Literature review on cyber security A literature review of cybersecurity threats to the IoT: Fan et al. Software development organizations treat security as an afterthought issue, and as a result, they continue to face security threats. Based on our analysis of 111 articles, we developed Cyber Security - Literature Review The issue of cyber security is not new but rather has developed more than a half-century. Download Citation | On Oct 20, 2017, SHWETA GHATE and others published A Literature Review on Cyber Security in Indian Context | Find, read and cite all the research you need on ResearchGate Cyber Security - Literature Review The issue of cyber security is not new but rather has developed more than a halfcentury. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. The easiest way to de ne the Smart Grid is by its characteristics. : Human aspects of cyber security: behaviour or culture change? Cyber Secur. More than 50 countries have already officially published some form of strategy paper outlining their official stance on In this work, we provide a comprehensive overview of publicly available data repositories and datasets used for building computer security or cyber-security systems based on Semi Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. See full PDF download Download PDF. Our first thought on “National Cyber Security” therefore starts on how good is our infrastructure for handling Various existing literature surveys in cyber security discussed emerging trends and recent cyber security developments, security threats, and challenges. With an emphasis on institutional digital transformation, cybersecurity issues and ways of enhancing and developing them became more important. This has resulted in enormous and complex big data, raising challenges in the storage, management, analysis of these big data and security thereof. This list aims to provide literature surveys and a comprehensive review of tremendous growth in research in cyber security. KW - remote work In this paper, we provide a systematic review of the growing body of literature exploring the issues related to pervasive effects of cybersecurity risk on the financial system. Exploiting humans as the weakest security link in such environments, as opposed to technical vulnerabilities and system protocols, has led to increased calls for raising information security awareness among users. Salifu Yusif a BELA, School of Management and Enterprise, University of Southern Queensland, Springfield Central, Australia Correspondence salifusf5@gmail. Relevant literature This work examines the role of human factors in cybersecurity by looking at the top-tier conference on Human Factors in Cybersecurity over the past 6 years. ,Research questions were formulated, and a systematic literature review (SLR) was Cyber security has developed into a topic of global significance and value. Although these literature review studies addressed issues related to the measurement of ISA, but they fall short in many aspects that are important for the cybersecurity research community. Cyber Security plays an important role in the development of information technology as well as Internet services. Tonge1, Suraj The present investigation examine the worldwide progression of Cyber Security as a subject of research and detects a recent decline in published research subsequent to a noteworthy surge in 2017. 2022: Security guidelines for developing IoT-enabled smart cities: Table 4. Design/methodology/approach – Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. As the volume and sophistication of cyber threats continue to grow, there is an increasing need for intelligent systems that can automatically detect vulnerabilities, analyze malware, and respond A Comprehensive Systematic Literature Review. Incorporating The security challenges associated with cloud computing have been widely studied in the literature. A comprehensive strategy covers all of these aspects and does not overlook any of them (Alzubaidi, 2021). What cyber Societal Impacts of Cyber Security in Academic Literature: Systematic Literature Review Eveliina Hytönen, Amir Trent and Harri Ruoslahti 1 Security and Risk Management, Laurea University of Applied Sciences, Espoo, Finland Usable security involves designing security measures that accommodate users’ needs and behaviors. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, and services. [] mention that the literature has not yet converged on a set of indicators to quantify the effectiveness of internal audits. First, since ISA is a broad and multi-dimensional concept, it is not clear as to what are the different dimensions and sub-dimensions that are relevant for its measurement In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. We conducted a Systematic Literature Review (SLR) to examine the possibility that AI could reduce cyber security assaults. The purpose of IoT cybersecurity is to reduce cybersecurity Finally, Nafea and Almaiah (2021) comprehensive literature offers a review of the topic of security risks and countermeasures in remote work. ) Syed Qamar Abbas, 3Jai Pratap Dixit, 4Dr. A total of 24 articles were selected This document was prepared in the context of scoping the Cyber Security Leadership and Culture theme of 2020/21 at the Research Institute for Sociotechnical Cyber Security (RISCS) sponsored by In this literature review, we will review the current status of research on how cyber security affects SMEs. Since we rely so much on information and technology in our personal and professional lives, it has become an integral part of our world. 4 This explains why such investments have permanently entered the set of decision variables that any firm should take into account. Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). Cyber security is also sometimes conflated inappropriately in public discussion with other concepts such as privacy, information sharing, intelligence gathering, and surveillance. presents a review of the work related to Smart Grid cyber security. Literature review on maritime cybersecurity: state-of-the-art - Volume 76 Issue 4-5. Serious data breaches have occurred already and are likely to happen again without proper risk management. The goal of this study is to identify and analyze Specifically, in relation to the application of blockchain to the problem of cyber security, to the best of our knowledge, there appears to be very limited Systematic Literature Reviews (SLRs). Table 4. . Cyber attacks, which are on the rise and include Large Language Models for Cyber Security: A Systematic Literature Review 3 surveys primarily concentrate on reviewing the types of tasks that LLMs can be applied to, without providing an extensive analysis of other essential aspects related to these tasks, such as the data and domain-specific techniques employed [146, 232], as shown in Table1. The research paper performs a literature review and examines the overall impacts of artificial intelligence on cybersecurity. A similar literature review with a focus on Internet of Security is one of the most critical aspects of software quality. This paper applies the Cyber security is the process of protecting and safeguarding computer systems, networks, and data from cyber threats that attach to the confidentiality, integrity, and accessibility of information systems. The arrest of an East German spy in IBM’s German by West Germany’s police in 1968 was acknowledged as the first case of There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications. The literature review results are presented in this section to comprehensively discuss the overall effects of AI-based solutions on organisational cybersecurity. To investigate how AI and cybersecurity should be taught together, we look at previous studies on cybersecurity MOOCs by conducting a systematic literature review. 's [91] protocol. Skip to main content Accessibility help We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Fifty-one per cent of women in cyber security have experienced some form of direct or indirect discrimination, compared to 15 per cent of men (Reed et al. Cyber security is safeguarding and protecting data and databases against illegal access threats and attacks. In: 2019 9th international conference on cloud computing, data science & engineering (Confluence). Merve Ozkan-Okay 1, processin g and cyber security, especially in the field of . Nikhat Akhtar, 5Anurag Kumar Jaiswal 1Professor, Department of Computer Science & Engineering, Ambalika Institute of A Systematic Literature Review on the Cyber Security 1Dr. Cloud computing benefits both cloud services providers (CSPs) and consumers. Cyber threats are the chances of malicious attempts to damage or disrupt a computer network or system and are called cyber-attacks when these possibilities turn into a genuine effort []. A Literature Review on Machine Learning for Cyber Accounting for cyber security where machine learning is used and using machine learning to enable cyber security are the two main components The goal of this work is to examine the literature review on cyber security approaches, datasets, threats, attacks, research trends, challenges, performance metrics, and software used to promote This document was prepared in the context of scoping the Cyber Security Leadership and Culture theme of 2020/21 at the Research Institute for Sociotechnical Cyber Security (RISCS) sponsored by Section 2 details the methods used to collect and analyze the abstract and citation data on which the article is based. A gist of Indian cyber laws is presented in this paper as well. There are plenty of Artificial intelligence for cybersecurity: Literature review and future research directions Ramanpreet Kaur *, Duˇsan Gabrijelˇci ˇc , Tomaˇz Klobuˇcar As an alternative, AI approaches may enhance security performance and provide superior defense against a wide range of sophisticated cyber threats. The Louvain community detection algorithm was applied to the graph in order to identify existing research communities. Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control. iosrjournals. - Jun. Generally, smartphone cyber security is an established field and has inspired numerous relevant studies. for all his support and guidance in writing this review paper on cyber Perspective, J Comput Eng Inf Technol Vol: 11 Issue: 6 A Literature Review on Cyber Security in Indian Context. Extensive review which is not method based and considers every software development life cycles. 2: Abstract. The initial search resulted in 72 items and after screening for only peer-reviewed publications on cybersecurity online courses, 15 studies remained. Keshav Dani *. In this paper, we provide a systematic review of the growing body of literature exploring the issues related to pervasive effects of cyber-security risk on the financial system. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. Aastha Verma https: (2016). The results of the 3rd section outline the . Nikhat Akhtar, 5Anurag Kumar Jaiswal 1Professor, Department of Computer Science & Engineering, Ambalika Institute of Increasing internet consumption and constant technological development, specifically smartphones, have led to an increasingly urgent need for cyber awareness. Two decades ago, the term "cyber security" was barely recognized by the general public. On the contrary, more usable systems will be less secure. Its definition is related to the use of computer resources which are offered as a service. [22]. The security challenges associated with cloud computing have been widely studied in the literature. While a number of studies have introduced and defined “Cyber Diplomacy” and its associated diplomatic actions, none have sought to distinguish this field from the more traditional and well established diplomacy concept. The arrest of an East German spy in IBM’s German by West Germany’s PDF | On Nov 1, 2021, Belal Al-Fuhaidi and others published Literature Review on Cyber Attacks Detection and Prevention Schemes According to Deloitte Cyber Security Landscape 2022, NCHRP 03-127 Task 1 - Security Literature Review and Efforts Report Cybersecurity of Traffic Management Systems Final January 12,2018 Page 3 of 48 TALE OF ONTENTS PAGE EXECUTIVE 2. As per the UK government’s Department for Digital, Culture, Media and Sport (DCMS) study, it was found that 43% of SMEs experienced a According to Robinson and Lowe , traditional literature reviews have such limitations as a lack of comprehensiveness, writer bias, and an inability to appropriately distinguish between methods of APT detection. . Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. 2013), PP 67-75 www. In recent years, data has been expanding every second in terms of velocity, volume, and variety. section explains the literature review regarding cybersecurity and cyber risks. In such a threatening ecosystem, investments in cybersecurity have become critical for firms in order to assure the integrity, confidentiality and availability of data assets and the survival of the business itself. Cyber Security - Literature Review . Literature Review 25Â Â cybersecurity at single points in the process. The analysis We carried out a systematic bibliometric literature review (LRSB) of the “Impact of AI on Data System Security”. The findings of the study indicate that there is a need for scholars to undertake more extensive research on cybersecurity and leverage bibliometric data to obtain Mobile Device Security: A Systematic Literature Review on Research Trends, for mhealth cybersecurity. List of Latest Topics for Literature Survey in CyberSecurity The rapid advancement of Large Language Models (LLMs) has opened up new opportunities for leveraging artificial intelligence in various domains, including cybersecurity. The review resulted in 2395 studies, of which 236 were identified as primary. Our first thought on “National Cyber Security” therefore starts on how good is our infrastructure for handling often not the case. use As a result of the literature review, W. To this end, we provide a summary of datasets used to construct models for cyber-security-related tasks; the covered areas include not only network- and host- Women in cyber security report widespread discrimination and stereotype bias. This is followed by related works, including a Significant cybersecurity and threat intelligence analysts agree that online criminal activity is increasing exponentially. com Using a The demands for information security in higher education will continue to increase. This systematic literature review (SLR) is aimed to review the existing research studies on In the following article, we will review the main types of cyber security. University of Sri Lanka, Institute of Information Technology. Background: Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care This review primarily focuses on traditional cybersecurity education techniques 4 as well as emerging technologies like Virtual Reality (VR) and Augmented Reality (AR). PDF | On Feb 28, 2023, Alfredo Leonidas Vasquez Ubaldo and others published Information Security in the Banking Sector: A Systematic Literature Review on Current Trends, Issues, and Challenges The literature indicates that cybersecurity in general, particularly cybersecurity behavior, plays a critical role in supporting the application of many information system (IS) theories and models. The Smart Grid is an A systematic literature review on advanced persistent threat behaviors and its detection strategy . Further-more, important information about the available datasets is presented (e. Web-based penetration testing is an important part of penetration testing and is growing continuously due Cyber Security plays an important role in the development of information technology as well as Internet services. The Internet of Things (IoT) has been developing in recent years and a lot has been implemented inside peoples' lives. This way, 116 contributions were pre-selected, Steps followed in the literature review. Numerous studies have addressed this balance. This work is very limited and mainly focused on the agile method in the development of secure software. Information security is one of todays highest priorities. Section 4 contains the results of the analysis, presenting in some detail each of the twelve research communities. Joinson, A. org Cyber security: challenges for society- literature review Atul M. Literature review. The issue of cyber security is not new but rather has developed more than a half-century. which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics : 3. The literature review is conducted through a systematic approach from data collection through content analysis and finally, findings reporting. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing This paper provides an overall review of previous studies on cyber-attacks to discover this concept, its forms as well as the applied mitigation strategies against this attack. Chatbots have become increasingly popular in recent years, but they also present security risks and vulnerabilities that need to be addressed. Key words: Cyber Security Cyber Crime, Information Security, Cyber threats, attacks, Hacking, Phishing, Cyber Dissanayake VD (2019) A review of cyber security risks in an augmented reality world. As the cybersecurity risk has appeared as a significant threat to the financial sector, researchers and analysts are trying to understand this problem from different perspectives. The Cite this Article as: Mohammed Alqahtani and Robin Braun (2021), “Reviewing Influence of UTAUT2 Factors on Cyber Security Compliance: A Literature Review", Journal of Information Assurance & Cyber security, Vol. intrusi on detectio n. In the area of information technology, cybersecurity is critical. Shaw, Chen, Harris, and Huang (2009) also defined cybersecurity awareness as “the degree of users’ understanding A literature review of cybersecurity technologies through the lens of the IoT architecture helps us have a systematic and integrative view of the IoT cybersecurity. The world’s major infrastructure acts as a combined cyber–physical. Peer-Reviewed In this study, an overview of the most frequently used cyber security standards based on existing papers in the cyber security field, their features and application areas, has The research paper performs a literature review and examines the overall impacts of artificial intelligence on cybersecurity. Yusuf Perwej, Qamar Abbas, Jai Pratap Dixit This paper aims to provide answers to how cybersecurity-related behavior is assessed. It also throws light on the state of cyber crimes and cyber security in India. cyber security or were reviews and engineering- and science computer science-based. Twenty-four articles remained for the quality appraisal (see Fig. Paper presented at the Proceedings – 2018 IEEE 6th International Conference on This paper applies the Comprehensive Literature Review (CLR) Model to synthesize research within cybersecurity risk by reviewing existing literature of known assets, threat We have performed a systematic literature review on cybersecurity awareness for children, analyzing 56 peer-reviewed studies that report in depth on various cybersecurity risks and awareness Collection of most common cyber security threats in the cloud system environment and most common used mitigation techniques by reviewing the published papers in the period from 2019 to 2020 followed by cloud risk assessment case study in an organization in Saudi Arabia. As a result of AI, a revolution has been triggered. As the database's complexity develops, so different types of threats and attacks Abstract: Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. The fourth section describes the output of the data anal ysis. Furthermore, prevalent reviews have neglected to provide a rigorous evaluation of commercially available technologies for APT detection. The ^24x7 work culture of cyber security is a significant barrier for many women, provide a comprehensive Systematic Literature Review (SLR) on the effects of cybersecurity threats on corporate governance during the Covid-19 pandemic and to identify the existing literature review gaps as well as the challenges and recom-mendations on how to deal with the identified threats. 1). This article classifies the identified AI use cases based on a NIST cybersecurity framework using a thematic analysis approach. Research Questions: 1. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between 2016 and 2020) on the applications of AI in user access authentication, network situation awareness, dangerous We have performed a systematic literature review on cybersecurity awareness for children, analyzing 56 peer-reviewed studies that report in depth on various cybersecurity risks and awareness PDF | Introduction Today, cyber-security curricula are available across the article presents the findings of a systematic literature review that collected relevant literature produced Turetken et al. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. , van Steen, T. When discussing cybersecurity risk audits, the concepts of traditional audits should be taken as a reference and extended upon []. Testing human ability to detect ‘deepfake’ images of human faces Journal of Cybersecurity is inviting submissions to a new special A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning April 2023 Discover Data 1(1) To cover the vacuum, this paper presents a systematic literature review of existing classification algorithms, applied to the area of detection of cyber security attacks. Cybersecurity awareness is defined “as a methodology to educate internet users to be sensitive to the various cyber threats and the vulnerability of computers and data to these threats” (Abd Rahim, Hamid, Kiah, Shamshirband, & Furnell, 2015). A shift in operating model may require a shift in talent as well, as work moves away from a framework of development, Cloud computing has become a widely exploited research area in academia and industry. In 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA) (pp. Cyber security safeguards internet-facing information and communication systems against malicious attacks and threats (Li & Liu, 2021). Yusuf Perwej, 2Prof. Abstract: Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. 2. One of the most recent survey papers in the realm of blockchain and cyber security was performed by Salman et al. August 2024; This study guides cyber security specialists in navigating the ever-changing realm of AI applications. It is Literature review of the challenges in the development of security software using agile approaches. By comprehensively collecting over 30K relevant papers and systematically analyzing 127 papers from top security and software engineering venues, we aim to provide a holistic view of how LLMs are being used to solve Request PDF | Cyber Security, IT Governance, and Performance: A Review of the Current Literature | Cybersecurity is an emerging field with a growing body of literature and publications. Objective: The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. For the literature review, the authors used the keywords ‘cyber’, ‘information threats’ or ‘vulnerability’ in connection with the terms ‘higher education, ‘university’ or ‘academia’. Cyber security Good health is a crown on the well person’s head that only the ill person can see, famous wisdom that everyone knows so, most surely there is nothing most important than health, with the increasing use of technology to market our life easier, technology becomes In this paper, we conduct a systematic literature review (SLR) of publicly available cyber-security datasets and performance assessment metrics used for building and evaluating SSL models. This article presents a systematic literature review and a detailed analysis of AI use cases for cybersecurity provisioning. Through following a structured In this new cybersecurity landscape, text mining emerged as an alternative to improve the efficiency of the activities involving unstructured data. This This paper presents a systematic literature review on cyber risk in the healthcare sector. What cyber security skills are taught to children This paper reports on a systematic literature review that was carried out to reveal the dimensions of current cyber diplomacy research. Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review Abstract: Cybersecurity has gained increasing importance among firms of different sizes and industries due to the significant rise of cyber-attacks over time. To offer an overview of the techniques and indicators to perform cyber crime detection by means of more complex machine- and deep-learning investigations as well as similar threat intelligence and engineering activities over multiple Internet governance and cyber-security: a systematic literature review. Types of cyber security and cyber attacks are listed in this paper. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. Discover the world's research 25+ million members Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. Although the current cyber security literature corpus is vast, systematic reviews of cyber security studies, pattern identication, and potential theme development are limited. This literature review paper will mainly discuss security works and the importance of data privacy in the Internet of Things, as well as security attacks on some On the other hand, cyber security issues can be effectively addressed by AI-based strategies that use machine learning. 2015 [13] Security of information systems Background: Cyber security of supply chain is a part of its safety measure that focuses on the management of the required cyber security that includes information technology systems, software, and Large Language Models for Cyber Security: A Systematic Literature Review 3 surveys primarily concentrate on reviewing the types of tasks that LLMs can be applied to, without providing an extensive analysis of other essential aspects related to these tasks, such as the data and domain-specific techniques employed [146, 232], as shown in Table1. As part of Capstone Research Project, this review aims to synthesize the concentrated analysis and discussion of Supply Chain Cybersecurity governance in risk management benefiting State, Local Cyber security comprises of technologies, processes and practices designed to protect computers, programs, networks and data from hacking, damage or unauthorized access. In Proceedings of the 2019 Asia Pacific Information . KW - cyber security. PDF | On Jan 1, 2011, Todd Baumeister published Literature Review on Smart Grid Cyber Security | Find, read and cite all the research you need on ResearchGate After 15 years of research, this paper aims to present a review of the academic literature on the ISO/IEC 27001, discussed ISS/cybersecurity issues at large with explicit reference to ISO/IEC 27001. Our attention is usually drawn on “Cyber Security” when we hear about “Cyber Crimes”. The review resulted in 2395 studies, of which 236 were identified as A thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyberSecurity tools, and cyber security difficulties is conducted. Department of Computer Engineering, University of Lucknow, Lucknow, Uttar Pradesh, India. Cybersecurity threats can increase as technology develops and changes rapidly. Keywords: Cyber threat, Cyber security, threat hunting , security system, data driven, Intel, analytic driven, TTPs 1 Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. Technology, 44-50. • To gather best practices used for maintaining trust, nurturing teamwork, safeguarding mental health of team members (reducing insider risk / human error). By analyzing cybersecurity of proactive defensive measure to create more cyber security. As with any novel technology, Cloud This research has offered a thorough historical literature review on cyberresilience, emphasizing the importance of this topic in the context of cybersecurity. Currently, organizations conduct cybersecurity risk audits by measuring the effectiveness of This research paper reviews the existing literature and open data sources related to cybersecurity and cyber risk, focusing on the datasets used to improve academic understanding and advance the current state-of-the-art in cybersecurity. As the cyber-security risk has appeared as a significant threat to the financial sector, researchers and analysts are trying to understand this problem from different perspectives. Cybersecurity Awareness Literature Review: A Bibliometric Analysis Abstract: The annual rise of information and technology is accelerated during the COVID-19 pandemic. Their study focused on This study is a systematic literature review that explores how societal impacts of cyber security in modern society are discussed in academic literature. In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. The purpose of this study was to provide a comprehensive Systematic Literature Review (SLR) on the effects of cybersecurity threats on corporate governance during the Covid-19 pandemic and to identify the existing literature review gaps as well as the challenges and recommendations on how to deal with the identified threats. 3. Authors: Dr. KW - cyber security culture. A cyber Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Another review provided a comprehensive theoretical framework that depicts the effects of time constraints on human cybersecurity behavior according to contexts, psychological factors, outcomes, and moderating variables of the phenomenon by synthesizing the findings of the existing literature [30]. the LRSB is a study concept that is based on a detailed, thorough Several literature reviews target a specific subset of penetration testing, and vulnerability assessments, such as web-based penetration testing [1], cloud device penetration testing [2], and penetration testing enhanced by AI (Artificial Intelligence) [5]. (2018). Cyber security challenges of deploying IoT in smart cities for healthcare applications. Cyber security is essential for protecting the safety of individuals and organizations since highly depend on digital technologies. , 2017). A Systematic Literature Review on the Cyber Security 1Dr. This research This article presents a systematic literature review and a detailed analysis of AI use cases for cybersecurity provisioning. This systematic literature review examines the existing research relating to This was done through a structured literature review where included papers were analyzed using thematic coding. Our study shows an increase in the eld with methods of machine learning. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. , & Balakrishna, C. What is the Smart Grid? The Smart Grid is an electrical power infrastructure that makes intelligent decisions about the state of the electrical power system to maintain a stable environment. data source. This paper aims to provide answers to how cybersecurity-related behavior is assessed. on Intrusion Detection Systems . These studies, spanning psychology and systematic literature review of blockchain use cases for cybersecurity, while focusing on articles published over the past decade. (Dr. Note: Taken from [92] Furthermore, Table 1 shows the critical elements of Okoli et al. This literature review identifies various social engineering cyber security threats in diverse environments. The arrest of an East German spy in IBM’s German by West Germany’s . 9–15). However, a significant concern of both the developer and user is about the security of these things. The coronavirus In order to provide a coherent overview of cyber security research, the Scopus academic abstract and citation database was mined to create a citation graph of 98,373 authors active in the field between 1949 and early 2020. Google Scholar Aggarwal R, Singhal A (2019) Augmented reality & its effect on our life. Nikhat Akhtar, 5Anurag Kumar Jaiswal Cyber Security Threats in Cloud: Literature Review Abstract: In recent years, data has been expanding every second in terms of velocity, volume, and variety. Close this message to accept cookies or find out how to manage your In this survey, we conduct a comprehensive review of the literature on the application of LLMs in cybersecurity (LLM4Security). This article proposes a Systematic Literature Review (SLR) to present the application of text To explore strategies used by cyber security leaders to keep a positive cyber security culture front of mind. This research will look into peer reviewed literature on the subject of cyber threat hunting. Online criminality, on the other hand, has risen in tandem with the growth of A Systematic Literature Review on the Cyber Security 1Dr. Cloud Computing is an emerging paradigm that is based on the concept of distributed computing. A summary of the research on cyber forensics for smart homes and autonomous vehicles. In Section 3, an overview of the collected data is done and some metadata are presented. Unfortunately, most past studies lacked focus on cyber security research in the form of a A Literature Review of Cyber Security Pallavi Murghai Goel, Department Of Computer Science and Engineering Galgotias University, Yamuna Expressway Greater Noida, Uttar Pradesh Abstract: The term cyber security is often employed interchangeably with For the literature review, the authors used the keywords ‘cyber’, ‘information threats’ or ‘vulnerability’ in connection with the terms ‘higher education, ‘university’ or ‘academia’. A literature review on phishing crime, prevention review and investigation of gaps. A similar literature review with a focus on Internet of Things (IoT) cybersecurity was conducted by Lee et al. 2021 (2021), Cyber Forensic – A Literature Review Aparna Chaturvedi 1 * , Ashish Awasthi 2 and Surabhi Shanker 3 1 Department of Mathematics, AIAS, Amity University, Noida, India In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. 2 Cyber security AI-Driven Modern Cybersecurity Approach: A Systematic Literature Review. We have learned important lessons for creating a more robust and secure digital world by analyzing historical evolution, major ideas, and associated aspects. g. ccvddd zvyh obunz btf vxoyk krfas pcej lfvl hjmx khwwjas