Cyber Security and quality education: Recent Cyber-Attacks as a Challenge to National Economic Security

Authors

  • Mr. Masood Ahmed Siddiqui Research Scholar & Lecturer, Government College University, Hyderabad. Author
  • Mr. Najam Uddin Sohu Government College University, Hyderabad. Author
  • Mr. Hakim Ali Zardari Segi University, Kota Damasara, Malaysia & Government College University, Hyderabad, Pakistan Author

Keywords:

Quality Education, Data Innovation, Cyberattacks, Network Protection, Arising Patterns, Significant Administration

Abstract

Right now, a large portion of the financial, business, social, and governmental activities and cooperation’s of nations at all levels, including people, NGOs and government establishments, carried out on the cyberspace. As of late, numerous privately owned businesses and government Associations all throughout the planet are dealing with the issue of cyberattacks and the danger of remote correspondence innovations. Today it relies to a great extent upon the world. in some different cases, cyberattacks can have military establishment or diplomatic purposes. A portion of harms incorporate P.C infections, information splits, Data Distribution System (D.D.S), and other attack vectors. To this end, several Associations utilize numerous answers for forestall harm. brought about by digital attacks. Online protection follows ongoing data about the most recent IT information. Up until now, specialist’s all throughout the planet have proposed different strategies to forestall cyberattacks or decrease the harm they cause. A portion of the techniques are in the careful stage, while others are in the review stage. The target of this review is to completely look at and audit the standard administrations introduced in the field of network safety and inspect the difficulties, shortcomings and qualities of the proposed techniques. Different sorts of new attacks by relatives are examined exhaustively. Standard security structures are examined with the set of experiences and systems of original online protection. It additionally shows arising patterns and ongoing advancements in online protection and security dangers and difficulties. The thorough audit study is relied upon to be led for Itself and online protection specialist’s. will be valuable.

https://doi.org/10.5281/zenodo.10116076

References

Aghajani, G., Ghadimi, N., 2018. Multi-objective energy management in a micro-grid. Energy Rep. 4, 218–225.

Ahmed Jamal, A., et al., 2020. A review on security analysis of cyber physical systems using machine learning. Mater. Today: Proc.

Akhevan-Hejezi, H., Mohsen Ian-Rad, H., 2017. Power systems big data analytics: An assessment of paradigm shift barriers and prospects. Energy Rep. 4, 91–100.

Al Shaer, D., et al., 2020. Hydroxamate siderophores: Natural occurrence, chemical synthesis, iron binding affinity and use as Trojan horses against pathogens. Eur. J. Med. Chem. 208, 112791.

Alghamdi, M.I., 2021. Determining the impact of cyber security awareness on employee behavior: A case of Saudi Arabia. Mater. Today: Proc...

Al-Ghamdi, M.I., 2021. Effects of knowledge of cyber security on prevention of attacks. Mater. Today: Proc...

Alghamdie, M.I., 2021. A novel study of preventing the cyber security threats. Mater. Today: Proc...

Alhayanie, B., et al., 2020. Best ways computation intelligent of face cyber-attacks. Mater. Today: Proc...

Alibasic, A., et al., 2016. Cybersecurity for smart cities: A brief review. In: International Workshop on Data Analytics for Renewable Energy Integration. Springer.

Alkatheiries, M.S., Chaudhary, S.H., Alqarni, M.A., 2020hr. Seamless security apprise method for improving the reliability of sustainable energy-based smart home applications. Sustain. Energy Technol. Assess. 45, 101219.

Alzubaidi, A., 2021. Cybercrime awareness among Saudi nationals: Dataset. Data Brief 36, 106965.

Amir, M., Givargis, T., 2020. Pareto optimal design space exploration of cyber–physical systems. Internet Things 12, 100308.

Arend, I., et al., 2020. Passive- and not active-risk tendencies predict cyber security behavior. Comput. Secur. 97, 101964.

Ashraf, J., et al., 2021. IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustainable Cities Soc. 72, 103041.

Aziz, A.A., Amtul, Z., 2019. Developing Trojan horses to induce, diagnose and suppress Alzheimer’s pathology. Pharmacal. Res. 149, 104471.

Baig, Z.A., et al., 2017. Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investing. 22, 3–13.

Baker M. Striving for Effective Cyber Workforce Development. Carnegie Mellon University, Pittsburgh, PA, USA: Software Engineering Institute, 2016.

Beechey, M., Kyriakopoulos, K.G., Lambotharan, S., 2021. Evidential classification and feature selection for cyber-threat hunting. Know.-Based Syst. 226, 107120.

Bullock, J.A., Haddow, G.D., Coppola, D.P., 2021. Cybersecurity and critical infrastructure protection. In: Bullock, J.A., Haddow, G.D., Coppola, D.P. (Eds.), Introduction to Homeland Security, sixth ed. Butterworth-Heinemann, pp. 425–497 (Chapter 8).

Cao, J., et al., 2021. Hybrid-triggered-based security controller design for networked control system under multiple cyber-attacks. Inform. Sci. 548, 69–84.

Cao, Y., et al., 2019. A topology-aware access control model for collaborative cyber–physical spaces: Specification and verification. Computer. Secure. 87, 101478.

Catota FE. Cybersecurity Capabilities in a Critical Infrastructure Sector of a Developing Nation. PhD Thesis. Carnegie Mellon University Department of Engineering and Public Policy, 2016.

Creswell J. Research Design: Qualitative, quantitative and Mixed Methods Approaches. Los Angeles: Sage, 2014.

Curbelo A, Cruz A. Faculty attitudes toward teaching ethical hacking to computer and information systems undergraduates’ students. In: Eleventh LACCEI Latin American and Caribbean Conference for Engineering and Technology, Cancun, Mexico, August 2013, p. 1–8. http://www.laccei.org/ LACCEI2013-Cancun/Refereed Papers/RP086.pdf (4 February 2019, date last accessed).

European Commission Tempus Project. Report on EU Practice for Cyber Security Education, TEMPUS (Trans-European Mobility Programme for University Studies) program, European Union, 2013.

General Auditor. The UK Cyber Security Strategy: Landscape Review, 2013. https://www.nao.org.uk/report/the-uk-cyber-security-strategy-land scape-review/ (4 February 2019, date last accessed).

Harasta J. Cyber security in young democracies. Jurisprudence 2013;20: 1457–1472.

Hathaway M, Demchak C, Kerben J, et al. Cyber Readiness Index 2.0, Potomac Institute for Policy Studies, 2015.

International Telecommunication Union, ABI Research. Global Cybersecurity Index, 2014. New York, USA: ABI Research.

International Telecommunication Union. ITU Cybersecurity Work Programme to Assist Developing Countries, 2007. Geneva, Switzerland: International Telecommunication Union.

Khan, M. S., Rahpoto, M. S., & Mangnejo, G. M. (2020). The Effect of the Financial Crisis on Corporal Well-Being: Apparent Impact Matters: Assessment of Contagion to Developing Economies. Research Journal of Social Sciences and Economics Review, 1(3), 232-238.

Khan, M. S., Rahpoto, M. S., & Talpur, U. (2021). The Effect of the Financial Crisis on Corporal Wellbeing: Apparent Impact Matters. In Internet of Everything and Big Data (pp. 25-34). CRC Press.

Khoso, A. A. K., Pathan, M. S. K., & Ahmed, M. (2022). Exploring The Impacts and Aftershocks of Covid-19 on Islamic Banking and Conventional Banking in Pakistan. International Research Journal of Management and Social Sciences, 3(1), 179-192.

Khoso, A. A., & Pathan, M. S. K. (2021). The Role of the Islamic Banking Industry in The Perspective of Global Financial Sector and its Impact on Pakistan's Economic Growth. International Research Journal of Education and Innovation, 2(2), 81-91.

Khoso, A. A., & Pathan, M. S. K. (2023). The Mediating Role of Job Satisfaction in The Relationship Between Organizational Culture and Employee Commitment in Islamic Banking. International Research Journal of Management and Social Sciences, 4(2), 13-30.

Khoso, A. A., Ahmed, M., & Pathan, M. S. K. (2022). Customer Satisfaction Standards According to Islamic and Conventional Banking System in Pakistan. International Research Journal of Education and Innovation, 3(2), 185-194.

Khowaja, I. A., Talpur, U., Soomro, S. H., & Khan, M. S. (2021). The non-banking financial institutions in perspective of economic growth of Pakistan. Applied Economics Letters, 28(8), 701-706.

Kortjan N, Solms RV. Cyber security education in developing countries: a South African perspective. South Afr Comput J 2012;52:29–41.

Kuckartz U. Qualitative Text Analysis. A Guide to Methods, Practice and Using Software. London: Sage, 2014.

Lehto M. Cyber Security Competencies: Cyber Security Education and Research in Finnish Universities. In: ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare & Security: ECCWS 2015, pp. 179–88. Hatfield, UK: University of Hertfordshire, Academic Conferences and Publishing International Limited, 2015.

Memon, A., & Khan, M. S. (2019). Industry-Academia Linkages of Jamshoro Universities: The Case of University of Sindh, Mehran University of Engineering and Technology & Liaquat University of Medical and Health Sciences. Mediterranean Journal of Basic and Applied Sciences (MJBAS)(Peer Reviewed International Journal), 3(3), 13-52.

Montgomery S. English and science: realities and issues for translation in the age of an expanding lingua franca. J Spec Transl 2009; 11:6–16.

Muhammad, S. K. P. (2023). THE INFLUENCE OF ORGANIZATIONAL CULTURE ON EMPLOYEE COMMITMENT AND TURNOVER INTENTIONS: A STUDY OF THE IMPORTANCE OF POSITIVE CULTURE FOR RETAINING EMPLOYEES. Global Research Journal of Management and Social Sciences (GRJMSS), 1(1), 85-94.

Muller L. Cyber security capacity building in developing countries: challenges and opportunities. Nor Inst Int Aff 2015;21:1–4.

Newmeyer K. Elements of national cybersecurity strategy for developing nations. Natl Cybersecurity Inst J 2015;1:9–19.

Organization of American States, Inter-American Development Bank. Cybersecurity. Are we Ready in Latin America and the Caribbean?, 2016.

Parekh A, Pawar A, Munot P, et al. Secure authentication using antiscreenshot virtual keyboard. Int J Comp Sci Issues 2011;8:534–37.

Pathan, M. S. K. (2022). The Impact of Emotional Intelligence on Leadership Effectiveness. International Research Journal of Management and Social Sciences, 3(3), 1-7.

Pathan, M. S. K. (2022). The Influence of Organizational Culture on Employee Commitment and Turnover Intentions. International Research Journal of Management and Social Sciences, 3(4), 34-43.

Pathan, M. S. K. (2023). Assessing the mediating role of job satisfaction in the relationship between organizational culture and employee commitment. International Research Journal of Education and Innovation, 4(1), 1-11.

Pathan, M. S. K., & Khoso, A. A. (2023). Misfortune Tragedy Findings in Pakistan: A Public Learning Perspective on Virtue of Economic Recovery Mindset. International Research Journal of Management and Social Sciences, 4(2), 1-12.

Pathan, M. S. K., Khoso, A. A., & Ahmed, M. (2022). Digital Model Anecdotes Through Artificial Intelligence in Socioeconomic and Islamic Investments. International Research Journal of Education and Innovation, 3(2), 195-209.

Pathan, M. S., Ahmed, M., & Khoso, A. A. (2022). Islamic Banking Under Vision of Green Finance: The Case of Development, Ecosystem and Prospects. International Research Journal of Management and Social Sciences, 3(1), 193-210.

Pollack M. Chile Transition to a Knowledge Based Economy Role of Chilean Professionals Abroad. 2004.

Rahat, S., & Pathan, M. S. K. (2021). Sustainable Climate Approach and in Context of Environment Economy: A Classical Analyze Matters. Neutron, 21(1), 40-45.

Schweitzer D, Humphries J, Baird L. Meeting the criteria for a Center of Academic Excellence (CAE) in information assurance education. J Comput Small Coll 2006;22:151–160.

Sledge C. Building Information Assurance Educational Capacity: Pilot Efforts to Date. Carnegie Mellon University, Software Engineering Institute, 2005.

Target AC. Cybersecurity Challenges in Developing Nations. PhD Thesis. Carnegie Mellon University Department of Engineering and Public Policy 2010.

UK Cabinet Office. The UK Cyber Security Strategy Protecting and Promoting the UK in a Digital World, 2011. https://www.gov.uk/government/publications/cyber-security-strategy (4 February 2019, date last accessed).

Von Solms R, Von Solms S. Cyber safety education in developing countries. Syst. Cybernet. Informatics 2015;13:14–19.

Wright MA. Improving cybersecurity workforce capacity and capability. Inf. Sys. Sec. Assoc. J 2015; 13:14–20.

Downloads

Published

2023-03-31

How to Cite

Cyber Security and quality education: Recent Cyber-Attacks as a Challenge to National Economic Security. (2023). International Research Journal of Management and Social Sciences, 4(1), 32-52. http://irjmss.com/index.php/irjmss/article/view/52

Similar Articles

1-10 of 191

You may also start an advanced similarity search for this article.