A Cyber Security Threats, Vulnerability, Challenges and Proposed Solution
Abstract
Internet security is one of the most pressing concerns in the twenty-first century when taken into consideration with other online concerns. This is because technological progress, the growth of communications, and the development of the cyber-Internet have all led to a revolution in the way information and data is sent, as well as in e-commerce. Because of this, it was important to find ways to protect information and data on the internet, as well as electronic money accounts and electronic wallets. Information security on the Internet, security of electronic operations, network security, and application security are all included under the umbrella term "cybersecurity." Cybersecurity refers to the measures that are taken to protect data and information stored on all electronic devices that are connected to the Internet from malicious attacks, hacking operations, data theft, and sabotage. All electronic activities and applications require some kind of cyber security, including websites, financial institutions (including banks, banks, and bank accounts), satellite operations (including military missions), and drone management.
References
- Zebari, D. A., Haron, H., Zeebaree, S. R., & Zeebaree, D. Q. (2018, October). Multi-level of DNA encryption technique based on DNA arithmetic and biological operations. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 312-317). IEEE.
- Ban Al-Omar, A. R. Al-Ali, Rana Ahmed, Taha Landolsi, “Role of Information and Communication Technologies in the Smart Grid”, in Journal of Emerging Trends in Computing and Information Sciences, 3(5), 707-716, 2012.
- Zebari, D. A., Haron, H., Zeebaree, D. Q., & Zain, A. M. (2019, August). A simultaneous approach for compression and encryption techniques using deoxyribonucleic acid. In 2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-6). IEEE.
- Asaad, R. R. (2021). Penetration Testing: Wireless Network Attacks Method on Kali Linux OS. Academic Journal of Nawroz University, 10(1), 7–12. https://doi.org/10.25007/ajnu.v10n1a9987
- I. Pearson, “Smart grid cyber security for Europe”, in Energy Policy, 39(9), 5211-5218, September 2011.
- Zebari, D., Haron, H., & Zeebaree, S. (2017). Security issues in DNA based on data Hiding: A review. International Journal of Applied Engineering Research, 12(24), 0973-4562.
- S. Clements and H. Kirkham, “Cyber-Security Considerations for the Smart Grid”, in Proc. of the IEEE Power and Energy Society General Meeting, 1-5, 2010.
- Asaad, R. R. (2020). Implementation of a Virus with Treatment and Protection Methods. ICONTECH INTERNATIONAL JOURNAL, 4(2), 28-34. https://doi.org/10.46291/ICONTECHvol4iss2pp28-34
- Jubair, M. A., Mostafa, S. A., Zebari, D. A., Hariz, H. M., Abdulsattar, N. F., Hassan, M. H., ... & Alouane, M. T. H. (2022). A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs. IEEE Access.
- Mondal, A., Paul, S., Goswami, R. T., & Nath, S. (2020). Cloud computing security issues & challenges: A Review. In (pp. 15): IEEE.
- Syed, A., Purushotham, K., & Shidaganti, G. (2020). Cloud Storage Security Risks, Practices and Measures: A Review. 2020 IEEE International Conference for Innovation in Technology (INOCON), Innovation in Technology (INOCON), 2020 IEEE International Conference For, 1–4. https://doi- org.sdl.idm.oclc.org/10.1109/INOCON50539.2020.9298281
- Balani, Z., & Varol, H. (2020). Cloud Computing Security Challenges and Threats. In (pp. 1-4): IEEE
- Ghaffari, F., Gharaee, H., & Arabsorkhi, A. (2019). Cloud Security Issues Based on People, Process and Technology Model: A Survey. In (pp. 196-202): IEEE
- Gupta, H., & Kumar, D. (2019). Security Threats in Cloud Computing. In (pp. 1158-1162): IEEE
- Kumari, C., Singh, G., Singh, G., & Singh Batth, R. (2019). Security Issues and Challenges in Cloud Computing: A Mirror Review. In (pp. 701-706): IEEE
- Rajab Asaad, R., & Luqman Abdulnabi, N. (2022). A Review on Big Data Analytics between Security and Privacy Issue. Academic Journal of Nawroz University, 11(3), 178–184. https://doi.org/10.25007/ajnu.v11n3a1446
- Xudong Wang and Ping Yi, “Security Framework for Wireless Communications in Smart Distribution Grid”, in IEEE Transactions on Smart Grid, 2(4), December 2011.
- Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1–10. https://doi.org/10.25007/ajnu.v6n3a70
- Boya Marqas, R., M. Almufti, S., & Rajab Asaad, R. (2022). FIREBASE EFFICIENCY IN CSV DATA EXCHANGE THROUGH PHP-BASED WEBSITES. Academic Journal of Nawroz University, 11(3), 410–414. https://doi.org/10.25007/ajnu.v11n3a1480
- Zhuo Lu, Xiang Lu, Wenye Wang and Cliff Wang, ”Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid”, in Proc. of the Military Communications Conference, 1830-1835, 2010.
- Asaad, R. R., Abdurahman, S. M., & Hani, A. A. (2017). Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image. Academic Journal of Nawroz University, 6(3), 40–45. https://doi.org/10.25007/ajnu.v6n3a76
- Abdulfattah, G. M., Ahmad, M. N., & Asaad, R. R. (2018). A reliable binarization method for offline signature system based on unique signer’s profile. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 14(2), 573-586.
- Cyber Security,
- Threats,
- Vulnerability,
- Attacks
Copyright (c) 2022 Author(s) of this work retain copyright and grant the journal right, publishing license of first publication with the work simultaneously licensed under Creative Commons Attribution International License (CC BY 4.0). Author(s) and ACAA permit unrestricted use, distribution, and reproduction in any medium, provided the original work with proper citation. ACAA publishing house is located in Oman / Sohar , Zip code 311. ISNI 0000 0004 9361 5767

This work is licensed under a Creative Commons Attribution 4.0 International License.