Challenges in Securing Data and Networks from Modern Cyber Threats

Authors

DOI:

https://doi.org/10.34306/ijcitsm.v4i2.160

Keywords:

Cybersecurity, Challenge, Cyber Threats, Network Security, Threat Detection

Abstract

In the era of digital transformation, organizations face an increasing array of cyber threats that target data and network security. This study focuses on the key challenges encountered in protecting sensitive information and network infrastructures from evolving cyberattacks, such as ransomware, phishing, and advanced persistent threats. The objective is to explore the current landscape of cyber threats and identify the major hurdles in implementing effective security measures. Through a mixed-method approach involving surveys and case studies, the research highlights the skills gap, complexity of network architectures, and the rapid advancement of threats as primary obstacles. The findings underscore the need for advanced security solutions, such as AI-driven threat detection and zero trust models, to enhance organizational resilience. Addressing these challenges is critical to safeguarding data, ensuring business continuity, and maintaining regulatory compliance.

References

S. AlDaajeh, H. Saleous, S. Alrabaee, E. Barka, F. Breitinger, and K.-K. R. Choo, “The role of national cybersecurity strategies on the improvement of cybersecurity education,” Computers & Security, vol. 119, p. 102754, 2022.

Y. Shino, F. Utami, and S. Sukmaningsih, “Economic preneur’s innovative strategy in facing the economic crisis,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 5, no. 2, pp. 117–126, 2024.

B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A systematic literature review on cloud computing security: threats and mitigation strategies,” Ieee Access, vol. 9, pp. 57 792–57 807, 2021.

M. Macas, C. Wu, and W. Fuertes, “A survey on deep learning for cybersecurity: Progress, challenges, and opportunities,” Computer Networks, vol. 212, p. 109032, 2022.

J. van der Merwe, S. M. Wahid, G. P. Cesna, D. A. Prabowo et al., “Improving natural resource management through ai: Quantitative analysis using smartpls,” International Transactions on Artificial Intelligence, vol. 2, no. 2, pp. 135–142, 2024.

Q. Li, Z. Wen, Z. Wu, S. Hu, N. Wang, Y. Li, X. Liu, and B. He, “A survey on federated learning systems: Vision, hype and reality for data privacy and protection,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 4, pp. 3347–3366, 2021.

W. Sejati, A. N. Pusoko, E. V. Aryadi, S. Andajani, D. P. A. Hidayat, E. Kurniyaningrum, and N. Z. O’Connor, “Flood routing and dam breach parameter calculation on sepaku semoi dam,” Aptisi Transactions on Technopreneurship (ATT), vol. 6, no. 1, pp. 136–148, 2024.

P. B. Prince and S. J. Lovesum, “Privacy enforced access control model for secured data handling in cloud based pervasive health care system,” SN Computer Science, vol. 1, no. 5, p. 239, 2020.

T. Winarti, E. Widodo, S. Handayni, and A. Nugroho, “Utilizing pearson correlation matrix to identify negative correlations among cryptocurrencies,” in 2024 3rd International Conference on Creative Communication and Innovative Technology (ICCIT). IEEE, 2024, pp. 1–7.

A. K. Jain, S. R. Sahoo, and J. Kaubiyal, “Online social networks security and privacy: comprehensive review and analysis,” Complex & Intelligent Systems, vol. 7, no. 5, pp. 2157–2177, 2021.

J. Manurung, E. Anom et al., “Strategi pemanfaatan media sosial sebagai sarana promosi sekolah musik di dotodo music edutainment,” Technomedia Journal, vol. 8, no. 2 Oktober, pp. 248–260, 2023.

R. Ferdiana et al., “A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods,” in 2020 4th International Conference on Informatics and Computational Sciences (ICICoS). IEEE, 2020, pp. 1–6.

L. Honesti, Q. Aini, M. I. Setiawan, N. P. L. Santoso, and W. Y. Prihastiwi, “Smart contract-based gamification scheme for college in higher education,” APTISI Transactions on Management, vol. 6, no. 2, pp. 102–111, 2022.

D. Ghelani, “Cyber security, cyber threats, implications and future perspectives: A review,” Authorea Preprints, 2022.

S. Rahayu, H. Haris, and Y. Candrah, “Web-based classification information system for web-based at pt. sintech berkah abadi,” ADI Journal on Recent Innovation, vol. 2, no. 2, pp. 208–215, 2021.

M. Ahsan, K. E. Nygard, R. Gomes, M. M. Chowdhury, N. Rifat, and J. F. Connolly, “Cybersecurity threats and their mitigation approaches using machine learning—a review,” Journal of Cybersecurity and Privacy, vol. 2, no. 3, pp. 527–555, 2022.

A. Bagaskara, R. Mulyana, and T. Kurniawan, “Memanfaatkan teknologi dalam administrasi komunikasi bisnis,” ADI Bisnis Digital Interdisiplin Jurnal, vol. 4, no. 2, pp. 122–126, 2023.

K. Albulayhi and Q. A. Al-Haija, “Early-stage malware and ransomware forecasting in the short-term future using regression-based neural network technique,” in 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2022, pp. 735–742.

D. Zegzhda, D. Lavrova, E. Pavlenko, and A. Shtyrkina, “Cyber attack prevention based on evolutionary cybernetics approach,” Symmetry, vol. 12, no. 11, p. 1931, 2020.

S. Watini et al., “Development of java hands startup business idea model by lean startup approach,” Startupreneur Business Digital (SABDA Journal), vol. 2, no. 1, pp. 43–50, 2023.

I. Magomedov, H. Murzaev, A. Zolkin et al., “Cyber literacy as one of the main discipline necessary in modern time,” European Proceedings of Social and Behavioural Sciences, 2020.

D. Hernandez, L. Pasha, D. A. Yusuf, R. Nurfaizi, and D. Julianingsih, “The role of artificial intelligence in sustainable agriculture and waste management: Towards a green future,” International Transactions on Artificial Intelligence, vol. 2, no. 2, pp. 150–157, 2024.

M. Jangjou and M. K. Sohrabi, “A comprehensive survey on security challenges in different network layers in cloud computing,” Archives of Computational Methods in Engineering, vol. 29, no. 6, pp. 3587–3608, 2022.

H. Tabrizchi and M. Kuchaki Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” The journal of supercomputing, vol. 76, no. 12, pp. 9493–9532, 2020.

N. Daswani, M. Elbayadi, N. Daswani, and M. Elbayadi, “The equifax breach,” Big Breaches: Cybersecurity Lessons for Everyone, pp. 75–95, 2021.

E. D. Wolff, K. M. GroWlEy, M. O. Lerner, M. B. Welling, M. G. Gruden, and J. Canter, “Navigating the solarwinds supply chain attack,” Procurement Law., vol. 56, p. 3, 2021.

D. Indiyati, U. Rahardja, U. Rusilowati, S. Millah, A. Faturahman, and A. Fitriani, “Enhancing human resources management with blockchain technology: A case study approach,” in 2024 3rd International Conference on Creative Communication and Innovative Technology (ICCIT). IEEE, 2024, pp. 1–6.

S. Maesaroh, H. Gunawan, A. Lestari, M. S. A. Tsaurie, and M. Fauji, “Query optimization in mysql database using index,” International Journal of Cyber and IT Service Management, vol. 2, no. 2, pp.104–110, 2022.

V. Schlatt, T. Guggenberger, J. Schmid, and N. Urbach, “Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity,” International journal of information management, vol. 68, p. 102470, 2023.

K. Zhao, J. Hu, H. Shao, and J. Hu, “Federated multi-source domain adversarial adaptation framework for machinery fault diagnosis with data privacy,” Reliability Engineering & System Safety, vol. 236, p.109246, 2023.

M. Khan and L. Ghafoor, “Adversarial machine learning in the context of network security: Challenges and solutions,” Journal of Computational Intelligence and Robotics, vol. 4, no. 1, pp. 51–63, 2024.

M. Sewak, S. K. Sahay, and H. Rathore, “Deep reinforcement learning in the advanced cybersecurity threat detection and protection,” Information Systems Frontiers, vol. 25, no. 2, pp. 589–611, 2023.

M. S. Islam, M. A. Rahman, M. A. Bin Ameedeen, H. Ajra, Z. B. Ismail, and J. M. Zain, “Blockchain enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey.” CMES Computer Modeling in Engineering & Sciences, vol. 138, no. 1, 2024.

Downloads

Published

2024-10-06

How to Cite

Shantilawati, ⁠⁠⁠Irma, Zanubiya, J., Fanani, F., Jensen, H., Millah, S., & Lutfiani, N. (2024). Challenges in Securing Data and Networks from Modern Cyber Threats. International Journal of Cyber and IT Service Management, 4(2), 88–96. https://doi.org/10.34306/ijcitsm.v4i2.160

Issue

Section

Articles