INFORMATION SECURITY

Cybersecurity trends

  • 1 University of Library and Information studies (ULIS)

Abstract

With the evolution of the digital world and the constant interaction in the real time world, even the casual user must be constantly aware of all possible threats and all possible protection actions or at least follow the trends. The vulnerabilities’ definit ions depend on their attacking area but with the huge space of data we never know what exactly is happening and to what is the harmed area. This article is going to provide a basic definition on the term cybersecurity and some of the most common threats along with giving some real vulnerabilities with their impact for the past decade. And as each action needs the actor, at the end there are some of the most popular academies which provide qualitative education to those who want.

Keywords

References

  1. Dimitrov, W. (2017). ICT Security Trends. Sofia: Avangard, ISBN 978-619-160-766-2
  2. CyBOK (October 2019). Retrieved from https://www.cybok.org/media/downloads/cybok_version_ 1.0.pdf
  3. StatCounter. (n.d.). Retrieved from https://gs.statcounter.com/
  4. CVE details (n.d.). Retrieved from https://www.cvedetails.com/
  5. Petkova, L. (2019). SEO SPAM AND MALWARE. Proceedings Knowledge Society and 21st Century Humanism (pp. 407-415). Sofia, Bulgaria: UNIBIT., ISSN 2683-0094
  6. Kasperski (2021). What is Cyber Security? Retrieved from https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
  7. IBM (2021). What is cybersecurity? Retrieved from https://www.ibm.com/topics/cybersecurity
  8. Mallik, Avijit. (2019). Man-in-the-middle-attack: Understanding in simple words
  9. Cybersecurity&Infrastructure Security Agency (June 2020). Retrieved from https://us-cert.cisa.gov/ncas/alerts/aa19-339a
  10. Malwarebytes (2021). Retrieved from https://www.malwarebytes.com/
  11. FBI (2021). Retrieved from https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/romance-scams
  12. Cyberint Research (March 2021). Dearcry Ransomware Microsoft Exchange Exploited. Retrieved from https://blog.cyberint.com/dearcry-ransomware-microsoft-exchange-exploited
  13. SANS (2021). SANS Cyber Academies. Retrieved from https://www.sans.org/about/academies/
  14. Lewis, J. A. (2019, January). The cybersecurity workforce gap. Retrieved from https://www.csis.org/analysis/cybersecurity-workforce-gap
  15. US Cyber Challenge (2021). Retrieved from https://www.uscyberchallenge.org/
  16. CyberCamp (2021). Retrieved from https://www.cybercamp.co/academy

Article full text

Download PDF