Running Head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY 6
Annotated Bibliography on Emerging Cyber Threats
[Name of Institution]
[Name of Writer]
Annotated Bibliography on Emerging Cyber Threats
Source#1
Reference: Kettani, H., & Wainwright, P. (2019, March). On the Top Threats to Cyber Systems. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (pp. 175-179). IEEE.
Summary: This article reveals the threats to the cyber systems even some of them are not known to the common people. The article defines that the latest technology has advanced the cyber systems and these advancements are attractive and beneficial in comparison to the previous systems. However, due to this sophisticated and attractive advancement the individuals, societies, and nations had become dependent on the cyber systems. These systems result in the higher gain and ease of handling since people had relying on the cyber systems. Moreover, the author argues that for the adoption of the proper defense and mitigations to the threats it is necessary to understand cyber threats. The top threats with a brief discussion of threat agents and attack vectors along with the countermeasures are mentioned so that the readers can find knowledge in this regard.
Relevance: This article is of paramount importance because it defines the importance of the topic of research. As the aim of the research is to expose the emerging cyber-attacks and the author of the article “On the Top Threats to Cyber Systems” reveals the importance of the cyber systems which is important for understanding the dependence over the cyber systems. In addition to this, the article is found worth reading because it reveals the emerging cybercrimes and ways of protection too. The study is found relevant because it reveals that cyber systems are important nowadays because they are used in the business systems, control systems, and for accessing the control systems. In other words, the articles provide an overview of the emerging threats and latest trends in the cyber systems.
Source#2
Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management.
Summary: This article determines the cyber systems attack in the sector of the digital built environment. The study gives the idea of emerging crimes that are made to threat the digital and physical assets that are used to form the digital economies. These threats are often made to affect the critical infrastructure of the smart cities. These smart cities are comprised of the cyber systems which also increase the national wealth, preserve health, and provide safety and welfare to the nation. In this regard, it is important to protect the cyber systems from the critical and emerging threats. Additionally, the article reveals the safe an ...
Introduction to ArtificiaI Intelligence in Higher Education
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
1. Running Head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY
6
Annotated Bibliography on Emerging Cyber Threats
[Name of Institution]
[Name of Writer]
Annotated Bibliography on Emerging Cyber Threats
Source#1
Reference: Kettani, H., & Wainwright, P. (2019, March). On the
Top Threats to Cyber Systems. In 2019 IEEE 2nd International
Conference on Information and Computer Technologies (ICICT)
(pp. 175-179). IEEE.
Summary: This article reveals the threats to the cyber systems
even some of them are not known to the common people. The
article defines that the latest technology has advanced the cyber
systems and these advancements are attractive and beneficial in
comparison to the previous systems. However, due to this
sophisticated and attractive advancement the individuals,
societies, and nations had become dependent on the cyber
systems. These systems result in the higher gain and ease of
handling since people had relying on the cyber systems.
Moreover, the author argues that for the adoption of the proper
2. defense and mitigations to the threats it is necessary to
understand cyber threats. The top threats with a brief discussion
of threat agents and attack vectors along with the
countermeasures are mentioned so that the readers can find
knowledge in this regard.
Relevance: This article is of paramount importance because it
defines the importance of the topic of research. As the aim of
the research is to expose the emerging cyber-attacks and the
author of the article “On the Top Threats to Cyber Systems”
reveals the importance of the cyber systems which is important
for understanding the dependence over the cyber systems. In
addition to this, the article is found worth reading because it
reveals the emerging cybercrimes and ways of protection too.
The study is found relevant because it reveals that cyber
systems are important nowadays because they are used in the
business systems, control systems, and for accessing the control
systems. In other words, the articles provide an overview of the
emerging threats and latest trends in the cyber systems.
Source#2
Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats
confronting the digital built environment. Engineering,
Construction and Architectural Management.
Summary: This article determines the cyber systems attack in
the sector of the digital built environment. The study gives the
idea of emerging crimes that are made to threat the digital and
physical assets that are used to form the digital economies.
These threats are often made to affect the critical infrastructure
of the smart cities. These smart cities are comprised of the
cyber systems which also increase the national wealth, preserve
health, and provide safety and welfare to the nation. In this
regard, it is important to protect the cyber systems from the
critical and emerging threats. Additionally, the article reveals
the safe and emerging countermeasure for avoiding the cyber
threats which are based on the smart transitions. This article is
significant because it provides the direction for the future
research by directing the use of innovative blockchain
3. technology so that a reliable and safe digital environment can
flourish.
Relevance: This study is found relevant to the topic of research
as it defines the threat to cyber systems in another context. The
cyber systems are beneficial and reliable because all the process
involved is automatic. In this regard, it is used for all the
purposes in the smart cities. The author has determined the
emerging threats to the cyber systems of the smart city along
with the solution that can help to reduce and avoid the risks of
the threats. Thus this study is mandatory as it determines the
significance of the cyber systems such as contribution to the
national wealth, health, etc. The author of the article aims to
explore threats to the digital systems through proper means of
cybersecurity.
Source#3
Reference: Gupta, A., Anpalagan, A., Carvalho, G. H., Guan,
L., & Woungang, I. (2019). Prevailing and emerging cyber
threats and security practices in IoT-Enabled smart grids: A
survey. Journal of Network and Computer Applications.
Summary: This article introduces to the advanced persistent
threats in the cyber systems. As the cyber systems are capable
to install everywhere including smart grids. The smart grids are
IoT based systems that are synchronized to the internet. Hence,
information related to the grid stations is kept on the network
and smart devices. The cybercriminals sent malicious viruses
and threats to those systems so that data can be destroyed. On
the other hand, the article reveals the importance of IoT devices
for the growth of smart grids and related systems. Moreover,
several seven step attack procedure is also summarized in the
article which enables to understand the sophisticated and
emerging attacking tricks. Hence, the article reveals the detailed
and easy analysis of the cyber threats in the smart grid stations.
Relevance: The article is of dominant importance because it
reveals the important and detailed analysis of the cyber threats
which can affect in numerous IoT based applications. Though,
this research is limited to the cyber threats in the smart grid
4. stations but it increases the basic information about the threats
that can destroy the IoT devices. The author has revealed an
interesting seven steps attacking procedure which is relevant to
avoid the emerging cyber threats. Though, in the recent years,
the several industries have been gone through the sever
breaches and ransomed attacks which are continuously
destroying the reliability of the cyber systems. Concerning this,
this article helps to plan the cyber defenders and security
systems in a better way.
Source#4
Reference: Adriani, R. (2019). The Evolution of Fake News and
the Abuse of Emerging Technologies. European Journal of
Social Sciences, 2(1), 32-38.
Summary: This article investigates the emergence in the latest
cybercrimes which can cause severe harm to the people,
factories, industries, and businesses. Among these cyber threats,
the spread of fake news and post factual society are more
common. The author Adriani had analyzed these cyber threats
from different perspectives. The author has determined the
evolution of fake news which is very important to control the
emergence of the fake news evolution. The author has revealed
that the post factual society and fake news evolution can fuel
the abasement through the powerful technologies. The author
has made an effort to reveal the negative effects of the fake
news and emerging technologies that can throw realistic fake
audio and video that can easily threat anyone belonging to any
industry.
Relevance: The article “The Evolution of Fake News and the
Abuse of Emerging Technologies" aids to examine the emerging
threats. It has been mentioned in the article that the fake news
evolution is at the peak which can cause negative effects to the
public. Furthermore, other emerging technologies like artificial
intelligence and other can be merged to threats people easily.
For instance, the emerging cyber threats can cheat by making
the fake video and audio which is difficult to distinguish
5. between the fake and regard. Thus, similar tricks can be used to
threats the people by such kind of deep fakes. The study
revolves around the emerging technologies and resulted in
abuse. Based on this information, the article directs to the real
line and strong defense which can be initiated through security
awareness training so that people can keep themselves and their
sensitive information safe.
Source#5
Reference: Bazm, M. M., Lacoste, M., Südholt, M., & Menaud,
J. M. (2019). Isolation in cloud computing infrastructures: new
security challenges. Annals of Telecommunications, 74(3-4),
197-209.
Summary: The article is titled as “Isolation in cloud computing
infrastructures: new security challenges” reveals the cloud
computing infrastructures. It has been defined that the cloud
computing infrastructure enables to share the hardware
resources among different clients. The clients can belong to the
execution environments such as virtual machines and Linux
containers. Furthermore, isolation is regarded as the core
security challenge for cloud computing infrastructures. Though
these systems can face severe threats due to the sharing of
physical resources including processor caches and virtualization
layer. In these type of systems
Side-channel attacks (SCAs) are used to exploit for obtaining
the sensitive data such as kernel information. This threat to
cloud infrastructures has been revealed in this article. This
article clarifies such types of attacks that can threaten isolation
of any virtualized environments like as cloud computing
infrastructures. Additionally, the authors have revealed various
different applicable countermeasures that can avoid the risks of
attacks in cloud infrastructures.
Relevance: This article is of supreme importance in relation to
the topic of research because it provides that how emerging
technologies can threat to the cyber systems. Nowadays, most of
the systems are digitalized and are connected to the cloud
6. computing. Though in businesses, education and medical
centers systems infrastructure are designed in such a way that
they can share physical resources. In these situations, it is a
difficult task to maintain the system and system's information
isolated from others so that none can be used in the wrong way.
However, these challenges are new and emerging at a higher
speed. In this regard, this article is helpful because possible
countermeasures are also mentioned by the author. These
countermeasures can be used as a guide to avoid such emerging
threats practically.