This assignment will be one of several throughout the Ph.D. program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral progra

Running Head: ANNOTATED BIBLIOGRAPHY

Annotated Bibliography on Emerging Cyber Threats

[Name of Institution]

[Name of Writer]

Annotated Bibliography on Emerging Cyber Threats

Source#1

Reference: Kettani, H., & Wainwright, P. (2019, March). On the Top Threats to Cyber Systems. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (pp. 175-179). IEEE.

Summary: This article reveals the threats to the cyber systems even some of them are not known to the common people. The article defines that the latest technology has advanced the cyber systems and these advancements are attractive and beneficial in comparison to the previous systems. However, due to this sophisticated and attractive advancement the individuals, societies, and nations had become dependent on the cyber systems. These systems result in the higher gain and ease of handling since people had relying on the cyber systems. Moreover, the author argues that for the adoption of the proper defense and mitigations to the threats it is necessary to understand cyber threats. The top threats with a brief discussion of threat agents and attack vectors along with the countermeasures are mentioned so that the readers can find knowledge in this regard.

Relevance: This article is of paramount importance because it defines the importance of the topic of research. As the aim of the research is to expose the emerging cyber-attacks and the author of the article “On the Top Threats to Cyber Systems” reveals the importance of the cyber systems which is important for understanding the dependence over the cyber systems. In addition to this, the article is found worth reading because it reveals the emerging cybercrimes and ways of protection too. The study is found relevant because it reveals that cyber systems are important nowadays because they are used in the business systems, control systems, and for accessing the control systems. In other words, the articles provide an overview of the emerging threats and latest trends in the cyber systems.

Source#2

Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management.

Summary: This article determines the cyber systems attack in the sector of the digital built environment. The study gives the idea of emerging crimes that are made to threat the digital and physical assets that are used to form the digital economies. These threats are often made to affect the critical infrastructure of the smart cities. These smart cities are comprised of the cyber systems which also increase the national wealth, preserve health, and provide safety and welfare to the nation. In this regard, it is important to protect the cyber systems from the critical and emerging threats. Additionally, the article reveals the safe and emerging countermeasure for avoiding the cyber threats which are based on the smart transitions. This article is significant because it provides the direction for the future research by directing the use of innovative blockchain technology so that a reliable and safe digital environment can flourish.

Relevance: This study is found relevant to the topic of research as it defines the threat to cyber systems in another context. The cyber systems are beneficial and reliable because all the process involved is automatic. In this regard, it is used for all the purposes in the smart cities. The author has determined the emerging threats to the cyber systems of the smart city along with the solution that can help to reduce and avoid the risks of the threats. Thus this study is mandatory as it determines the significance of the cyber systems such as contribution to the national wealth, health, etc. The author of the article aims to explore threats to the digital systems through proper means of cybersecurity.

Source#3

Reference: Gupta, A., Anpalagan, A., Carvalho, G. H., Guan, L., & Woungang, I. (2019). Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey. Journal of Network and Computer Applications.

Summary: This article introduces to the advanced persistent threats in the cyber systems. As the cyber systems are capable to install everywhere including smart grids. The smart grids are IoT based systems that are synchronized to the internet. Hence, information related to the grid stations is kept on the network and smart devices. The cybercriminals sent malicious viruses and threats to those systems so that data can be destroyed. On the other hand, the article reveals the importance of IoT devices for the growth of smart grids and related systems. Moreover, several seven step attack procedure is also summarized in the article which enables to understand the sophisticated and emerging attacking tricks. Hence, the article reveals the detailed and easy analysis of the cyber threats in the smart grid stations.

Relevance: The article is of dominant importance because it reveals the important and detailed analysis of the cyber threats which can affect in numerous IoT based applications. Though, this research is limited to the cyber threats in the smart grid stations but it increases the basic information about the threats that can destroy the IoT devices. The author has revealed an interesting seven steps attacking procedure which is relevant to avoid the emerging cyber threats. Though, in the recent years, the several industries have been gone through the sever breaches and ransomed attacks which are continuously destroying the reliability of the cyber systems. Concerning this, this article helps to plan the cyber defenders and security systems in a better way.

Source#4

Reference: Adriani, R. (2019). The Evolution of Fake News and the Abuse of Emerging Technologies. European Journal of Social Sciences, 2(1), 32-38.

Summary: This article investigates the emergence in the latest cybercrimes which can cause severe harm to the people, factories, industries, and businesses. Among these cyber threats, the spread of fake news and post factual society are more common. The author Adriani had analyzed these cyber threats from different perspectives. The author has determined the evolution of fake news which is very important to control the emergence of the fake news evolution. The author has revealed that the post factual society and fake news evolution can fuel the abasement through the powerful technologies. The author has made an effort to reveal the negative effects of the fake news and emerging technologies that can throw realistic fake audio and video that can easily threat anyone belonging to any industry.

Relevance: The article “The Evolution of Fake News and the Abuse of Emerging Technologies" aids to examine the emerging threats. It has been mentioned in the article that the fake news evolution is at the peak which can cause negative effects to the public. Furthermore, other emerging technologies like artificial intelligence and other can be merged to threats people easily. For instance, the emerging cyber threats can cheat by making the fake video and audio which is difficult to distinguish between the fake and regard. Thus, similar tricks can be used to threats the people by such kind of deep fakes. The study revolves around the emerging technologies and resulted in abuse. Based on this information, the article directs to the real line and strong defense which can be initiated through security awareness training so that people can keep themselves and their sensitive information safe.

Source#5

Reference: Bazm, M. M., Lacoste, M., Südholt, M., & Menaud, J. M. (2019). Isolation in cloud computing infrastructures: new security challenges. Annals of Telecommunications, 74(3-4), 197-209.

Summary: The article is titled as “Isolation in cloud computing infrastructures: new security challenges” reveals the cloud computing infrastructures. It has been defined that the cloud computing infrastructure enables to share the hardware resources among different clients. The clients can belong to the execution environments such as virtual machines and Linux containers. Furthermore, isolation is regarded as the core security challenge for cloud computing infrastructures. Though these systems can face severe threats due to the sharing of physical resources including processor caches and virtualization layer. In these type of systems

Side-channel attacks (SCAs) are used to exploit for obtaining the sensitive data such as kernel information. This threat to cloud infrastructures has been revealed in this article. This article clarifies such types of attacks that can threaten isolation of any virtualized environments like as cloud computing infrastructures. Additionally, the authors have revealed various different applicable countermeasures that can avoid the risks of attacks in cloud infrastructures.

Relevance: This article is of supreme importance in relation to the topic of research because it provides that how emerging technologies can threat to the cyber systems. Nowadays, most of the systems are digitalized and are connected to the cloud computing. Though in businesses, education and medical centers systems infrastructure are designed in such a way that they can share physical resources. In these situations, it is a difficult task to maintain the system and system's information isolated from others so that none can be used in the wrong way. However, these challenges are new and emerging at a higher speed. In this regard, this article is helpful because possible countermeasures are also mentioned by the author. These countermeasures can be used as a guide to avoid such emerging threats practically.