Reference Hub2
A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications

A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications

Gaganjot Kaur Saini, Malka N. Halgamuge, Pallavi Sharma, James Stephen Purkis
Copyright: © 2019 |Pages: 37
ISBN13: 9781522571896|ISBN10: 1522571892|EISBN13: 9781522571902
DOI: 10.4018/978-1-5225-7189-6.ch008
Cite Chapter Cite Chapter

MLA

Saini, Gaganjot Kaur, et al. "A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications." Secure Cyber-Physical Systems for Smart Cities, edited by Riaz Ahmed Shaikh, IGI Global, 2019, pp. 183-219. https://doi.org/10.4018/978-1-5225-7189-6.ch008

APA

Saini, G. K., Halgamuge, M. N., Sharma, P., & Purkis, J. S. (2019). A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications. In R. Shaikh (Ed.), Secure Cyber-Physical Systems for Smart Cities (pp. 183-219). IGI Global. https://doi.org/10.4018/978-1-5225-7189-6.ch008

Chicago

Saini, Gaganjot Kaur, et al. "A Review on Cyberattacks: Security Threats and Solution Techniques for Different Applications." In Secure Cyber-Physical Systems for Smart Cities, edited by Riaz Ahmed Shaikh, 183-219. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7189-6.ch008

Export Reference

Mendeley
Favorite

Abstract

Research questions remain to be answered in terms of discovering how security could be provided for different resources, such as data, devices, and networks. Most organizations compromise their security measures due to high budgets despite its primary importance in today's highly dependent cyber world and as such there are always some loopholes in security systems, which cybercriminals take advantage of. In this chapter, the authors have completed an analysis of data obtained from 31 peer-reviewed scientific research studies (2009-2017) describing cybersecurity issues and solutions. The results demonstrated that the majority of applications in this area are from the government and the public sector (17%) whereas transportation and other areas have a minor percentage (6%). This study determined that the government sector is the main application area in cybersecurity and is more susceptible to cyber-attacks whereas the wireless sensor network and healthcare areas are less exposed to attack.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.