1518 898

Title

History, Present 2021 and Future of Cyber Attacks

  Mohammed. I. Alghamdi 1 *

1  Department Engineering and Computer Sciences, Al-Baha University, KSA
    (mialmushilah@bu.edu.sa)


Doi   :   https://doi.org/10.54216/JCIM.080204

Received May 21, 2021 Accepted: November 01, 2021

Abstract :

Cyber-attacks are the attacks that target organizations and individuals either as a tool for other activities like identity theft, stalking, etc. or with a computer as a crime object like phishing, hacking, and spamming. Cyber-attacks are rapidly increasing and making cyber security a major concern currently. When launched successfully, cyber-attacks can cause massive damage to individuals and businesses. Hence, immediate response is mandatory to contain the situation in case cyber-attacks occur. In this paper, we will discuss the history, present and future of cyber-attacks and measures for organizations to prevent those attacks in future. The ever-elusive strategies and suspicious nature of criminals should also be identified. We have outlined some of the practices to prevent those attacks while recommending incidence response measures and updates in enterprises. 

Keywords :

cyber security , cyber-attacks , cyber criminals , cyber security practices , incidence response

References :

[1]   Lohrmann, D. (2021). Cyber Attacks: Is the ‘Big One’ Coming Soon? Government Technology. Retrieved 5 October 2021, from https://www.govtech.com/blogs/lohrmann-on-cybersecurity/cyber-attacks-is-the-big-one-coming-soon.html. 

[2]   Vaughan-Nichols, S.J. (2021). SolarWinds: The more we learn, the worse it looks. ZDNet. Retrieved from https://www.zdnet.com/article/solarwinds-the-more-we-learn-the-worse-it-looks/.

 

[3]   Novet, J. (2021). Microsoft’s big email hack: What happened, who did it, and why it matters. CNBC. Retrieved fromhttps://www.cnbc.com/2021/03/09/microsoft-exchange-hack-explained.html. 

 

[4]   World Economic Forum. (2020). The Global Risks Report 2020. World Economic Forum. Retrieved from https://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf.

 

[5]   Hwang, J., & Choi, K. S. (2021). North Korean Cyber Attacks and Policy Responses: An Interdisciplinary Theoretical Framework. International Journal of Cybersecurity Intelligence & Cybercrime, 4(2), 4-24.

[6]   Miller, T., Staves, A., Maesschalck, S., Sturdee, M., & Green, B. (2021). Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems. International Journal of Critical Infrastructure Protection, 35, 100464.

 

[7]   Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, 102248.

 

[8]   Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports.

 

[9]   McShane, M., Eling, M., & Nguyen, T. (2021). Cyber risk management: History and future research directions. Risk Management and Insurance Review, 24(1), 93-125.

 

[10] Cook, J. (2020). "British Airways fined £20m for data breach affecting 400,000 customers". The Telegraph. ISSN 0307-1235. 

 

[11] The Wired (2018). Marketing Firm Leaked Database With 340 Million Records. Retrieved 11 October 2021, from https://www.wired.com/story/exactis-database-leak-340-million-records/. 

 

[12] What to Do Right Now after the Equifax Hack | Mindsight. (2017). Retrieved 11 October 2021, from https://gomindsight.com/insights/blog/right-now-equifax-hack/. 

 

[13] Hackett, R. (2021). What to Know About the Ashley Madison Hack. Fortune. Retrieved 11 October 2021, from https://fortune.com/2015/08/26/ashley-madison-hack/

 

[14] Robiah, Y., Rahayu, S. S., Shahrin, S., Faizal, M. A., Zaki, M. M., & Marliza, R. (2010). New multi-step worm attack model. arXiv preprint arXiv:1001.3477.

 

[15] Cost of Cybercrime Study | 9th Annual | Accenture. (2021). Retrieved 11 October 2021, from https://www.accenture.com/us-en/insights/security/cost-cybercrime-study. 

 

[16] Keeper Security (2021). 2019 Ponemon Report. Retrieved 11 October 2021, from https://www.keepersecurity.com/ponemon2019.html. 

 

[17] 2021 Must-Know Cyber Attack Statistics and Trends - Embroker. (2021). Retrieved 11 October 2021, from https://www.embroker.com/blog/cyber-attack-statistics/

 

[18] Global Ransomware Damage Costs Predicted To Exceed $5 Billion In 2017. (2018). Retrieved 11 October 2021, from https://cybersecurityventures.com/ransomware-damage-report-2017-5-billion/.

[19] INTRUSION Inc. (2020). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Retrieved 11 October 2021, from https://www.globenewswire.com/news-release/2020/11/18/2129432/0/en/Cybercrime-To-Cost-The-World-10-5-Trillion-Annually-By-2025.html. 

 

 

 

 

 

 


Cite this Article as :
Style #
MLA Mohammed. I. Alghamdi. "History, Present 2021 and Future of Cyber Attacks." Journal of Cybersecurity and Information Management, Vol. 8, No. 2, 2021 ,PP. 71-83 (Doi   :  https://doi.org/10.54216/JCIM.080204)
APA Mohammed. I. Alghamdi. (2021). History, Present 2021 and Future of Cyber Attacks. Journal of Journal of Cybersecurity and Information Management, 8 ( 2 ), 71-83 (Doi   :  https://doi.org/10.54216/JCIM.080204)
Chicago Mohammed. I. Alghamdi. "History, Present 2021 and Future of Cyber Attacks." Journal of Journal of Cybersecurity and Information Management, 8 no. 2 (2021): 71-83 (Doi   :  https://doi.org/10.54216/JCIM.080204)
Harvard Mohammed. I. Alghamdi. (2021). History, Present 2021 and Future of Cyber Attacks. Journal of Journal of Cybersecurity and Information Management, 8 ( 2 ), 71-83 (Doi   :  https://doi.org/10.54216/JCIM.080204)
Vancouver Mohammed. I. Alghamdi. History, Present 2021 and Future of Cyber Attacks. Journal of Journal of Cybersecurity and Information Management, (2021); 8 ( 2 ): 71-83 (Doi   :  https://doi.org/10.54216/JCIM.080204)
IEEE Mohammed. I. Alghamdi, History, Present 2021 and Future of Cyber Attacks, Journal of Journal of Cybersecurity and Information Management, Vol. 8 , No. 2 , (2021) : 71-83 (Doi   :  https://doi.org/10.54216/JCIM.080204)