Latest Cybersecurity Trends

Page 1

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

Latest Cybersecurity Trends

Kajal Kadam1, Aliya Shaikh2, Asst.Prof. P.S.Gade3

1Kajal Kadam, YTC, Satara, Maharastra India

2Aliya Shaikh, YTC, Satara Maharastra India

3Asst.Prof.P.S.Gade,YTC, Satara, Maharastra India ***

Abstract - The likelihood of a security breach has never been higher due to the variety of new threats that are developing from both inside and outside your network. The combination of all these risk variables with a significant human component presupposes that everything has been set up and configured correctly to get the best results possible from each security instrument. In order to address this issue, organisations often spend more money on security controls, which increases management visibility and makesiteasierfor team like Security operation to see better results and provide good return on investment.

The author covers the current trends in cybersecurity in this research report. Investigations have also focused on cybersecurity trends advantages and potential growth. The conceptual analysis of trends as a whole in the research has also given consideration to future evolution.

Key Words: Cyber Security, Data, Attacks, Threats, Cryptocurrency,Breach

1. INTRODUCTION

The cyber security domain growing faster as both offensive and defensive security service providers compete to outwit one another. Technology is constantly developing and improving, and new threats and creative solutionstocombatthemareconstantlyemerging.Asmore people started working from home recently due to the pandemic, fraudsters discovered new techniques, tactics, andstrategiestotakeovernetworksandstealdatainorder toexactaransom.

Thenewestdevelopmentsincybersecurityare discussedinthisoverview.

2. CYBER SECURITY TRENDS

2.1 Machine Learning

Althoughitisoneofthenewesttechnologiesin cybersecurity,machinelearningisplayingabiggerandmore proactiverole.Oneofthereasonsisthatmachinelearning makes cybersecurity easier, more efficient, and less expensive (ML). This system builds patterns and manipulates them, anticipating and responding to active attacksinreal-timeusingsophisticatedalgorithmsthatare basedoncomplexdata.Toputitanotherway,applyingML

to cybersecurity systems helps them to assess threat patterns and learn the habits of hackers, assisting in the preventionoffutureattacksanddecreasingtheamountof time cybersecurity experts must dedicate to repetitive operations.

ML makes cybersecurity easier to use, more efficient,andmoreaffordableallatonce.MLcreatespatterns andusesalgorithmstoalterthemfromacomplexsetofdata. Itcanthereforeanticipatedangersinrealtimeandrespond tothemaccordingly.Inordertocreateefficientalgorithms, thistechnologyprimarilydependsoncomplexandrichdata. The information must come from everywhere and must coverasmanyprobableoutcomesasispractical.Inorderto assessattacktrendsandlearnhackers'tactics,cybersecurity systemscannowusemachinelearning(ML)

2.2. Artificial Intelligence (AI)

Itisimpossibleforhumanbeingtooperatelarge numberofcybersecuritythreats.Asaresult,organisations areincreasinglyturningtoAIandMLtohonetheirsecurity infrastructure. Al has played a key role in developing automatic threat detection, face recognition, natural language processing, and security automation systems. Al also enables the much quicker analysis of enormous amountsofdangerdata.Thisisadvantageousforbothhuge enterprisesdealingwithmassiveamountsofdataandsmall or mid-sized businesses with sometimes under-resourced security teams. While Al has enormous potential for businesses to detect threats more thoroughly, thieves are alsoleveragingthetechnologytoautomatetheirattacksby usingmodel-stealinganddata-poisoningmethods.

2.3 Need of Multi-Factor Authentication

Password protection is no longer enough due to the sophisticationofmoderncyberattacks.Comparedtoabasic password,amulti-factorauthentication(MFA)ismuchmore secure. By simply adding an additional layer of security, multi-factorauthenticationhelpstopreventillegalaccessto onlineaccounts.MFAmakessurethatbusinessescanbetter safeguard employee data and manage access. Every time someone signs in, they must additionally provide a verification code that is sent to their registered phone number or through an authenticator app. The "gold standard" of authentication is multi-factor authentication (MFA).

©
Page1170
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

In order to solve this problem, organisations will increasingly use on application-based MFA tools like Microsoft Authenticator, Google Authenticator, One Span Authenticator, and others. Despite this, because SMS and voice MFAs are not end-to-end encrypted, they are still susceptible to attacks. Microsoft also suggested their customers to use app-based authenticator with the keys insteadofphone-basedauthenticator.DespitethisSMSand voiceMFAcontinuetobevulnerableasthesechannelsare notencrypted.

2.4 Rise of Ransomware

Even though ransomware has been a threat for over 20 years, it is still becoming worse. The frequency of ransomwarecyberattacksisconsideredtohavesignificantly grownnowadays.Inthiscyberattackattackerfindsaccess tothesensitivedataofaperson,agroup,oraorganization and then encrypt it so they cannot access it. They then conveyathreattorevealpersonalinformationifaransomis notpaid,whichistypicallymadeinbitcoin.

The burden of this cyber threat is significant given the sensitivedataatstakeaswelleconomicimpactofpayingthe Ransome.Remoteworkingandthegrowingdigitizationof manyenterpriseshavegivenransomwarenewtargets.

As the number of attacks is increased, the quantity of Ransome paid is also increased. Most of the time, hackers demandsuchpaymentsinobscurecryptocurrency.

5. Breach and Attack Simulation (BAS)

In the last two decades, cyberattacks have undergone a significant evolution in terms of their capabilities, reach, consequences, and variety of targets. Cybercrime is causing record-breaking losses worldwide, and it appears that this trend will continue. Security managers and executives are aiming to improve their company'ssecurityposturebecauseoftheincreaseddanger of attacks. BAS technologies are described as technology "that enable enterprises to continuously and consistently simulate the full attack cycle against enterprise infrastructure,usingsoftwareagents,virtualmachines,and other means, including insider threats, lateral movement, anddataexfiltration."

TheuniquenessofBASresidesinitscapabilityto deliverconsistentandreliablesimulationassessmentwith minimalrisk,aswellasitsuseinwarningITandbusiness stakeholders about existing security posture gaps or confirming that security infrastructure, configuration settings, and detection technologies are functioning as intended. When utilised in addition to red team or penetration testing assessment, BAS can help validate to identifywhethersecurityoperationsandtheSOCstaffcan detectcertaincyberattacks.

2.6. Cloud Security

More and more businesses are moving to the cloud as a result of the significant benefits it provides. To combatonlinecriminals,acutting-edgepredictivesecurity modelmustbeusedifthecloudistobesecure.Attackson cloudserviceshavegrownoverthepasttenyears,making themariskywaytostoreortransfersensitivedata.Secure encryption, authentication, and audit logging are not typicallyprovidedbycloudservices.Othersdonotproperly separate user data from that of other cloud tenants who share the same space. Security experts believe that cloud securityneedstobestrengthenedasaresult.

Threats can now be detected by predictive security before an attacker even makes a move. It has the ability to identify attacks that get past other endpoint security. In order to strengthen security, businesses are implementing predictive security clouds, and some industrieshavealsoturnedtomulti-factorauthentication.

Althoughcloudcomputinghasmanyadvantages,including cost-effectiveness, scalability, and efficiency, it also has drawbacksthatcannotbeavoided.Theyareatoptargetfor attackersaswell.Insecureinterfaces,accounttheft,anddata breaches are all frequently brought on by improperly configuredcloudsettings.

2.7 IOT

The Internet of Things (loT) has completely changed the way we interact with devices. Despite some security issueswithloTdevices,whicharecommon,most consumers have a high level of confidence in them. loT devices are currently dominating the consumer markets. Smart gadgets, air conditioning with built-in intelligence, wearablefitnesstrackers,andvoice assistantslikeGoogle HomeandAmazonEchoareafewexamplesofloTdevices. DespitethefactthatloTprovidemoreconvenience,theyalso posegreaterriskstoauser'sdata.Intheeventthatadevice iscompromisedortakenover,itcouldessentially actasa listeningdeviceandstealdatafromthenetwork.

Hackershavediscoveredanewentrypointfor informationandaremakingthemostofit.Togainaccessto securitysystems,forinstance,hackersfrequentlyattemptto hackintoconnectedcameranetworksordevices.Ifproper securitymeasuresaren'ttaken,thenetworkisalsoexposed to software bugs or vulnerabilities by the communication protocolsusedtoconnectwithvariousdevices,increasing thepossibilityofoutbreaks. 

3. ADVANTAGES

Unauthorized access to data and network is protected.

©
Certified Journal | Page1171
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072

Earlydetectionofthreatsandvulnerabilities.  Protectionfromcyber-attacks/breaches.

4. CONCLUSION

With new and complex risks emerging every day, the cyberworld is continually evolving. Although most people thinktheyareprotectedfromcyberthreats,almosteveryone is actually vulnerable. There are always new strategies to defend your firm against these threats as new trends emerge. Keeping an eye out for any new cybersecurity trends you can ensure the security of your organisation. There are numerous new trends that you need carefully investigateinordertochoosetheonethatbestsuitsyour demands.

REFERENCES

CISSP: Certified Information Systems Security ProfessionalStudyGuide(Sybex)

Isc2 Cissp Certified Information Systems Security ProfessionalOfficialStudyGuide

2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

©
Page1172 

Turn static files into dynamic content formats.

Create a flipbook