Framework, Tools and Challenges in Cyber Security

Authors

  • F. Basholli
  • D.A. Juraev
  • Kh. Egamberdiev

DOI:

https://doi.org/10.22105/kmisj.v1i1.48

Keywords:

The Cauchy problem, regularization, factorization,, regular solution, fundamental solution

Abstract

In recent years, the Internet has become an integral element of the daily lifestyle of people throughout the human society, and online crime, on the other hand, has increased along with the increase in Internet activity. Cyber security has advanced greatly in recent years to keep up with the rapid changes taking place in cyberspace. Cybersecurity refers to the methods a country or organization can use to protect products and information in cyberspace, where two decades ago, the term "cybersecurity" was unknown to the general public. Cyber security is not only a problem that affects individuals, but it is more important for organizations, public and private institutions. Recently everything has been digitized, using a variety of technologies such as the Cloud, smartphones and the Internet of Things and where cyber attacks are raising concerns about privacy, security and finance. Cybersecurity is a set of technologies, processes and practices aimed at preventing attacks, protecting against damage and illegal access to networks, computers, programs and data. The main purpose of this article is to conduct an examination of the types of cyber security within the framework of a security framework, the tools, methods and difficulties for more cyber security. In conclusion, we will understand that cyber security protects data and the integrity of IT assets that are part of or connected to an organization’s network and aims to protect these assets from all threat actors throughout the life cycle of a cyber attack.

References

A. Jeckmans, A. Peter, P. Hartel, Efficient privacy-enhanced familiarity based recommender system,Pro-ceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, LectureNotes in Computer Science,8134, 400–417 (2013).

S. Bag, S. Ruj and K. Sakurai, TBitcoin block withholding attack: Analysis and mitigation,IEEE Trans-actions on Information Forensics and Security,8:12, 1967–1978 (2017).

F. Basholli, B. Mema, D. Hyka, A. Basholli, A. Daberdini, Analysis of security challenges in SCADA sys-tems, a technical review on automated real-time systems,8th Advanced Engineering Days, 8–22 (2023).

A. Basholli, B. Mema, F. Basholli, D. Hyka, D. Salillari, The role of education in cyber hygiene,7thAdvanced Engineering Days, 178–181 (2023).

F. Basholli, D. Hyka, A. Basholli, A. Daberdini, B. Mema, Analysis of cyber-attacks through simulation,7th Advanced Engineering Days, 120–122 (2023).

F. Basholli, R. Mezini, A. Basholli, Security in the components of information systems,7th AdvancedEngineering Days, 185–187 (2023).

B. Genge, P. Haller, I. Kiss, A framework for designing resilient distributed intrusion detection systemsfor critical infrastructures,International Journal of Critical Infrastructure Protection,15, 3–11 (2016).

J. Wayman, A. Jain, D. Maltoni, D. Maio,Biometric Systems: Technology Design and Performance Eval-uation, Springer, Verlag (2005).

B. Komar, R. Beekelaar, J. Wettern,Firewalls for Dummies, 1–17 (2001).

C. Weissman,Security Penetration Testing Guideline, Handbook for the Computer Security Certificationof Trusted Systems, Center for Secure Information Technology, Naval Research Laboratory (1993).

A. Daberdini, B. Basholli, N. Metaj, E. Skenderaj, Cyber security in mail with Fortiweb and Fortinet forcompanies and institutions,5th Advanced Engineering Days, 81–83 (2022).

A. Sfakianakis, Ch. Douligeris, L. Marinos, ENISA threat landscape report 2018: 15 Top Cyber-Threatsand Trends, European Network and Information Security Agency (2019).

F. Setiadi, P.H. Putra, Y.G. Sucahyo, Z.A. Hasibuan, Determining components of national cyber securityframework using Grounded Theory,Second Int. Conf. Informatics Comput., 1–6 (2017).

M. Harizaj, I. Bisha, F. Basholli, IoT integration in electric car chargers’Infrastructure,6th AdvancedEngineering Days, 152–155 (2023).

D. Hyka, A. Hyra, F. Basholli,B. Mema, A. Basholli, Data security in public and private administration:Challenges, trends, and effective protection in the era of digitalization,7th Advanced Engineering Days,125–127 (2023).

I. Ijaz, Design and implementation of PKI (for multi domain environment),Inter. Journal of Com. Theoryand Eng.4:4, 505–509 (2012).

B. Mema, F. Basholli, Internet of things in the development of future businesses in Albania,AdvancedEngineering Science,3, 196–205 (2023).

N. Scaife, P. Traynor, K. Butler, Making sense of the ransomware mess planning a sensible path forward,IEEE Potentials,36:6, 28–31 (2017).

N. Akhtar, A model based research material recommendation system for individual users,Transactionson Machine Learning and Artificial Intelligence,5:2, 1–8 (2017).

N. Akhtar, Inverse conductivity problem in the infinite slab,International Journal of Computer Applica-tions,81:14, 23–30 (2013).

N. Akhtar, D. Agarwal, A Literature Review of Empirical Studies of Recommendation Systems,Interna-tional Journal of Applied Information Systems,10:2, 6–14 (2015).

N. Akhtar, D. Agarwal, An influential recommendation system usage for general users,Foundation ofComputer Science,5:7, 5–9 (2016).

N. Akhtar, D. Agarwal, A survey of imperfection of existing recommender system for academic fraternity,IOSR Journal of Computer Engineering,20:3, 8–15 (2018).

B. Pranggono, A. Arabo, COVID-19 pandemic cybersecurity issues,Internet Technology Letters,4:8, 1–6(2020).

Q. Tang, J. Wang, Privacy preserving context-aware recommender systems: Analysis and new solutions,Computer Security - ESORICS 2015,9327, 101–119 (2015).

R. Doshi, N. Apthorpe, N. Feamster, Machine learning DDoS detection for consumer internet of thingsdevices,IEEE Security and Privacy Workshops, 29–35 (2018).

R. Trifonov, G. Manolov, R. Yoshinov, G. Pavlova, A survey of artificial intelligence for enhancing theinformation security,International Journal of Development Research,7:11, 16866–16872 (2017).

T. Chmielecki, P. Cholda, P. Pacyna, P. Potrawka, N. Rapacz, R. Stankiewicz, et al., Enterpriseorientedcybersecurity management,Computer Science and Information Systems (FedCSIS) 2014 Federated Con-ference, 863–870 (2014).

A. Tudzarov, T. Janevski, Design of 5G mobile architecture,International Journal of CommunicationNetworks and Information Security,3:2, 804–810 (2011).

Yu. Nugraha, S. Member, I. Brown, A.S. Sastrosubroto, An adaptive wideband Delphi method to studystate cyber-defence requirements,IEEE Transactions On Emerging Topics in Computing,4:1, 47–59(2016).

Yu. Perwej, A. Chaturved, Machine recognition of hand written characters using neural networks,Inter-national Journal of Computer Applications,14:2, 6–9 (2011).

Yu. Perwej, K. Haq, U. Jaleel, Sh. Saxena, Some drastic improvements found in the analysis of routingprotocol for the bluetooth technology using scatternet,Special Issue on The International Conferenceon Computing, Communications and Information Technology Applications (CCITA-2010), UbiquitousComputing and Communication Journal (UBICC),5, 86–95 (2010).

Yu. Perwej, M.K. Omer, O.E. Sheta, H.A.M. Harb, M.S. Adrees, The future of internet of things (IoT) andits empowering technology,International Journal of Engineering Science and Computing,9:3, 20192–20203 (2019).

Z.A. Soomro, M.H. Shah, J. Ahmed, Information security management needs more holistie approach: Aliterature review,International Journal of Information Management,36:2, 215–225 (2016).

Z. Trabelsi, K. Hayawi, A. Braiki, S. Mathew,Network Attacks and Defenses: A Hands-on Approach,Boca Raton, Florida:CRC Press (2013)

Published

2024-06-29

How to Cite

F. Basholli, Juraev, D., & Kh. Egamberdiev. (2024). Framework, Tools and Challenges in Cyber Security. Karshi Multidisciplinary International Scientific Journal, 1(1), 94-104. https://doi.org/10.22105/kmisj.v1i1.48