全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Evolving Cybersecurity Policy: Addressing Modern Threats and Enhancing Resilience in a Digital Age

DOI: 10.4236/jis.2025.162017, PP. 330-340

Keywords: Cybersecurity Policy, Emerging Threats, Digital Resilience, Regulatory Challenges, International Cooperation

Full-Text   Cite this paper   Add to My Lib

Abstract:

In an era of rapid technological advancement, cybersecurity policy plays a crucial role in safeguarding digital infrastructure and national security. This paper examines the evolving landscape of cybersecurity threats, and the regulatory challenges faced by policymakers in addressing these emerging risks. Key themes explored include the proliferation of sophisticated cyber attacks, the limitations of current regulatory frameworks, and the urgent need for adaptive policy measures. By analyzing recent trends, case studies, and international approaches, this research aims to provide insights and recommendations for enhancing cybersecurity resilience in the face of modern threats.

References

[1]  World Economic Forum (2024) The Global Risks Report 2024. World Economic Forum.
[2]  National Institute of Standards and Technology (2024) Framework for Improving Critical Infrastructure Cybersecurity (Version 2.0). NIST Cybersecurity Framework.
[3]  Murad, S.A., Rahimi, N., Roy, I. and Gupta, B. (2024) Security Challenges in the Industrial Internet of Things (IIoT). In: Jha, S., Shakya, S.R., Ahmad, S. and Zhou, Z.X., Eds., Quality Assessment and Security in Industrial Internet of Things, CRC Press, 20-31.
https://doi.org/10.1201/9781003530572-2
[4]  Rahimi, N., Murad, S.A. and Lee, S.B. (2024) Entrepreneurship Opportunities in Cybersecurity. In: Özsungur, F., Ed., Generating Entrepreneurial Ideas With AI, IGI Global, 172-191.
https://doi.org/10.4018/979-8-3693-3498-0.ch008
[5]  United Nations Office on Drugs and Crime (2023) Global Programmes on Cyber-Crime Annual Report. United Nations. UNODC.
[6]  Ponemon Institute (2024). Cost of a Data Breach Report 2024. IBM Security.
[7]  Chen, X., Zhang, Y., Wang, L. and Li, S. (2024) A Survey of Supply Chain Attack Pat-terns in Cyber Security. ACM Computing Surveys, 56, 1-35.
[8]  Lee, S. and Kim, J. (2023) Artificial Intelligence in Cybersecurity: Opportunities and Threats. IEEE Security & Privacy, 21, 78-86.
[9]  Rahimi, N. and Gupta, B. (2021) Security Issues, Vulnerabilities, and Defense Mechanisms in Wireless Sensor Networks: State of the Art and Recommendation. In: Sharma, S.K., Bhushan, B., Kumar, R., Khamparia, A. and Debnath, N.C., Eds., Integration of WSNs into Internet of Things, CRC Press, 1-15.
https://doi.org/10.1201/9781003107521-1
[10]  Gartner (2023) Market Guide for Security Operations (Report No. G00749856). Gartner Research.
[11]  International Telecommunication Union (2023) Global Cybersecurity Index 2023. ITU Publications.
[12]  Anderson, R. and Moore, T. (2023) The Economics of Information Security. Journal of Cybersecurity, 15, 45-67.
[13]  Symantec (2024) Internet Security Threat Report (Vol. 29). Broadcom Inc., Symantec Reports.
[14]  Estonian Information System Authority (2023) Cybersecurity Assessment 2023. Republic of Estonia. Estonian Government.
[15]  Cyber Security Agency of Singapore (2024) Singapore Cyber Landscape 2024. Government of Singapore. Singapore Government Publications.
[16]  Verizon (2023) Data Breach Investigations Report 2023. Verizon Enterprise.
[17]  Rahimi, N. (2020) Security Consideration in Peer-To-Peer Networks with a Case Study Application. International Journal of Network Security & Its Applications, 12, 1-16.
https://doi.org/10.5121/ijnsa.2020.12201
[18]  Organization for Economic Cooperation and Development (2023) Digital Security Risk Management for Economic and Social Prosperity. OECD Publishing.
[19]  Europol (2024) Internet Organised Crime Threat Assessment (IOCTA) 2024. European Union Agency for Law Enforcement Cooperation. Europol Publications.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133