A Review on Cyber Security and Cyber Attacks
DOI:
https://doi.org/10.29304/jqcsm.2025.17.22195Keywords:
Cyber-attacks, Cyber security, Cyber threats, Information technologyAbstract
As technology has advanced, data protection has gotten more challenging. Information security now depends on cyber security. These days, protecting information is one of the biggest problems. Unquestionably, the Internet has created a new avenue for exploitation known as cybercrime because of the limitless amount of free websites. To combat these cybercrimes, both the public and business sectors are implementing a number of initiatives. Managing cyber security is a major challenge. In addition to presenting new trends and issues in the realm of cyber security, this research study focuses on upcoming technologies. It is anticipated that the thorough review study offered to scholars studying IT and cyber security will be beneficial. This analysis examines current advancements, difficulties, and new technology in the cybersecurity space. We concentrate on important ideas like cyber threats, and cyber threat intelligence. The relevant literature from 2020 to 2024 is evaluated using a systematic review methodology. This study aims to explore current trends, challenges, and future directions in cybersecurity and identify major cyber threats.
Downloads
References
Tan, S., et al., 2021. Attack detection design for dc microgrid using eigenvalue assignment approach. Energy Rep. 7, 469–476.
Aghajani, G., Ghadimi, N., 2018. Multi-objective energy management in a micro-grid. Energy Rep. 4, 218–225.
Xu, H., Sun, L., Zhai, E., & Huang, J. 2024. Large language models for cyber security: A systematic literature review. arXiv. https://arxiv.org/abs/2405.04760
Nazario, M., & Alghazzawi, D. 2023. Cyber Threat Intelligence for Security Decision-Making: A Review and Research Agenda. Computers & Security, 133, 103392.
Cao, J., et al., 2021. Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks. Inform. Sci. 548, 69–84.
Vaddadi, S. A., Syed, T. A., & Waghmare, L. M. 2023. A comprehensive review study of cyber-attacks and cyber security. International Journal on Recent and Innovation Trends in Computing and Communication, 11(5(.
Ahmed Jamal, A., et al., 2021. A review on security analysis of cyber physical systems using machine learning. Mater.
Alqarni, M., Alshamrani, A., Khan, R., & Zaman, N. 2024. Economic impact of cyber attacks and effective cyber risk management strategies: A light literature review and case study analysis. Procedia Computer Science, 228, 392–400.
Amet, R. 2023. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333.
Aziz, A.A., Amtul, Z., 2019. Developing Trojan horses to induce, diagnose and suppress Alzheimer’s pathology. Pharmacol. Res. 149, 104471.
Qiu, W., et al., 2021. Time-frequency based cyber security defense of wide-area control system for fast frequency reserve. Int. J. Electr. Power Energy Syst. 132, 107151.
Zhang, Y., Malacaria, P., 2021. Bayesian Stackelberg games for cyber-security decision support. Decis. Support Syst. 148, 113599.
Kim, Y.S., et al., 2020. Development of a method for quantifying relative importance of NPP cyber attack probability variables based on factor analysis and AHP. Ann. Nucl. Energy 149, 107790.
Tosun, O.K., 2021. Cyber-attacks and stock market activity. Int. Rev. Financ. Anal. 76, 101795.
Pfleeger, C. P., & Pfleeger, S. L.2012. Security in computing (5th ed.). Prentice Hall.
Nguyen, D.C.L., Golman, D.W., 2021. Diffusion of the Budapest Convention on cybercrime and the development of cybercrime legislation in Pacific Island countries: ‘Law on the books’ vs ‘law in action’. Comput. Law Secur. Rev. 40, 105521.
Associated Press. 2024. Europe's cybersecurity chief says disruptive attacks have doubled in 2024, sees Russia behind many.
The Times. 2024. The Times view on hackers: Cybermen. https://www.thetimes.co.uk/article/the-times-view-on-hackers-cybermen-n9stm26ls
Katrakazas, C., et al., 2020. Cyber security and its impact on CAV safety: Overview, policy needs and challenges. In: Milakis, D., Thomopoulos, N., van Wee, B. (Eds.), Advances in Transport Policy and Planning. Academic Press, pp. 73–94 (Chapter 3).
Cybersecurity and Infrastructure Security Agency (CISA). 2023. CSRB year in review 2023. https://www.cisa.gov/resources-tools/resources/csrb-year-review-2023
Doe, A. 2021. "The Rise of Ransomware: Challenges and Solutions." Journal of Cybersecurity, 14(2), 123-134.
Ferrag, M. A., Alwahedi, F., Battah, A., Cherif, B., Mechri, A., Tihanyi, N., Bisztray, T., & Debbah, M. 2024. Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities.
Mendes, C., & Rios, T. N. 2023. Explainable Artificial Intelligence and Cybersecurity: A Systematic Literature Review. arXiv.
Vasoya, S., Bhavsar, K., & Patel, N. 2022. A systematic literature review on ransomware attacks. ArXiv.
Podder, P., Bharati, S., Mondal, M. R. H., Paul, P. K., & Kose, U. 2021. Artificial neural network for cybersecurity: A comprehensive review. arXiv.
Lee, I. 2020. Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management. Future Internet, 12(9), 157.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Duaa Fadhel Najem, Suhad Muhajer Kareem

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.