{"id":1298,"date":"2023-07-05T02:33:00","date_gmt":"2023-07-05T01:33:00","guid":{"rendered":"https:\/\/icertpublication.com\/?page_id=1298"},"modified":"2023-10-30T06:53:40","modified_gmt":"2023-10-30T06:53:40","slug":"challenges-and-emerging-trends-in-cyber-security-vol2issue3","status":"publish","type":"page","link":"https:\/\/icertpublication.com\/index.php\/sodha-sari-vol-2-issue-03\/challenges-and-emerging-trends-in-cyber-security-vol2issue3\/","title":{"rendered":"Challenges and Emerging Trends in Cyber Security-vol2,issue3"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1298\" class=\"elementor elementor-1298\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d7f1d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d7f1d1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d81bb9c\" data-id=\"d81bb9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db2ad93 elementor-widget elementor-widget-heading\" data-id=\"db2ad93\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Challenges and Emerging Trends in Cyber Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a88754c elementor-widget elementor-widget-text-editor\" data-id=\"a88754c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-left: -0.1pt; text-indent: -0.1pt; text-align: center; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 0pt 0.1pt;\"><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #000000; background-color: transparent; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><b> Bora, Rajani<\/b><\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; margin-left: -0.1pt; text-indent: -0.1pt; text-align: center; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 0pt 0.1pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Assistant Professor, Department of Humanities and Social Sciences, JIET, Jodhpur.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c9766e elementor-widget elementor-widget-heading\" data-id=\"0c9766e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-739c1b9 elementor-widget elementor-widget-text-editor\" data-id=\"739c1b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Cyber Security plays a very important role in the field of information technology. Securing the information has become one of the biggest challenges in the contemporary society. Whenever we think about the cyber security, the first thing that comes to our mind is \u2018cyber crimes\u2019 which are increasing tremendously day by day. Various government authorities and private organizations are taking many measures to prevent these cybercrimes. Besides various measures cyber security is still a very big concern to all of us. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on latest cyber security techniques, ethics and the trends changing the face of cyber security.<\/span><\/p><p><b style=\"font-style: inherit; color: var( --e-global-color-bad270e ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\">Keywords<\/b><b style=\"font-style: inherit; color: var( --e-global-color-bad270e ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\"><i>: <\/i><\/b><i style=\"font-weight: inherit; color: var( --e-global-color-bad270e ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\">Cybercrime, Hacking, Phishing, Vishing, Cybersquatting, cyber security, social media, cyber ethics, android apps, cloud computing.<\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c72e01e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c72e01e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-174184b\" data-id=\"174184b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91fd2ac elementor-widget elementor-widget-heading\" data-id=\"91fd2ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Impact Statement<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d7138a elementor-widget elementor-widget-text-editor\" data-id=\"4d7138a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"justify\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"font-size: medium;\">Presently, most of the commercial, economic, social, cultural, governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government institutions, are carried out in cyberspace. Recently, many private companies and government organizations around the world are facing the problem of cyber-attacks and the danger of&nbsp;<\/span><\/span><span style=\"color: #0000ff;\"><a href=\"https:\/\/www.sciencedirect.com\/topics\/engineering\/wireless-communication\" target=\"Learn more about wireless communication from ScienceDirect's AI-generated Topic Pages\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"font-size: medium;\">wireless communication<\/span><\/span><\/span><\/a><\/span><span style=\"font-family: Times New Roman, serif;\"><span style=\"font-size: medium;\">&nbsp;technologies.&nbsp;Today\u2019s world is highly dependent on&nbsp;<\/span><\/span><span style=\"color: #0000ff;\"><a href=\"https:\/\/www.sciencedirect.com\/topics\/engineering\/electronics\" target=\"Learn more about electronic from ScienceDirect's AI-generated Topic Pages\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"font-size: medium;\">electronic<\/span><\/span><\/span><\/a><\/span><span style=\"font-family: Times New Roman, serif;\"><span style=\"font-size: medium;\">&nbsp;technology, and protecting this data from cyber-attacks is a challenging issue.&nbsp;The purpose of cyber-attacks is to harm individuals and companies emotionally &amp; financially.<\/span><\/span><\/p>\n<p align=\"justify\">\n<\/p><p align=\"justify\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"font-size: medium;\">The aim of this study is to comprehensively review and presented the standard advances presented in the field of cyber security and to investigate the challenges, emerging trends and recent developments of cyber security. It is expected that the comprehensive review study presented for ICERT on cyber security will be useful for further study.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83e36d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83e36d2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1747adc\" data-id=\"1747adc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2725ba elementor-widget elementor-widget-heading\" data-id=\"e2725ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Author\u2019s Profile<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b3851a elementor-widget elementor-widget-text-editor\" data-id=\"8b3851a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" lang=\"en-US\"><b>Dr. Rajani Bora<\/b><\/p><p class=\"western\" lang=\"en-US\" align=\"justify\"><b>Career Objective:<\/b><\/p><p class=\"western\" lang=\"en-US\" align=\"justify\">Her objective is to enhance the research &amp; academic expertise and disseminate knowledge among students in order to contribute to the society and nation to build up a generation that vibe with ideas and innovation.<\/p><p class=\"western\" lang=\"en-US\"><b>Academic Details:\u00a0<\/b><span style=\"font-style: inherit; font-weight: inherit; color: var( --e-global-color-bad270e ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\">PhD,\u00a0\u00a0<\/span><span style=\"font-style: inherit; font-weight: inherit; color: var( --e-global-color-bad270e ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\">MFC,\u00a0<\/span><span style=\"font-style: inherit; font-weight: inherit; color: var( --e-global-color-bad270e ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\">BBA<\/span><\/p><p class=\"western\" lang=\"en-US\" align=\"justify\">The incumbent possess 14 years of teaching experiences in different organizations. She used to teach UG and PG level of classes. Presently she is teaching at JIET-Jodhpur. She is credited with number of Research Paper published in National and International Journals and Conferences. She is well versed with offline &amp; online teaching processes also. Her primary research interest lies in the area of microeconomics. She is especially interested in how decisions with long-term strategic implications can disrupt our usual understanding of expected outcomes, and of exploring understudied business subjects where She possess some expertise. She has a demonstrated record of success as a teacher: this includes instructional seminars and cultural events for other faculty members and students in educational institutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5556998 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5556998\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c6eab5b\" data-id=\"c6eab5b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf1a576 elementor-widget elementor-widget-heading\" data-id=\"cf1a576\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">References<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc227ce elementor-widget elementor-widget-text-editor\" data-id=\"cc227ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Bocij, P. (2004). \u201cCyber Stalking &#8211; Harassment in the Internet age and How to protect your family\u201d. <\/span><i><span style=\"font-weight: 400;\">Library of Congress Cataloging-in-Publication Data<\/span><\/i><span style=\"font-weight: 400;\"> .<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Byrne, G. (ISBN: 1-59749-135-). <\/span><i><span style=\"font-weight: 400;\">\u201cBotnets \u2013 The Killer Web App\u201d,.<\/span><\/i><span style=\"font-weight: 400;\"> Syngress Publishing Inc.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Check point research report.<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">corrons, L. (n.d.). A Look back on cyber security 2012.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Erickson, J. (2008). <\/span><i><span style=\"font-weight: 400;\">\u201cHacking \u2013 The Art of Exploitation\u201d.<\/span><\/i><span style=\"font-weight: 400;\"> William Pollock Publishers, 2nd Edition.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">G Nikhita Reddy, G. U. (Sept. 2013). Study of cloud computing in health care industry. <\/span><i><span style=\"font-weight: 400;\">International Journal of scientific and engineering research<\/span><\/i><span style=\"font-weight: 400;\"> , 68-71.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">(2013). <\/span><i><span style=\"font-weight: 400;\">Global Risk 2013 eighth edition.<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Godbole, N. (2011). <\/span><i><span style=\"font-weight: 400;\">CYBER SECURITY: UNDERSTANDING CYBER CRIMES COMPUTER.<\/span><\/i><span style=\"font-weight: 400;\"> Wiley India.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Grossi, G. F. (n.d.). \u201cHomeland Security \u2013 Technology Challenges from. <\/span><i><span style=\"font-weight: 400;\">Library of Congress, US<\/span><\/i><span style=\"font-weight: 400;\"> , ISBN: 978-59693.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Krause, A. <\/span><i><span style=\"font-weight: 400;\">Computer security practices.<\/span><\/i><span style=\"font-weight: 400;\"> Net action report.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lyne, J. (n.d.). Eight trends changing network security. <\/span><i><span style=\"font-weight: 400;\">A sophos article<\/span><\/i><span style=\"font-weight: 400;\"> .<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Markus Jacobsson and Zulfikar Ramzan. <\/span><i><span style=\"font-weight: 400;\">\u201cCrime Ware- Understaning New Attacks and.<\/span><\/i><span style=\"font-weight: 400;\"> Symantec Press.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Milhorn, H. T. (2007). <\/span><i><span style=\"font-weight: 400;\">\u201cCyber Crime \u2013 How to Avoid Beconing a Victim\u201d.<\/span><\/i><span style=\"font-weight: 400;\"> Universal.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Stamp, M. (ISBN: 978-0-470-62639-9. ). <\/span><i><span style=\"font-weight: 400;\">\u201cInformation Security \u2013 Principles and Practices\u201d,.<\/span><\/i><span style=\"font-weight: 400;\"> John Wiley &amp; Sons Inc.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sunit Belapure, N. G. <\/span><i><span style=\"font-weight: 400;\">Understanding cyber security.<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The Hindu Business Line. (Tuesday Jul 31, 2007). <\/span><i><span style=\"font-weight: 400;\">The central bureau of investigation<\/span><\/i><span style=\"font-weight: 400;\"> .<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Challenges and Emerging Trends in Cyber Security Bora, Rajani Assistant Professor, Department of Humanities and Social Sciences, JIET, Jodhpur. Abstract Cyber Security plays a very important role in the field of information technology. Securing the information has become one of the biggest challenges in the contemporary society. Whenever we think about the cyber security, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1186,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1298","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/1298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/comments?post=1298"}],"version-history":[{"count":25,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/1298\/revisions"}],"predecessor-version":[{"id":4253,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/1298\/revisions\/4253"}],"up":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/1186"}],"wp:attachment":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/media?parent=1298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}