Abstract

Cybersecurity plays a significant role within the discipline of IT. Nowadays, the biggest challenge is protecting information. Whenever we think about cyber security, the initial thought that comes to mind is "cybercrimes," which are becoming more and more common every day. Companies and governments are taking many steps to prevent these cybercrimes, but despite these efforts, many individuals are still very concerned about cyber security. This paper mainly concentrates on the challenges that cyber security faces in the context of the newest technologies. It also concentrates on the most current undertakings in cyber security techniques, ethics, and trends that are transforming the profession.

Keywords

  • cyber crime
  • cyber security
  • social media
  • cyber ethics
  • android apps
  • cloud computing

References

  1. Abdulsalam, Y. S., & Hedabou, M. (2021). Security and privacy in cloud computing: technical review. Future Internet, 14(1), 11.
  2. Al-Sarayreh, D. R. (2024). Jordanian Cybercrime Law No.(17) of 2023 between Regulating Social Media Sites and Restricting Freedom of Opinion. Scholars International Journal of Law, Crime and Justice, 7(09), 339-351.
  3. Bailey, D. E., Faraj, S., Hinds, P. J., Leonardi, P. M., & von Krogh, G. (2022). We are all theorists of technology now: A relational perspective on emerging technology and organizing. Organization Science, 33(1), 1-18.
  4. Balkin, J. M. (2021). How to regulate (and not regulate) social media. J. Free Speech L., 1, 71.
  5. Choi, K. S., Lee, C. S., & Merizalde, J. (2023). Spreading viruses and malicious codes. In Handbook on Crime and Technology (pp. 232-250). Edward Elgar Publishing.
  6. Dastagiraiah, C. (2025). Online Secure Transaction System with Crpytography.
  7. Deora, R. S., & Chudasama, D. (2021). Brief study of cybercrime on an internet. Journal of communication engineering & Systems, 11(1), 1-6.
  8. Dhayanidhi, G. (2022). Research on IoT threats & implementation of AI/ML to address emerging cybersecurity issues in IoT with cloud computing.
  9. Golightly, L., Chang, V., Xu, Q. A., Gao, X., & Liu, B. S. (2022). Adoption of cloud computing as innovation in the organization. International Journal of Engineering Business Management, 14, 18479790221093992.
  10. Goni, O., Ali, M. H., Alam, M. M., & Shameem, M. A. (2022). The basic concept of cyber crime. Journal of Technology Innovations and Energy, 1(2), 16-24.
  11. Gupta, N., Jindal, V., & Bedi, P. (2023). A survey on intrusion detection and prevention systems. SN Computer Science, 4(5), 439.
  12. Hazra, R., Chatterjee, P., Singh, Y., Podder, G., & Das, T. (2024). Data encryption and secure communication protocols. In Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning (pp. 546-570). IGI Global.
  13. Hendrycks, D., Mazeika, M., & Woodside, T. (2023). An overview of catastrophic AI risks. arXiv preprint arXiv:2306.12001.
  14. Hodson, C. J. (2024). Cyber risk management: Prioritize threats, identify vulnerabilities and apply controls. Kogan Page Publishers.
  15. Ibrahim, H. (2022). A review on the mechanism mitigating and eliminating internet crimes using modern technologies: Mitigating internet crimes using modern technologies. Wasit Journal of Computer and Mathematics Science, 1(3), 50-68.
  16. jalal yousef Zaidieh, A. (2024). Combatting cybersecurity threats on social media: Network protection and data integrity strategies. Journal of Artificial Intelligence and Computational Technology, 1(1).
  17. Kaur, G., Bonde, U., Pise, K. L., Yewale, S., Agrawal, P., Shobhane, P., ... & Gangarde, R. (2024). Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime. Engineering Proceedings, 62(1), 6.
  18. Kondrashenko, I., & Grechykhina, N. (2021). Varieties of computer viruses and methods of protection against them. Antivirus programs. НАУКА–ВИРОБНИЦТВУ, 13.
  19. Martin, A. S. (2023). Outer space, the final frontier of cyberspace: Regulating cybersecurity issues in two interwoven domains. Astropolitics, 21(1), 1-22.
  20. Nidup, Y. (2021). Awareness about the online security threat and ways to secure the youths. Journal of Cybersecurity, 3(3), 133.
  21. Nikiforova, A. (2022, April). Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first. In The International Research & Innovation Forum (pp. 3-15). Cham: Springer International Publishing.
  22. Oladoyinbo, T. O., Oladoyinbo, O. B., & Akinkunmi, A. I. (2024). The Importance Of Data Encryption Algorithm In Data Security. Current Journal of International Organization of Scientific Research Journal of Mobile Computing & Application (IOSRJMCA), 11(2), 10-16.
  23. Rathi, S. K., Keswani, B., Saxena, R. K., Kapoor, S. K., Gupta, S., & Rawat, R. (Eds.). (2024). Online social networks in business frameworks. John Wiley & Sons.
  24. Sharif, M. H. U., & Mohammed, M. A. (2022). A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews, 15(1), 138-156.
  25. Tomassi, A., Falegnami, A., & Romano, E. (2024). Mapping automatic social media information disorder. The role of bots and AI in spreading misleading information in society. Plos one, 19(5), e0303183.
  26. Vinoth, S., Vemula, H. L., Haralayya, B., Mamgain, P., Hasan, M. F., & Naved, M. (2022). Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings, 51, 2172-2175.
  27. Whittaker, J. M., Edwards, M., Cross, C., & Button, M. (2023). “I have only checked after the event”: Consumer approaches to safe online shopping. Victims & Offenders, 18(7), 1259-1281.