvard, Vancouver, ISO, and other styles
41

Sandeep Dommari and Prof. (Dr) Sangeet Vashishtha. "Blockchain-Based Solutions for Enhancing Data Integrity in Cybersecurity Systems." International Journal for Research Publication and Seminar 14, no. 5 (2023): 530–45. https://doi.org/10.36676/jrps.v14.i5.1639.

Full text
Abstract:
The increasing incidence and sophistication of cyberattacks have made data integrity a critical aspect in modern cybersecurity systems. Although traditional security practices are reasonably effective, they often have weaknesses to a range of attacks, including data tampering, unauthorized access, and system tampering. Blockchain technology, in terms of its decentralized, tamper-proof, and transparent nature, presents a feasible approach to counter these challenges. However, despite its potential, the integration of blockchain in cybersecurity infrastructures is still a field of active researc
APA, Harvard, Vancouver, ISO, and other styles
42

Dave, Rushi. "Cybersecurity in Cloud Computing Environments: Challenges and Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40961.

Full text
Abstract:
- Cloud computing makes it possible to manage and send out IT services to organizations in a scalable, flexible and cost-effective way. Consequently, the cloud computing is rapidly going popular as it also poses many significant cybersecurity challenges .This research paper investigates the unique security considerations inherent in cloud computing environments and proposes strategies for enhancing cybersecurity in the cloud. Through a comprehensive analysis of current practices, vulnerabilities, and emerging threats, this paper aims to provide insights into the state of cloud security and off
APA, Harvard, Vancouver, ISO, and other styles
43

Chinwe Chinazo Okoye, Ekene Ezinwa Nwankwo, Favour Oluwadamilare Usman, Noluthando Zamanjomane Mhlongo, Olubusola Odeyemi, and Chinedu Ugochukwu Ike. "Securing financial data storage: A review of cybersecurity challenges and solutions." International Journal of Science and Research Archive 11, no. 1 (2024): 1968–83. http://dx.doi.org/10.30574/ijsra.2024.11.1.0267.

Full text
Abstract:
In an era where the digital transformation of the financial sector has become both a boon and a battleground, this paper delves into the intricate dynamics of cybersecurity within financial data storage. With the relentless advancement of technology and the concomitant rise in cyber threats, the safeguarding of financial data emerges as a paramount concern. This study sets out with the aim to dissect the current cybersecurity challenges, scrutinize the effectiveness of existing protective measures, and explore the potential of emerging technologies in fortifying financial data against cyber in
APA, Harvard, Vancouver, ISO, and other styles
44

Tyler, Neil. "Vehicle Cybersecurity Wins Innovate UK Funding." New Electronics 52, no. 14 (2019): 6. http://dx.doi.org/10.12968/s0047-9624(22)61570-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Scott, Ben, and Raina Mason. "Cyber as a Second Language? A Challenge to Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.137.

Full text
Abstract:
Cybersecurity pedagogical approaches do not address the challenges faced by students with English as an additional language (EAL). Despite EAL students representing a critical labour force for this important global and multidisciplinary industry, there lacks both research and cohesive solutions to address this issue. Via student interviews and semi-thematic analysis, this paper demonstrates that EAL cybersecurity students express challenges with aspects of cybersecurity content. Secondly, it is shown that predominant cybersecurity education bodies of knowledge and frameworks do not address cha
APA, Harvard, Vancouver, ISO, and other styles
46

Ikechukwu Innocent Umeh. "Enhancing Cybersecurity in the Age of AI: Challenges and Solutions." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1095–105. https://doi.org/10.30574/wjarr.2025.26.1.1157.

Full text
Abstract:
As cyber threats become increasingly complex, artificial intelligence (AI) has emerged as a crucial tool for strengthening cybersecurity systems. This paper explores how AI enhances cyber defense through real-time threat detection, behavioral analysis, and automated response mechanisms. However, the integration of AI also introduces new vulnerabilities, including adversarial attacks, data dependency risks, and ethical concerns surrounding surveillance and privacy. The dual nature of AI—as both a powerful defense mechanism and a potential security risk—underscores the need for responsible deplo
APA, Harvard, Vancouver, ISO, and other styles
47

Ludvigsen, Kaspar Rosager. "The Role of Cybersecurity in Medical Devices Regulation: Future Considerations and Solutions." Law, Technology and Humans 5, no. 2 (2023): 59–77. http://dx.doi.org/10.5204/lthj.3080.

Full text
Abstract:
The cybersecurity of medical devices is paramount in a world where everything is increasingly digitised. Attention to how this important defence against malicious actors is regulated must, therefore, also increase. This paper uncovers how the cybersecurity of medical devices is currently regulated and how it can be improved going forward. First, the paper compares the regulation of medical device cybersecurity in the European Union, the United States and the United Kingdom (UK)—differentiating between Great Britain and Northern Ireland as per the current state of the law in the UK. Second, the
APA, Harvard, Vancouver, ISO, and other styles
48

Powell, Grant. "Engaging the Board to Ensure Effective Cybersecurity." ITNOW 65, no. 3 (2023): 46–47. http://dx.doi.org/10.1093/itnow/bwad096.

Full text
Abstract:
Abstract Grant Powell MBCS spoke to Steve Sands, BCS ISSG Chair &amp; Data Protection Officer at Synectics Solutions, and Robert Felthouse, CISO at Syntectics Solutions, about the need for greater synergy between the boardroom and security departments when it comes to dealing with cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
49

Hussain, Hasnain. "Leveraging AI and Machine Learning to Detect and Prevent Cyber Security Threats." Dialogue Social Science Review (DSSR) 3, no. 1 (2025): 881–95. https://doi.org/10.5281/zenodo.14714679.

Full text
Abstract:
This article discusses the application of artificial intelligence and machine learning techniques to detect and mitigate cybersecurity threats. It highlights innovative solutions, practical implementation challenges, and future research directions in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
50

Chamariya, Yogesh Jaiswal. "Cloud Technologies and AI in Cyber Security: Challenges and Opportunities." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2 (2023): 351–57. https://doi.org/10.17762/ijritcc.v11i2.11575.

Full text
Abstract:
In the modern digital landscape, the integration of cloud technologies and artificial intelligence (AI) has brought significant advancements to the field of cybersecurity. While these technologies offer powerful solutions for data protection, threat detection, and risk management, they also introduce new challenges. This paper explores the role of cloud technologies and AI in cybersecurity, the challenges they present, and the opportunities they create. By examining case studies and key developments in the field, this research offers insights into how cloud-based AI solutions are transforming
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!