A Survey of Emerging Threats in Cybersecurity

  • Citation: Jang-Accard, Julian, and Surya Nepal. “A Survey of Emerging Threats in Cybersecurity.” Journal of Computer and System Sciences 80, no. 5 (2014): 973–93.
    • Topics:
    • Conflict and Security
    • Keywords:
    • cybersecurity
    • malware
    • emerging technology trends
    • emerging cyber threats
    • cyber attacks
    • countermeasures

The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cybersecurity community. To assist in achieving this goal, we first present an overview of the most exploited vulnerabilities in existing hardware, software, and network layers. This is followed by critiques of existing state-of-the-art mitigation techniques as why they do or don’t work. We then discuss new attack patterns in emerging technologies such as social media, cloud computing, smartphone technology, and critical infrastructure. Finally, we describe our speculative observations on future research directions.

Related Resources

  • Alternative Narratives for Arms Control

    Moodie, Amanda, and Michael Moodie. “Alternative Narratives for Arms Control.” The Nonproliferation Review 17, no. 2 (2010): 301–21.

    • Authors with Diverse Backgrounds
    Keywords: arms control, disarmament, Non-Aligned Movement, small arms, treaty regimes, humanitarian action
  • Women in Arms Control: Time for a Gender Turn?

    Dwan, Renata. “Women in Arms Control: Time for a Gender Turn?” Arms Control Today 49, no. 8 (October 2019): 6–11.

    • Open Source Results
    • Authors with Diverse Backgrounds