Vol. 2 No. 1 (2025): MAAUN International Multi-Disciplinary Journal of Research and Innovations (MIMJRI)
Articles

Emerging Threats and Fortifying Defenses in Digital Age (A Review of cyber-security threats)

Published 07/14/2025

Keywords

  • cyber-storm,,
  • threat,
  • digital age,
  • cyber-security,
  • cyber-threats,
  • data mining,
  • cybercrime,
  • cyber terrorism
  • ...More
    Less

How to Cite

Jibrin, H., & Idris, A. (2025). Emerging Threats and Fortifying Defenses in Digital Age (A Review of cyber-security threats). Journal of Institute of Africa Higher Education Research and Innovation (IAHERI), 2(1). https://doi.org/10.59479/jiaheri.v2i1.85

Abstract

This paper reviews dynamic advantage of staying updated with the current computer related threats and countermeasures by providing overview on the current threats by reviewing the cybersecurity threats, vulnerabilities, countermeasures, and future trends. It begins with an overview of prominent cybersecurity threats, including malware, phishing, and Distributed Denial of Service (DDoS) attacks, highlighting their impact on systems and data. Furthermore, it examines emerging trends in cybersecurity, including new types of cyber-attacks and advancements in cybersecurity technologies, and discusses their potential implications for cybersecurity professionals. By understanding the current cybersecurity landscape and anticipating future trends, organizations and individuals can better prepare for and mitigate the risks posed by cyber threats. It also drafts a clear recommendations base on the findings. The review found that there is a daily attack of cyber- security using different tactics to infiltrate into others privacy.

References

  1. Smith, A. (2015). The science of cybersecurity: A review of literature. Information & Computer Security, 23(4), 410–445
  2. Gupta, B., Walia, G. K., & Saxena, K. K. (2018). An extensive survey on phishing attacks and their detection techniques. Computers & Security, 76, 1–25.
  3. Starodubtsev, Y. I., Balenko, E. G., Vershennik, E. V., & Fedorov, V. H. (2020, October). Cyberspace: terminology, properties, problems of operation. In 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) (pp. 1-3). IEEE. https://doi.org/10.1109/FarEastCon50210.2020.927 1282
  4. Berman, D. S., Buczak, A. L., Chavis, J. S., & Corbett, C. L. (2019). A survey of deep learning methods for cyber security. Information, 10(4), 122. https://doi.org/10.3390/info10040122
  5. Duić, I., Cvrtila, V., & Ivanjko, T. (2017, May). International cyber security challenges. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1309-1313). IEEE. https://doi.org/10.23919/MIPRO.2017.7973625
  6. Geluvaraj, B., Satwik, P. M., & Ashok Kumar, T. A. (2019). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies (pp. 739- 747). Springer, Singapore
  7. Rohith, C., & Batth, R. S. (2019, December). Cyber warfare: nations cyber conflicts, cyber cold war between nations and its repercussion. In 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 640-645). IEEE
  8. Gmcdouga, (2022). “Check Point Research: Cyber Attacks Increased 50Year.” https://blog.checkpoint.com/2022/01/10/check- point-research-cyber-attacks-increased-50-year- over-year/
  9. Goel, S., & Nussbaum, B. (2021). Attribution Across Cyber Attack Types: Network Intrusions and Information Operations. IEEE Open Journal of the Communications Society, 2, 1082-1093.
  10. Caprolu, M., Di Pietro, R., Raponi, S., Sciancalepore, S., & Tedeschi, P. (2020). Vessels cybersecurity: Issues, challenges, and the road ahead. IEEE Communications Magazine, 58(6), 90-96. https://doi.org/10.1109/MCOM.001.1900632
  11. Thamer, N., & Alubady, R. (2021, April). A Survey of Ransomware Attacks for Healthcare Systems: Risks, Challenges, Solutions and Opportunity of Research. In 2021 1st Babylon International Conference on Information Technology and Science (BICITS) (pp. 210-216). IEEE.
  12. Manjula M, V. a. (2023). Cyber Security Threats and Countermeasures using Machine and Deep Learning Approaches: A Survey . Journal of Computer Science , 2023, 19 (1): 20.56.
  13. Choo, K.-K. R., Smith, R. G., & McCusker, R. (2012). An empirical study of the effectiveness of cyber security governance in public sector organisations. In Proceedings of the 2012 45th Hawaii International Conference on System Sciences (pp. 4743–4752). IEEE.
  14. Aljawarneh, S. A. (2018). Cyber security awareness and education for cyber security students: A questionnaire analysis. Journal of King Saud University - Computer and Information Sciences, 30(4), 512– 519.
  15. Mirkovic, J., Prier, G., Reiher, P., & Hussain, A. (2004). Attacking DDoS at the source. IEEE Network, 18(1), 23–29.
  16. Garber, L., Huth, C., & Krawczyk, P. (2013). How to stay alive when the grid dies: Surviving a cyber attack. Communications of the ACM, 56(5), 35–37
  17. Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 581–590). ACM
  18. Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Designing and evaluating phishing training tools. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 4039– 4048). ACM.
  19. Kumar, S., Azees, M. A., & Bhaskaran, R. (2014). A survey on malware detection methods. Procedia Technology, 14, 435–442
  20. Andronio, N., Migliardi, M., & Daidone, A. (2018). A survey on ransomware: Evolution, prevention, and mitigation. Computers & Security, 78, 131–148
  21. Kaur, R., Kaur, M., & Singh, R. (2017). A survey of antivirus detection techniques. International Journal of Computer Applications, 164(4), 40–44.
  22. Stallings, W. (2017). Cryptography and network security: Principles and practices (7th ed.). Pearson
  23. Chowdhury, M. M. H., Mahmud, M. R., & Islam, S. H. (2017). A survey of network firewalls and their applications. In 2017 5th International Conference on Networking Systems and Security (NSysS) (pp. 1– 6). IEEE
  24. Hamid, B., Jhanjhi, N. Z., Humayun, M., Khan, A., & Alsayat, A. (2019, December). Cyber security issues and challenges for smart cities: A survey. In 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (pp. 1-7). IEEE.
  25. Al-Janabi, M., & Altamimi, A. M. (2020, November). A comparative analysis of machine learning techniques for classification and detection of malware. In 2020 21st International Arab Conference on Information Technology (ACIT) (pp. 1-9). IEEE.
  26. Albasir, A., James, R. S. R., Naik, K., & Nayak, A. (2018, April). Using deep learning to classify power consumption signals of wireless devices: An application to cybersecurity. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2032-2036). IEEE. https://doi.org/10.1109/ICASSP.2018.8461304
  27. Baptista, I., Shiaeles, S., & Kolokotronis, N. (2019, May). A novel malware detection system based on machine learning and binary visualization. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1-6). IEEE. https://doi.org/10.1109/ICCW.2019.8757060
  28. Hussain, F., Abbas, S. G., Pires, I. M., Tanveer, S., Fayyaz, U. U., Garcia, N. M., ... & Shahzad, F. (2021). A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks. IEEE Access, 9, 163412-163430.
  29. Yamaguchi, S. (2020, January). Botnet Defense System: Concept and Basic Strategy. In 2020 IEEE International Conference on Consumer Electronics (ICCE) (pp. 1-5). IEEE.
  30. Kambourakis, G., Kolias, C., & Stavrou, A. (2017, October). The mirai botnet and the iot zombie armies. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM) (pp. 267- 272). IEEE.
  31. Karim, A., Salleh, R. B., Shiraz, M., Shah, S. A. A., Awan, I., & Anuar, N. B. (2014). Botnet detection techniques: Review, future trends and issues. Journal of Zhejiang University Science C, 15(11), 943-983. https://doi.org/10.1631/jzus.C1300242
  32. Dhayal, H., & Kumar, J. (2018, April). Botnet and p2p botnet detection strategies: A review. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 1077-1082). IEEE. https://doi.org/10.1109/ICCSP.2018.8524529
  33. Krishnaveni, S., Sivamohan, S., Sridhar, S. S., & Prabakaran, S. (2021). Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Computing, 24(3), 1761-1779.