SlideShare a Scribd company logo
1 of 6
Running Head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY
6
Annotated Bibliography on Emerging Cyber Threats
[Name of Institution]
[Name of Writer]
Annotated Bibliography on Emerging Cyber Threats
Source#1
Reference: Kettani, H., & Wainwright, P. (2019, March). On the
Top Threats to Cyber Systems. In 2019 IEEE 2nd International
Conference on Information and Computer Technologies (ICICT)
(pp. 175-179). IEEE.
Summary: This article reveals the threats to the cyber systems
even some of them are not known to the common people. The
article defines that the latest technology has advanced the cyber
systems and these advancements are attractive and beneficial in
comparison to the previous systems. However, due to this
sophisticated and attractive advancement the individuals,
societies, and nations had become dependent on the cyber
systems. These systems result in the higher gain and ease of
handling since people had relying on the cyber systems.
Moreover, the author argues that for the adoption of the proper
defense and mitigations to the threats it is necessary to
understand cyber threats. The top threats with a brief discussion
of threat agents and attack vectors along with the
countermeasures are mentioned so that the readers can find
knowledge in this regard.
Relevance: This article is of paramount importance because it
defines the importance of the topic of research. As the aim of
the research is to expose the emerging cyber-attacks and the
author of the article “On the Top Threats to Cyber Systems”
reveals the importance of the cyber systems which is important
for understanding the dependence over the cyber systems. In
addition to this, the article is found worth reading because it
reveals the emerging cybercrimes and ways of protection too.
The study is found relevant because it reveals that cyber
systems are important nowadays because they are used in the
business systems, control systems, and for accessing the control
systems. In other words, the articles provide an overview of the
emerging threats and latest trends in the cyber systems.
Source#2
Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats
confronting the digital built environment. Engineering,
Construction and Architectural Management.
Summary: This article determines the cyber systems attack in
the sector of the digital built environment. The study gives the
idea of emerging crimes that are made to threat the digital and
physical assets that are used to form the digital economies.
These threats are often made to affect the critical infrastructure
of the smart cities. These smart cities are comprised of the
cyber systems which also increase the national wealth, preserve
health, and provide safety and welfare to the nation. In this
regard, it is important to protect the cyber systems from the
critical and emerging threats. Additionally, the article reveals
the safe and emerging countermeasure for avoiding the cyber
threats which are based on the smart transitions. This article is
significant because it provides the direction for the future
research by directing the use of innovative blockchain
technology so that a reliable and safe digital environment can
flourish.
Relevance: This study is found relevant to the topic of research
as it defines the threat to cyber systems in another context. The
cyber systems are beneficial and reliable because all the process
involved is automatic. In this regard, it is used for all the
purposes in the smart cities. The author has determined the
emerging threats to the cyber systems of the smart city along
with the solution that can help to reduce and avoid the risks of
the threats. Thus this study is mandatory as it determines the
significance of the cyber systems such as contribution to the
national wealth, health, etc. The author of the article aims to
explore threats to the digital systems through proper means of
cybersecurity.
Source#3
Reference: Gupta, A., Anpalagan, A., Carvalho, G. H., Guan,
L., & Woungang, I. (2019). Prevailing and emerging cyber
threats and security practices in IoT-Enabled smart grids: A
survey. Journal of Network and Computer Applications.
Summary: This article introduces to the advanced persistent
threats in the cyber systems. As the cyber systems are capable
to install everywhere including smart grids. The smart grids are
IoT based systems that are synchronized to the internet. Hence,
information related to the grid stations is kept on the network
and smart devices. The cybercriminals sent malicious viruses
and threats to those systems so that data can be destroyed. On
the other hand, the article reveals the importance of IoT devices
for the growth of smart grids and related systems. Moreover,
several seven step attack procedure is also summarized in the
article which enables to understand the sophisticated and
emerging attacking tricks. Hence, the article reveals the detailed
and easy analysis of the cyber threats in the smart grid stations.
Relevance: The article is of dominant importance because it
reveals the important and detailed analysis of the cyber threats
which can affect in numerous IoT based applications. Though,
this research is limited to the cyber threats in the smart grid
stations but it increases the basic information about the threats
that can destroy the IoT devices. The author has revealed an
interesting seven steps attacking procedure which is relevant to
avoid the emerging cyber threats. Though, in the recent years,
the several industries have been gone through the sever
breaches and ransomed attacks which are continuously
destroying the reliability of the cyber systems. Concerning this,
this article helps to plan the cyber defenders and security
systems in a better way.
Source#4
Reference: Adriani, R. (2019). The Evolution of Fake News and
the Abuse of Emerging Technologies. European Journal of
Social Sciences, 2(1), 32-38.
Summary: This article investigates the emergence in the latest
cybercrimes which can cause severe harm to the people,
factories, industries, and businesses. Among these cyber threats,
the spread of fake news and post factual society are more
common. The author Adriani had analyzed these cyber threats
from different perspectives. The author has determined the
evolution of fake news which is very important to control the
emergence of the fake news evolution. The author has revealed
that the post factual society and fake news evolution can fuel
the abasement through the powerful technologies. The author
has made an effort to reveal the negative effects of the fake
news and emerging technologies that can throw realistic fake
audio and video that can easily threat anyone belonging to any
industry.
Relevance: The article “The Evolution of Fake News and the
Abuse of Emerging Technologies" aids to examine the emerging
threats. It has been mentioned in the article that the fake news
evolution is at the peak which can cause negative effects to the
public. Furthermore, other emerging technologies like artificial
intelligence and other can be merged to threats people easily.
For instance, the emerging cyber threats can cheat by making
the fake video and audio which is difficult to distinguish
between the fake and regard. Thus, similar tricks can be used to
threats the people by such kind of deep fakes. The study
revolves around the emerging technologies and resulted in
abuse. Based on this information, the article directs to the real
line and strong defense which can be initiated through security
awareness training so that people can keep themselves and their
sensitive information safe.
Source#5
Reference: Bazm, M. M., Lacoste, M., Südholt, M., & Menaud,
J. M. (2019). Isolation in cloud computing infrastructures: new
security challenges. Annals of Telecommunications, 74(3-4),
197-209.
Summary: The article is titled as “Isolation in cloud computing
infrastructures: new security challenges” reveals the cloud
computing infrastructures. It has been defined that the cloud
computing infrastructure enables to share the hardware
resources among different clients. The clients can belong to the
execution environments such as virtual machines and Linux
containers. Furthermore, isolation is regarded as the core
security challenge for cloud computing infrastructures. Though
these systems can face severe threats due to the sharing of
physical resources including processor caches and virtualization
layer. In these type of systems
Side-channel attacks (SCAs) are used to exploit for obtaining
the sensitive data such as kernel information. This threat to
cloud infrastructures has been revealed in this article. This
article clarifies such types of attacks that can threaten isolation
of any virtualized environments like as cloud computing
infrastructures. Additionally, the authors have revealed various
different applicable countermeasures that can avoid the risks of
attacks in cloud infrastructures.
Relevance: This article is of supreme importance in relation to
the topic of research because it provides that how emerging
technologies can threat to the cyber systems. Nowadays, most of
the systems are digitalized and are connected to the cloud
computing. Though in businesses, education and medical
centers systems infrastructure are designed in such a way that
they can share physical resources. In these situations, it is a
difficult task to maintain the system and system's information
isolated from others so that none can be used in the wrong way.
However, these challenges are new and emerging at a higher
speed. In this regard, this article is helpful because possible
countermeasures are also mentioned by the author. These
countermeasures can be used as a guide to avoid such emerging
threats practically.

More Related Content

Similar to Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx

Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfmessengerhelper4
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSDaphne Smith
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information ManagementAlexander Deucalion
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdfArlene Smith
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. JeniferAM Publications
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismIJECEIAES
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...IRJET Journal
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...BRNSSPublicationHubI
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thTaunyaCoffman887
 
For this assignment, review the article abomhara, m., & koien,
For this assignment, review the article abomhara, m., & koien,For this assignment, review the article abomhara, m., & koien,
For this assignment, review the article abomhara, m., & koien,modi11
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 

Similar to Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx (20)

Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdf
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdf
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
 
76 s201918
76 s20191876 s201918
76 s201918
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
Artificial Intelligence and the Field of Robotics: A Systematic Approach to C...
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
For this assignment, review the article abomhara, m., & koien,
For this assignment, review the article abomhara, m., & koien,For this assignment, review the article abomhara, m., & koien,
For this assignment, review the article abomhara, m., & koien,
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 

More from healdkathaleen

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxhealdkathaleen
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxhealdkathaleen
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxhealdkathaleen
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxhealdkathaleen
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxhealdkathaleen
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxhealdkathaleen
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxhealdkathaleen
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxhealdkathaleen
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxhealdkathaleen
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxhealdkathaleen
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxhealdkathaleen
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxhealdkathaleen
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxhealdkathaleen
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxhealdkathaleen
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxhealdkathaleen
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxhealdkathaleen
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxhealdkathaleen
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxhealdkathaleen
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxhealdkathaleen
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxhealdkathaleen
 

More from healdkathaleen (20)

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docx
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docx
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docx
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docx
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docx
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docx
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docx
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docx
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docx
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docx
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docx
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docx
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docx
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docx
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docx
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docx
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx

  • 1. Running Head: ANNOTATED BIBLIOGRAPHY ANNOTATED BIBLIOGRAPHY 6 Annotated Bibliography on Emerging Cyber Threats [Name of Institution] [Name of Writer] Annotated Bibliography on Emerging Cyber Threats Source#1 Reference: Kettani, H., & Wainwright, P. (2019, March). On the Top Threats to Cyber Systems. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (pp. 175-179). IEEE. Summary: This article reveals the threats to the cyber systems even some of them are not known to the common people. The article defines that the latest technology has advanced the cyber systems and these advancements are attractive and beneficial in comparison to the previous systems. However, due to this sophisticated and attractive advancement the individuals, societies, and nations had become dependent on the cyber systems. These systems result in the higher gain and ease of handling since people had relying on the cyber systems. Moreover, the author argues that for the adoption of the proper
  • 2. defense and mitigations to the threats it is necessary to understand cyber threats. The top threats with a brief discussion of threat agents and attack vectors along with the countermeasures are mentioned so that the readers can find knowledge in this regard. Relevance: This article is of paramount importance because it defines the importance of the topic of research. As the aim of the research is to expose the emerging cyber-attacks and the author of the article “On the Top Threats to Cyber Systems” reveals the importance of the cyber systems which is important for understanding the dependence over the cyber systems. In addition to this, the article is found worth reading because it reveals the emerging cybercrimes and ways of protection too. The study is found relevant because it reveals that cyber systems are important nowadays because they are used in the business systems, control systems, and for accessing the control systems. In other words, the articles provide an overview of the emerging threats and latest trends in the cyber systems. Source#2 Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management. Summary: This article determines the cyber systems attack in the sector of the digital built environment. The study gives the idea of emerging crimes that are made to threat the digital and physical assets that are used to form the digital economies. These threats are often made to affect the critical infrastructure of the smart cities. These smart cities are comprised of the cyber systems which also increase the national wealth, preserve health, and provide safety and welfare to the nation. In this regard, it is important to protect the cyber systems from the critical and emerging threats. Additionally, the article reveals the safe and emerging countermeasure for avoiding the cyber threats which are based on the smart transitions. This article is significant because it provides the direction for the future research by directing the use of innovative blockchain
  • 3. technology so that a reliable and safe digital environment can flourish. Relevance: This study is found relevant to the topic of research as it defines the threat to cyber systems in another context. The cyber systems are beneficial and reliable because all the process involved is automatic. In this regard, it is used for all the purposes in the smart cities. The author has determined the emerging threats to the cyber systems of the smart city along with the solution that can help to reduce and avoid the risks of the threats. Thus this study is mandatory as it determines the significance of the cyber systems such as contribution to the national wealth, health, etc. The author of the article aims to explore threats to the digital systems through proper means of cybersecurity. Source#3 Reference: Gupta, A., Anpalagan, A., Carvalho, G. H., Guan, L., & Woungang, I. (2019). Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey. Journal of Network and Computer Applications. Summary: This article introduces to the advanced persistent threats in the cyber systems. As the cyber systems are capable to install everywhere including smart grids. The smart grids are IoT based systems that are synchronized to the internet. Hence, information related to the grid stations is kept on the network and smart devices. The cybercriminals sent malicious viruses and threats to those systems so that data can be destroyed. On the other hand, the article reveals the importance of IoT devices for the growth of smart grids and related systems. Moreover, several seven step attack procedure is also summarized in the article which enables to understand the sophisticated and emerging attacking tricks. Hence, the article reveals the detailed and easy analysis of the cyber threats in the smart grid stations. Relevance: The article is of dominant importance because it reveals the important and detailed analysis of the cyber threats which can affect in numerous IoT based applications. Though, this research is limited to the cyber threats in the smart grid
  • 4. stations but it increases the basic information about the threats that can destroy the IoT devices. The author has revealed an interesting seven steps attacking procedure which is relevant to avoid the emerging cyber threats. Though, in the recent years, the several industries have been gone through the sever breaches and ransomed attacks which are continuously destroying the reliability of the cyber systems. Concerning this, this article helps to plan the cyber defenders and security systems in a better way. Source#4 Reference: Adriani, R. (2019). The Evolution of Fake News and the Abuse of Emerging Technologies. European Journal of Social Sciences, 2(1), 32-38. Summary: This article investigates the emergence in the latest cybercrimes which can cause severe harm to the people, factories, industries, and businesses. Among these cyber threats, the spread of fake news and post factual society are more common. The author Adriani had analyzed these cyber threats from different perspectives. The author has determined the evolution of fake news which is very important to control the emergence of the fake news evolution. The author has revealed that the post factual society and fake news evolution can fuel the abasement through the powerful technologies. The author has made an effort to reveal the negative effects of the fake news and emerging technologies that can throw realistic fake audio and video that can easily threat anyone belonging to any industry. Relevance: The article “The Evolution of Fake News and the Abuse of Emerging Technologies" aids to examine the emerging threats. It has been mentioned in the article that the fake news evolution is at the peak which can cause negative effects to the public. Furthermore, other emerging technologies like artificial intelligence and other can be merged to threats people easily. For instance, the emerging cyber threats can cheat by making the fake video and audio which is difficult to distinguish
  • 5. between the fake and regard. Thus, similar tricks can be used to threats the people by such kind of deep fakes. The study revolves around the emerging technologies and resulted in abuse. Based on this information, the article directs to the real line and strong defense which can be initiated through security awareness training so that people can keep themselves and their sensitive information safe. Source#5 Reference: Bazm, M. M., Lacoste, M., Südholt, M., & Menaud, J. M. (2019). Isolation in cloud computing infrastructures: new security challenges. Annals of Telecommunications, 74(3-4), 197-209. Summary: The article is titled as “Isolation in cloud computing infrastructures: new security challenges” reveals the cloud computing infrastructures. It has been defined that the cloud computing infrastructure enables to share the hardware resources among different clients. The clients can belong to the execution environments such as virtual machines and Linux containers. Furthermore, isolation is regarded as the core security challenge for cloud computing infrastructures. Though these systems can face severe threats due to the sharing of physical resources including processor caches and virtualization layer. In these type of systems Side-channel attacks (SCAs) are used to exploit for obtaining the sensitive data such as kernel information. This threat to cloud infrastructures has been revealed in this article. This article clarifies such types of attacks that can threaten isolation of any virtualized environments like as cloud computing infrastructures. Additionally, the authors have revealed various different applicable countermeasures that can avoid the risks of attacks in cloud infrastructures. Relevance: This article is of supreme importance in relation to the topic of research because it provides that how emerging technologies can threat to the cyber systems. Nowadays, most of the systems are digitalized and are connected to the cloud
  • 6. computing. Though in businesses, education and medical centers systems infrastructure are designed in such a way that they can share physical resources. In these situations, it is a difficult task to maintain the system and system's information isolated from others so that none can be used in the wrong way. However, these challenges are new and emerging at a higher speed. In this regard, this article is helpful because possible countermeasures are also mentioned by the author. These countermeasures can be used as a guide to avoid such emerging threats practically.