Preprint
Article

Rise in Cyber Threats in the United States and the Need for Advanced Cyber Risk Mitigation Tools and Adequate Skills to Combat Cyber Threats

Altmetrics

Downloads

113

Views

123

Comments

0

Submitted:

21 September 2024

Posted:

24 September 2024

You are already at the latest version

Alerts
Abstract
The United States is facing an alarming surge in cyberattacks, with data breaches rising by 72% since 2021, presenting grave national security risks. Notable incidents, including Chinese hackers attempting to access high-level government information and Iranian-linked cyber groups targeting U.S. water systems, highlight the fragility of critical infrastructure. These attacks pose dangers not only to national security but also to economic stability and public health, amplified by the rapid growth of interconnected technologies and global digitalization. In response to these escalating threats, the U.S. must take a multifaceted approach. Key strategies include strengthening cybersecurity education and workforce development, enforcing more rigorous regulatory frameworks, and enhancing preparedness through incident response and recovery planning. Additionally, increased international cooperation is essential to address state-sponsored cyber threats and foster a global framework for cybersecurity defense. As cyber threats continue to evolve, future efforts will rely on technological advancements such as artificial intelligence (AI) for real-time threat detection, the adoption of zero-trust security models, and the development of adaptive, resilient cybersecurity infrastructures. Collaboration between the public and private sectors, coupled with ongoing innovation and education, will be critical to maintaining national security and promoting economic growth in an increasingly interconnected digital landscape.
Keywords: 
Subject: Computer Science and Mathematics  -   Computer Science

Introduction

The world is more connected now than it has ever been before. Since the world is interconnected, there will also be a rise in cybersecurity threats worldwide. Thus, due to this reason, cyber threats pose a significant problem to the U.S. national security and its economy. The rate at which cybersecurity threats have evolved is devastating and always escalates to something more preposterous. Cybersecurity attacks tend to impact infrastructure and government systems, private corporations, and financial institutions. As every year goes by, the scale and sophistication of the attacks posed by cybersecurity incidents increases. This exposes vulnerabilities that put both the national defense mechanisms and the economy of the US at risk.
These risks range from ransomware attacks on major cities and healthcare infrastructures to intellectual property theft that state actors typically sponsor. As technology improves every day, so does a country that needs to strengthen its cyber defenses to safeguard its economic interest for the future and, first and foremost, protect its citizens against cyber adversaries. Thus, cyber threats demand a coordinated and robust response to preserve a nation's national interest and economic stability. This paper is intended for policymakers and governmental agencies as the United States needs to combat the rising threats in the nation. Secondly, it is intended for research management and information technology experts as it will serve as the foundation for future research for researchers and allow information technology experts to make informed decisions when dealing with cyber security issues, especially at the national level.

The Rise and Impact of Increased Cyber Threats on U.S. National Security and the Economy

The United States has experienced increased recorded cyber threat attacks in recent years. Since 2021, there has been a 72% increase in data breaches, raising concerns about national security changes (St. John et al., 2024). In March 2024, the Department of Justice recognized an attempt by Chinese hackers to gain authorized access to the locations of certain dignitaries. In February 2024, another attack against U.S. National Security was recorded involving an Iranian Military ship that was sharing confidential U.S. information with rebels (CSIS, 2024).
Additionally, in May 2024, the US Environmental Protection Agency (EPA) released an alert to all water utilities requiring them to enhance cyber security protocol on drinking water systems, as they are mostly weak and susceptible to attack. The directive came after an Iranian-linked cyber group targeted the operations of multiple water and waste-water distribution systems in 2023. These attacks stem from a need to sabotage critical infrastructure, some of which often lack robust cyberattack protection systems and protocols.
There is a direct relationship between increased cyber threats and threats to national security. Cyberspace is a vast community consisting of global networks and systems. Social networking platforms provide avenues for spreading propaganda, misleading information, and calling for incitement, which are all direct threats to the safety and security of the nation. Several government and institutional databases are available online today, compromising their security (Younes, 2024). Bad actors can become privy to national security issues without knowing where to look. There is increased transfer of classified information concerning military, political, social, and economic services in cyberspace, jeopardizing national security and privacy (Younes, 2024).
The advent of technology has bridged gaps between international markets and economies, boosting international relations and evolving the world market into a global village. In such an interconnected marketplace, cyber threats can significantly affect a nation's economic growth. For instance, in the water/wastewater systems attacks in 2023, the EPA warned against leaving the security of critical operations and infrastructure to chance. The effect of unauthorized access or control of a small town’s water distribution system could drastically affect public health, triggering a snowball effect that will likely affect the town’s day-to-day business operations; imagine the effect on a national scale. Increased cybersecurity threats could directly lead to “sabotage of critical infrastructure, denial of service of critical systems, theft of industrial trade secrets, and violations and safety regulations that lead to life-threatening occurrences for workers” (Corallo et al., 2020). These impacts could significantly affect the nation’s growth in international markets and cause severe economic unrest.

Reasons For Increased Threats

The demand for qualified cybersecurity professionals in the job market is high compared to prior years. Considering the steady technological advancement over the years, the talent gap is high, according to findings from the World Economic Forum (2024). The talent gap is more prevalent in Asia-Pacific, which accounts for 2.5 million cybersecurity professionals, and North America, which has a current shortage of approximately 522,000 workers (Strategic Cybersecurity Talent Framework, 2024). The Forum projects that by 2030, there will be a worldwide shortage of an estimated 85 million workers within the cybersecurity workforce. This is an ongoing development that cybercriminals have taken advantage of to execute their nefarious plans and activities (Thakur, 2024). In some instances, their operations can progress stealthily and unhinged until the damage is irreparable due to insufficient workforce needed to constantly monitor systems and processes or lack of skilled personnel to detect and mitigate threats and vulnerabilities identified in business operations.
Due to the rapid evolution of the technological landscape and digitization and automation of business processes, cybercriminals have also upgraded their techniques and tools in exploiting systems. The advent of Generative AI models has enhanced the expertise and productivity of hackers to cover a broader reach of system applications and networks (Yigit et al., 2024). Examples of such tools are deepfakes for manipulating images, WormGPT, which operates like ChatGPT but is modeled on tons of hacking-related data sets and programming for malicious intent, and PoisonGPT, which is based on a Language Learning Model, which produces biased and harmful information using bots for illegal purposes (Capraro et al., 2024).
The Internet of Things can be termed as devices that are interconnected to the Internet to pull in data to analyze or share and generate insights for prompting actions in a system application (Singh, 2023). They are utilized in physical devices such as smart home appliances, security systems, lighting systems, traffic light systems, and speed camera monitoring systems. With different networks exchanging information across diverse systems, there is a high probability that a breach in one network is an easy pick for attackers to exploit this vulnerability and transcend across other interconnected networks. Hackers can further harvest people’s credentials and sensitive information due to a lack of robust security and encryption management systems to mask and obfuscate people’s information. For instance, Roku, a popular streaming service, was a cyberattack victim twice in 2024, which implicated over 576,000 user account details (Towfighi, 2024). Cybercriminals managed to hack the system using login credentials stolen from other sites to infiltrate Roku and its devices.
Non-compliance with third-party vendor applications is often overlooked by vendors and businesses alike. Third-party vendors usually ignore industry security standards and data privacy regulations (Vajjhala & Strang, 2023). In addition, most company security policies typically do not include a laid-out security framework for monitoring and testing third-party tools and equipment before integrating them into their systems. As a result, this creates a loophole for malicious attackers to exploit this vulnerability. An example is the famous Equifax data breach, which occurred in 2017 due to lacking a robust patch management system (Thakur, 2024). According to the 2024 Risk Management Third Party Study conducted by Prevalent Inc., about 61% of companies were susceptible to third-party attacks in 2023 (Third-Party et al. Study, 2024).

Emerging Technologies

In advancing innovation and developing sophisticated tools and applications, emerging technology has risen as the propeller in the digital landscape, changing the trajectory of technology and its impact in every sphere of life across different sectors and industries. Even though change generates disruption in the routine ways of solving problems and meeting the needs of society, emerging technology has increased productivity and streamlined business processes, eliminating redundancy and the mundane methods of handling everyday tasks. Generative AI, the Internet of Things (IoT), and Quantum Computing are the various types to be addressed.
Generative Artificial Intelligence has rapidly garnered global attention because its vast and endless possibilities have impacted all fields of work. It is generated from data models that constitute different algorithms to detect trends and patterns, communicate with data, and generate outputs to inform decisions (Gupta et al., 2024). It must be noted that the data generated is volatile since Generative AI is still in its experimental stages, and thus, insights generated cannot be 100% accurate (Wade, 2024). Relying on its output without further support from accredited sources can render your decisions inaccurate and faulty. However, the potential for growth in this field is endless. It is adaptive and can feed off data from different sources when triggered for an answer and recognize trends and patterns. In addition, it is constantly being refined for self-improvement to a state where it can generate accurate answers based on the user’s request/prompts. This technology is incorporated in self-driving cars, facial recognition software, ChatGPT, and Microsoft Pilot, which are used to solve specific problems, improve efficiency, and meet the needs of its users.
Another emerging technology worth elaborating on is the Internet of Things, which uses physical devices interconnected across different networks to collect data, exchange, and generate insights for its users (Singh, 2023). IoT devices have made giant leaps across different facets of industries. Homeowners utilize IoT devices for their smart home architectures, including home appliances, lighting systems, security systems, and television systems. Apple has adopted this technology in developing Siri, which serves as voice assistant software and can be interconnected with other devices to perform user actions (Roslan et al., 2023). Another example is the use of smartwatches to detect vital health statistics of an individual with the use of its embedded sensors, which read a person’s body movement, heart pressure, weight, cholesterol levels, and other health information. Health workers can attend to patients remotely using IoT devices without the stress of meeting patients at health facilities, especially during emergencies (Balasundaram et al., 2023). In agriculture, many farmers utilize IoT devices and AI-driven technology for crop harvesting and weather predictions (Fuentes-Peñailillo et al., 2024).
In addition, Quantum computing is an emerging technology whose benefits cannot be overemphasized. Quantum computing employs the principles of quantum mechanics to solve complex computations swiftly and efficiently, beyond human strength or the usual computer potential (Kaswan et al., 2023). It can work with large data sets and generates results in the shortest possible time. Quantum computing is utilized in financial modeling by many financial corporations like Bloomberg LP, the stock market, investment markets, and the cryptocurrency market. In healthcare, Jansen Pharmaceuticals is leveraging quantum computing to research how it can be employed in molecular simulations and used in drug discovery and development (Mishra et al., 2024). In cryptography, quantum computing is incorporated to develop solid and resilient cryptographic tools for encrypting data (Sonko et al., 2024).

Risks Associated with Emerging Technolgies

One of the main risks associated with emerging technology is cybercriminals' exploitation of personal data. Data from different networks are exchanged constantly over a broad range, so the risk of exploitation is very high. This is because an attack on one network can be leveraged to attack all networks and harvest the credentials of users (Saeed et al., 2023). Cybercriminals can lay a siege on company systems and applications(ransomware). Also, to meet the market demand for products and services, some companies hastily develop applications, incorporating emerging technology tools and ignoring the implementation of robust encryption tools for securing users’ sensitive information (Oguta, 2024). Thus, these technology products must implement a robust framework to ensure that users' data is well-secured and unavailable to unauthorized users.
Ethical and privacy violations are another risk associated with emerging technologies. Concerns have been raised about the ethical violation of emerging technologies based on their application and vendors' wrongful use of data (Dhirani et al., 2023). Vendors have used social media data to sell user information to advertising companies and other corporations to generate pop-ups for user-preferred ads without their consent. Some go as far as sending emails and telemarketing materials to users. This infringes on the individual privacy of the user and violates the code of ethics, leading to data compromise and misuse.
Furthermore, emerging technologies introduced security gaps that bring about risks. As emerging technology constantly improves accuracy and efficiency, there have been notable signs of lax security measures in utilizing them (Kumar et al., 2024). Attackers can leverage botnets to attack the networks and release a distributed denial of service on all devices connected across different networks. This can cause extensive harm to the users and the company. The business’ reputation can diminish, and operations may be halted. Customers will lose trust in their products and brands. Thus, there is a need for the enforcement of security regulations and privacy policies to protect customer data from being delivered into the wrong hands and also to secure companies against cyberattacks.

The Need for Advanced Risk Mitigation Tools

The escalating complexity and frequency of cyber threats in the United States have rendered traditional perimeter-based defenses and conventional strategies inadequate and motivated a shift towards more sophisticated and adaptive approaches (Maity et al., 2022). While current cybersecurity strategies provide baseline protection, they struggle to keep pace with rapidly evolving tactics employed by cybercriminals. Organizations are integrating emerging technologies into their cybersecurity frameworks to address this challenge.
Artificial Intelligence and Machine Learning are at the forefront of this evolution of advanced risk mitigation tools, as they offer real-time threat detection and automated incident response (Dey & Hossain, 2023). Zero Trust Architecture has also emerged as a crucial model that ensures the continuous verification of all access to resources (Jaiswal et al., 2022). Behavioral analytics complements this approach by monitoring user activity to detect potential security threats. As quantum computing threatens traditional encryption methods, the development of quantum-safe cryptography is also underway (Tawalbeh et al., 2023). In the same vein, blockchain technology is being explored for its potential to enhance data verification and integrity, while Extended Detection and Response (XDR) platforms have started gaining some traction by providing a unified solution for comprehensive threat detection and response across an organization's entire infrastructure (Dey & Hossain, 2023).
Integrating these advanced tools with existing security infrastructures is critical to creating a cohesive and layered defense system. However, this integration poses challenges such as compatibility issues, resource constraints, and the need for specialized skills (Maity et al., 2022). Organizations must prioritize interoperability, scalability, and continuous monitoring to ensure their cybersecurity infrastructure grows alongside their needs. Cloud-based capabilities and flexible deployment models provide a gateway for adaptability to evolving requirements. Comprehensive employee training programs and awareness campaigns are also essential to mitigate human error and ensure the effective use of these tools (Jaiswal et al., 2022).
As organizations navigate this complex landscape, they must balance leveraging cutting-edge tools and ensuring seamless integration with existing systems. Maintaining optimal performance and security requires continuous monitoring, testing, and refinement. By combining emerging technologies with traditional security measures and fostering a proactive approach to cybersecurity, organizations can better protect themselves against the ever-changing cyber landscape, reducing the risk of data breaches, financial losses, and reputational damage (Tawalbeh et al., 2023).

Cybersecurity Skills Gap

The cybersecurity landscape faces a critical challenge through a significant skills gap. As cyber threats become increasingly sophisticated and complex, the demand for qualified cybersecurity professionals has outpaced the available supply and has left many organizations vulnerable to attacks due to understaffed security teams and limited access to essential expertise (Muro et al., 2022). This global issue is particularly acute in the United States, with millions of unfilled cybersecurity positions worldwide (ISC², 2022). The shortage stems from increased demand across sectors, the need for specialization in areas like threat intelligence and cloud security, and the risk of burnout in understaffed teams (Talamantes, 2023). Addressing this gap requires attracting new talent and continuously upskilling and reskilling the existing workforce to stay updated on the latest tools, technologies, and attack vectors (Zammitti et al., 2023).
To combat modern cyber threats effectively, professionals must possess a blend of technical and soft skills, including mastery of network security, encryption, cloud security frameworks, incident response capabilities, effective communication, critical thinking, and the ability to collaborate across departments (Muro et al., 2022). Understanding risk management principles and business objectives is crucial for aligning security measures with organizational goals (Talamantes, 2023). A multi-pronged approach is required to address the cybersecurity skills shortage.
This would involve educational institutions adapting their curricula, professional certifications providing valuable credentials, organizations establishing in-house training programs, and public-private partnerships creating initiatives to close the skills gap (Zammitti et al., 2023). Reskilling initiatives and promoting diversity and inclusion in the cybersecurity workforce can tap into new sources of talent and bring fresh perspectives to the field (ISC², 2022). As the threat landscape evolves, continued investment in human capital is crucial for sustaining robust cyber defenses and protecting critical assets in the digital age (Muro et al., 2022).

The Growing Need for Cybersecurity Professional

The demand for skilled cybersecurity professionals is surging in an era of increased cyber threats. As businesses across various sectors become progressively interconnected, the risks and vulnerabilities associated with cyberattacks are expanding exponentially. High-profile data breaches have become alarmingly frequent, widening the gap between the need for cybersecurity expertise and the availability of qualified professionals. This article explores the critical cybersecurity talent shortage and examines how corporate strategists can play a pivotal role in attracting and retaining top cybersecurity professionals.

The Critical Shortage of Cybersecurity Professionals

The global demand for cybersecurity experts has intensified in recent years due to the sophistication and frequency of cyber threats. According to a study by the International Information System Security Certification Consortium (ISC)², nearly 3.4 million cybersecurity professionals are in shortage (ISC², 2022). Over 700,000 cybersecurity positions remain unfilled in the United States alone, highlighting a significant talent gap (Cybersecurity Ventures, 2023). This shortage poses a substantial challenge for organizations as cyberattacks evolve, targeting entities ranging from financial institutions to healthcare systems.
Cybersecurity professionals are essential for safeguarding sensitive data, mitigating risks, and ensuring compliance with regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). As businesses expand their digital footprints, lacking qualified personnel to secure these operations creates vulnerabilities that can lead to costly breaches. Burgett (2023) noted that the average data breach cost in 2023 reached $4.45 million, underscoring the financial risks associated with inadequate cybersecurity measures (IBM Security, 2023).

Corporate Strategists' Role in Attracting Cybersecurity Talent

Corporate strategists are crucial in bridging the cybersecurity talent gap. They are responsible for developing long-term plans that align business objectives with emerging technological needs, including robust cybersecurity frameworks. Strategists can create environments that attract, develop, and retain top cybersecurity talent by focusing on workforce development.
One of the main challenges in attracting cybersecurity professionals is the highly competitive job market. Corporate strategists must recognize that skilled cybersecurity experts are in high demand and that offering competitive salaries and benefits is essential. Industry reports indicate cybersecurity professionals command premium salaries due to their specialized skills (CyberSeek, 2023). Strategists can collaborate with human resources teams to benchmark salaries against industry standards, ensuring their compensation packages appeal to top-tier talent. Additionally, offering benefits such as remote work options, flexible schedules, and professional development opportunities can differentiate a company from its competitors. Access to the latest cybersecurity tools and technologies can also attract professionals eager to stay ahead of industry trends.
Corporate strategists can help build a strong employer brand that emphasizes the organization's commitment to cybersecurity. In a competitive market, companies positioned as leaders in cybersecurity are more likely to attract professionals passionate about protecting digital assets. Publicizing successful cybersecurity initiatives, awards, and partnerships with industry-leading organizations can enhance a company's reputation as a cybersecurity frontrunner (KPMG, 2021).
Strategists should also focus on cultivating a cohesive and supportive workplace culture. Fostering an environment that values diversity, equity, and inclusion (DEI) can appeal to a broader range of candidates and create a more innovative workforce. A diverse cybersecurity team brings varied perspectives and problem-solving approaches vital for tackling complex cyber threats.
Prioritizing talent development and upskilling within the existing workforce can help address the cybersecurity talent shortage. Corporate strategists can implement internal training programs, offer certifications, and provide career advancement opportunities to nurture talent from within. This approach enhances competencies and reduces reliance on external recruits. Certification programs such as Certified Information Systems Security Professional (CISSP) or Certified Ethical Hacker (CEH) can help individuals advance their cybersecurity careers (ISC², 2022). Collaborating with educational institutions and online learning platforms is also beneficial. Strategists can partner with universities to create internships and co-op programs, providing students with real-world cybersecurity experience. Investing in continuous learning initiatives ensures that the workforce stays current with cybersecurity developments and technologies.
Emphasizing cross-functional collaboration in cybersecurity initiatives is essential. Cybersecurity is no longer solely the responsibility of IT departments; it requires coordination across multiple business functions such as human resources, legal, and marketing. Corporate strategists can facilitate this by forming interdepartmental teams focused on cybersecurity, ensuring security considerations are integrated into every aspect of the business (Gartner, 2023).
By fostering a culture of collaboration, strategists can create opportunities for cybersecurity professionals to work alongside different departments, gaining a comprehensive understanding of the organization's overall risk landscape. This holistic approach makes cybersecurity roles more engaging and meaningful, attracting professionals seeking rewarding careers.

Conclusions

The escalating demand for cybersecurity professionals presents both a challenge and an opportunity for corporate strategists. By recognizing cybersecurity's critical role in protecting organizational assets, strategists can develop comprehensive talent acquisition and retention strategies that align with the evolving cybersecurity landscape. Offering competitive compensation, building a strong employer brand, investing in talent development, and promoting cross-functional collaboration are essential to attracting and retaining top cybersecurity talent. As cyber threats continue to rise, corporate strategists are responsible for ensuring their organizations have the necessary skills and expertise to mitigate these risks and succeed in the digital age.
The rise of cybersecurity has had a significant impact on the landscape of the US national security and economy. It has highlighted cyberattacks' damage to the national economy and the vulnerabilities of critical systems in the age. Addressing the problem of cybersecurity in the nation requires more than just seeking critical advice from experts and practicing it nationally. Everyone within the US must take it as a mandate to learn more about cybersecurity and develop effective strategies to deploy in case of any cyber threat.

Recommendations

It is important to note that new risks also emerge as technology advances and new sophisticated technologies are introduced into the world. The best way to mitigate such risks is to be proactive and implement advanced risk management tools and techniques for risk management. Various recommendations have been discussed further.

Enhancing cybersecurity education and Workforce development

When cybersecurity education and workforce development are structured adequately, it brings about a strong collaboration between governments worldwide and private and critical infrastructure operators to share global threat intelligence, foster good response coordination, and develop best practices. The rationale is that cyber threats can potentially target public and private entities. A coordinated approach to addressing this problem allows a country to develop a better mechanism for defense and quicker recovery from attack (AlDajeeh et al., 2022).

Enforcing Stronger Cybersecurity Regulations

The U.S. should be able to ensure they regularly update their cybersecurity standards and enforce regulations across industries, taking into strong consideration critical infrastructure such as the healthcare and financial industries in the country. The main reason is to ensure that organizations across sectors within the US can maintain a high standard of cybersecurity, which will go a long way to reduce vulnerabilities in the US (Sharma,2024).

Improving Incident Response and Recovery Planning

Another recommendation for the US National Cybersecurity Defense Department is to ensure that industries or sectors within the country regularly develop and update comprehensive incidents and recovery to ensure that they can recover quickly in case any cyber incident occurs. The vital reason behind this recommendation is that when there is a properly planned system put in place for cybersecurity incidents, businesses and the government can be able to bounce back even when they are experiencing any cyber-attack incident (Staves et al.,2022)

Promoting International Cooperation on cybersecurity

There is a need to strengthen international cooperation with allied nations to combat any state-sponsored cyber threat and adapt the development of global norms and laws to enforce cyberwarfare and cybercrimes that may occur around the globe. This bridges the gap between international cooperations to help track and prevent cyber-attacks globally (Hollis et al.,2018).
The future of cybersecurity is set to be shaped by rapidly evolving threats and technological advancements that require organizations to remain vigilant and proactive in their defense strategies (Gartner, 2023). This suggests a significant increase in the scale and sophistication of cyberattacks, with AI-driven attacks, ransomware, and threats to critical infrastructure becoming more prevalent (Accenture, 2023). The expansion of IoT devices and 5G networks creates new attack surfaces, while quantum computing presents opportunities and challenges for encryption and data security (IBM, 2022).
Organizations and policymakers must implement strategic and forward-looking cybersecurity measures to combat these evolving threats. Key recommendations include adopting Zero Trust architecture, investing in cybersecurity training and development, enhancing collaboration between private and public sectors, implementing strong data encryption and backup practices, and enforcing updated regulations (NIST, 2022). Continuous innovation in cybersecurity is essential, including leveraging AI and machine learning for threat detection and response, developing adaptive security architectures, and investing in emerging technologies (Deloitte, 2023).
Organizations should also focus on cyber resilience, recognizing that no entity is immune to cyberattacks (World Economic Forum, 2023). This involves implementing robust disaster recovery and business continuity plans and maintaining regular communication with stakeholders. By focusing on continuous education, research, collaboration, and innovation, the cybersecurity community can build a more secure and resilient digital future in an increasingly connected world (Cisco, 2023).

References

  1. Accenture. (2023). 2023 Cyber threat intelligence report. https://www.accenture.com/us-en/insights/security/cyber-threat-intelligence.
  2. AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., & Choo, K. K. R. (2022). The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 119, 102754. [CrossRef]
  3. Balasundaram, A., Routray, S., Prabu, A. V., Krishnan, P., Malla, P. P., & Maiti, M. (2023). Internet of things (IoT)-based smart healthcare system for efficient diagnostics of health parameters of patients in emergency care. IEEE Internet of Things Journal, 10(21), 18563–18570. [CrossRef]
  4. Burgett H. Michael. (2023). Special Report: The Cost of a Data Breach in 2023. The National CIO Review. https://nationalcioreview.com/articles-insights/information-security/special-report-the-cost-of-a-data-breach-in-2023/.
  5. Capraro, V., Lentsch, A., Acemoglu, D., Akgun, S., Akhmedova, A., Bilancini, E., Bonnefon, J.-F., Brañas-Garza, P., Butera, L., Douglas, K. M., Everett, J., Gigerenzer, G., Greenhow, C., Hashimoto, D., Holt-Lunstad, J., Jetten, J., Johnson, S., Kunz, W. H., Longoni, C., … Viale, R. (2024, January 18). The impact of generative artificial intelligence on Socioeconomic Inequalities and policy making. SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4666103. [CrossRef]
  6. Cisco. (2023). Cybersecurity trends and emerging threats for 2023.
  7. Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165. [CrossRef]
  8. CSIS. (2024). Significant cyber incidents: Strategic technologies program. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents.
  9. CyberSeek. (2023). Cybersecurity Supply/Demand Heat Map. Retrieved from https://www.cyberseek.org/heatmap.html.
  10. Deloitte. (2023). Future of cyber survey 2023.
  11. Dey, S., & Hossain, A. (2023). Cybersecurity in the era of Industry 4.0: A review on emerging threats, vulnerabilities, and countermeasures. IEEE Access, 11, 31317-31337.
  12. Dhirani, L. L., Mukhtiar, N., Chowdhry, B. S., & Newe, T. (2023). Ethical dilemmas and privacy issues in emerging technologies: A Review. Sensors, 23(3), 1151. [CrossRef]
  13. Fuentes-Peñailillo, F., Gutter, K., Vega, R., & Silva, G. C. (2024). Transformative technologies in digital agriculture: Leveraging Internet of Things, remote sensing, and artificial intelligence for smart crop management. Journal of Sensor and Actuator Networks, 13(4), 39. [CrossRef]
  14. Gartner. (2023). Cybersecurity Strategy: An Ultimate Guide for CISOs. Retrieved from https://www.gartner.com/en/cybersecurity.
  15. Gartner. (2023). Top cybersecurity trends for 2023-2024.
  16. Gupta, P., Ding, B., Guan, C., & Ding, D. (2024, February 15). Generative AI: A systematic review using topic modelling techniques. Data and Information Management. https://www.sciencedirect.com/science/article/pii/S2543925124000020. [CrossRef]
  17. Hollis, D. B., & Waxman, M. C. (2018). Promoting international cybersecurity cooperation: lessons from the proliferation security initiative. Temp. Int'l & Comp. LJ, 32, 147.
  18. IBM Security. (2023). Cost of a Data Breach Report 2023. Retrieved from https://www.ibm.com/security/data-breach.
  19. IBM. (2022). Quantum safe cryptography and security.
  20. ISC². (2022). 2022 Cybersecurity Workforce Study. https://www.isc2.org/Research/Workforce-Study.
  21. ISC². (2022). Cybersecurity Workforce Study. International Information System Security Certification Consortium. Retrieved from https://www.isc2.org/Research/Workforce-Study.
  22. Jaiswal, A., Kandpal, M., Shukla, A. K., Mohan, S., & Vijayakumar, P. (2022). Zero trust architecture: A new era approach to mitigate advanced persistent threats. Security and Communication Networks, 2022, 1-14.
  23. Kaswan, K. S., Dhatterwal, J. S., Baliyan, A., & Rani, S. (2023). Quantum Computing. [CrossRef]
  24. KPMG. (2021). Shape the Future Cyber Security Workforce. Retrieved from https://home.kpmg/xx/en/home/insights/2021/08/shape-the-future-cyber-security-workforce.html.
  25. Kumar, T., Bhushan, S., Sharma, P., & Garg, V. (2024). Examining the vulnerabilities of biometric systems. Leveraging Computer Vision to Biometric Applications, 34–67. [CrossRef]
  26. Maity, S., Bera, P., & Ghosh, S. K. (2022). A comprehensive survey of cyberattack and defense strategies in IoT-enabled smart city applications. IEEE Transactions on Industry Applications, 58(6), 7326-7343.
  27. Mishra, R., Mishra, P. S., Mazumder, R., Mazumder, A., & Varshney, S. (2024). Quantum computing and its promise in Drug Discovery. Drug Delivery Systems Using Quantum Computing, 57–92. [CrossRef]
  28. Muro, M., Maxim, R., & Whiton, J. (2022). The cybersecurity workforce gap. Brookings Institution.
  29. NIST. (2022). Zero trust architecture. https://www.nist.gov/publications/zero-trust-architecture.
  30. Oguta, G. C. (2024). Securing the Virtual Marketplace: Navigating the landscape of security and privacy challenges in e-commerce. GSC Advanced Research and Reviews, 18(1), 084–117. [CrossRef]
  31. Prevalent’s 2024 third-Party Risk Management Study. Prevalent. (2024). https://www.prevalent.net/news/prevalents-2024-third-party-risk-management-study/.
  32. Roslan, F. A. B. M., & Ahmad, N. B. (2023). The Rise of AI-Powered Voice Assistants: Analyzing Their Transformative Impact on Modern Customer Service Paradigms and Consumer Expectations. Quarterly Journal of Emerging Technologies and Innovations, 8(3), 33–64. Retrieved from https://vectoral.org/index.php/QJETI/article/view/19.
  33. Saeed, M. M., Ali, E. S., & Saeed, R. A. (2023). Data-driven techniques and security issues in wireless networks. Data-Driven Intelligence in Wireless Networks, 107–154. [CrossRef]
  34. Sharma, P. (2024). Enforcing Network Security Policies in the Context of the NIST Cybersecurity Framework and Its Legal Implications. Network Security, 2024(7), 22-27.
  35. Singh, D. (2023). Internet of Things. Factories of the Future, 195–227. [CrossRef]
  36. Sonko, S., Ibekwe, K. I., Ilojianya, V. I., Etukudoh, E. A., & Fabuyide, A. (2024). Quantum cryptography and U.S. Digital Security: A comprehensive review: Investigating the potential of quantum technologies in creating unbreakable encryption and their future in national security. Computer Science & IT Research Journal. https://www.fepbl.com/index.php/csitrj/article/view/790. [CrossRef]
  37. St. John, M., & Chatterjee, A. (2024, April 17). Cybersecurity stats: Facts and figures you should know. Forbes. https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/.
  38. Staves, A., Anderson, T., Balderstone, H., Green, B., Gouglidis, A., & Hutchison, D. (2022). A cyber incident response and recovery framework to support operators of industrial control systems. International Journal of Critical Infrastructure Protection, 37, 100505. [CrossRef]
  39. Strategic cybersecurity talent framework. World Economic Forum. (2024). https://www.weforum.org/publications/strategic-cybersecurity-talent-framework/.
  40. Talamantes, J. (2023). The cybersecurity skills gap: Addressing the talent shortage in 2023. Dark Reading.
  41. Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2023). A comprehensive survey of the Internet of Things (IoT) cybersecurity: Attacks, countermeasures, and challenges. Sensors, 23(2), 874.
  42. Thakur, M. (2024). Cyber security threats and countermeasures in Digital age. Journal of Applied Science and Education (JASE). https://jase.a2zjournals.com/index.php/ase/article/view/42. [CrossRef]
  43. Towfighi, J. (2024, April 12). Roku says 576,000 accounts breached in Cyberattack CNN business. CNN. https://www.cnn.com/2024/04/12/business/roku-security-breach-user-accounts/index.html.
  44. Vajjhala, N., & Strang, K. D. (2023). Cybersecurity for Decision Makers. CRC Press.
  45. Wade, T. J. (2024, June 1). Transformers and tradition: Using generative AI and Deep Learning for Financial Markets Prediction. LSE Theses Online. https://etheses.lse.ac.uk/4657/.
  46. World Economic Forum. (2023). Global cybersecurity outlook 2023. https://www.weforum.org/reports/global-cybersecurity-outlook-2023/.
  47. Yigit, Y., Buchanan, W. J., Tehrani, M. G., & Maglaras, L. (2024, March 19). Review of generative AI methods in Cybersecurity. arXiv.org. https://arxiv.org/abs/2403.08701.
  48. Zammitti, A., Imbrogliera, C., Russo, A., & Zarbo, R. (2023). The cybersecurity skills gap: A systematic review. Future Internet, 15(3), 95.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated