2023
DOI: 10.3390/electronics12061333
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

Abstract: Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 115 publications
(55 citation statements)
references
References 125 publications
0
23
0
Order By: Relevance
“…Virus/malware protection: In addition, this study suggests virus/malware protection based on the findings. Viruses are software programmes that are normally created by cybercriminals to infect vulnerable mobile devices and computers (Aslan et al 2023 ). Other malware such as Trojans can access a mobile device by hiding in a programme as a screen saver (Fuentes 2020 ).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Virus/malware protection: In addition, this study suggests virus/malware protection based on the findings. Viruses are software programmes that are normally created by cybercriminals to infect vulnerable mobile devices and computers (Aslan et al 2023 ). Other malware such as Trojans can access a mobile device by hiding in a programme as a screen saver (Fuentes 2020 ).…”
Section: Discussionmentioning
confidence: 99%
“…Other malware such as Trojans can access a mobile device by hiding in a programme as a screen saver (Fuentes 2020 ). They are destructive and can erase a device’s software programme (Aslan et al 2023 ). In order to protect the owner’s information, mobile devices need to be protected by an anti-virus programme that is regularly updated.…”
Section: Discussionmentioning
confidence: 99%
“…Cybersecurity practices significantly impact the quality of e-government services in Saudi Arabia. A robust cybersecurity framework is crucial for safeguarding sensitive data, maintaining service availability and preventing disruptions caused by cyber threats (Aslan et al, 2023;Renaud and Ophoff, 2021). Inadequate cybersecurity can lead to service downtime, data breaches and compromised user trust, reducing the quality of e-government services (Shah et al, 2022).…”
Section: 26mentioning
confidence: 99%
“…A robust infrastructure, including redundancy and disaster recovery measures, maintains uninterrupted service delivery and facilitates rapid response to security incidents (Adeodato and Pournouri, 2020; Alhawamleh, 2023; Pan et al , 2021). It supports the implementation of cybersecurity tools and solutions, such as firewalls, intrusion detection systems and encryption protocols, which safeguard sensitive data and prevent unauthorized access (AL-Hawamleh, 2023; Aslan et al , 2023).…”
Section: Related Workmentioning
confidence: 99%
“…The system gets infected just by users visiting specific websites [43], [44], [45]. Attackers are known to use valid websites and injecting malware into them which may include links, iFrames, JavaScript codes, cross site scripts and redirects [46]. Malicious code is injected into the browser when users visit infected pages, which then scans the system for vulnerabilities [47], [48].…”
Section: Drive By Downloadmentioning
confidence: 99%