Bhana, B., & Flowerday, S. (2020). Passphrase and keystroke dynamics authentication: Usable security. Comput. Secur., 96, 101925.
Catherine Hiley. (2022). Brief history of cybersecurity and hacking. Retrieved 9 July 2023, from https://cybernews.com/security/brief-history-of-cybersecurity-and-hacking/
Chng, S., Lu, H. Y., Kumar, A., & Yau, D. (2022). Hacker types, motivations and strategies: A comprehensive framework. Computers in Human Behavior Reports, 5, 100167. Retrieved from https://doi.org/https://doi.org/10.1016/j.chbr.2022.100167
Cisco Security Threat Intelligence Organization. (2019). Talos Intelligence .
Haque, A. K. M. B., & Tasmin, S. (2020). Security Threats and Research Challenges of IoT - A Review. Journal of Engineering Advancements, 01(04), 170–182. Retrieved from https://doi.org/10.38032/jea.2020.04.008
Hatfield, J. M. (2018). Social engineering in cybersecurity: The evolution of a concept. Comput. Secur., 73, 102–113.
Hussain, A., Mohamed, A., & Razali, S. (2020). A Review on Cybersecurity: Challenges & Emerging Threats. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security. New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3386723.3387847
Jordan, T. (2017). A genealogy of hacking. Convergence, 23(5), 528–544. Retrieved from https://doi.org/10.1177/1354856516640710
Jung, Y., Choi, E., & Park, N. (2022). Educational Aids for Teaching Hacking Principles to Strengthen Computational Thinking Skills to Elementary. Webology.
Kanter, G. P., Kufahl, J., & Cohen, I. G. (2021). Beyond Security Patches—Fundamental Incentive Problems in Health Care Cybersecurity. JAMA Health Forum, 2(10), e212969–e212969. Retrieved from https://doi.org/10.1001/jamahealthforum.2021.2969
Kanter GP, Kufahl J, & Cohen IG. (2021). Beyond Security Patches—Fundamental Incentive Problems in Health Care Cybersecurity. In JAMA Health Forum.
Krishnappa, T. (2023). A REVIEW ON ARTIFICIAL INTELLIGENCE TECHNIQUES IN PREVENTING CYBER THREATS. International Journal of Engineering Applied Sciences and Technology (Vol. 8). Retrieved from http://www.ijeast.com
Martens, M., Wolf, R. De, & Marez, L. De. (2019). Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Comput. Hum. Behav., 92, 139–150.
Mohammed. I. Alghamdi. (2021). History, Present 2021 and Future of Cyber Attacks. Journal of Journal of Cybersecurity and Information Management, 8(2), 71–83.
Oppliger, R., Hauser, R. C., & Basin, D. A. (2006). SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Comput. Commun., 29, 2238–2246.
PCI, S. S. C. (2009). PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.2.1 For merchants and other entities involved in payment card processing PCI DSS Quick Reference Guide: Understanding the Payment Card Industry Data Security Standard version 3.2.1. Retrieved from www.pcisecuritystandards.org.
Rathore, M., & Vaish, A. (2020). A system design for multi-phase, hybrid DDoS detection. Computer Fraud & Security, 2020(11), 10–19. Retrieved from https://doi.org/https://doi.org/10.1016/S1361-3723(20)30119-6
Ryz, L., & Grest, L. (2016). A new era in data protection. Computer Fraud & Security, 2016(3), 18–20. Retrieved from https://doi.org/https://doi.org/10.1016/S1361-3723(16)30028-8
Sarker, I. H. (2021). AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. Retrieved from https://doi.org/10.20944/preprints202101.0457.v1
Shackelford, S., Schneier, B., Sulmeyer, M., Boustead, A., Buchanan, B., Deckard, A., … Smith, J. (2017). Making Democracy Harder to Hack. University of Michigan Journal of Law Reform, (50.3), 629. Retrieved from https://doi.org/10.36646/mjlr.50.3.making
Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. IEEE Access, 9, 94318–94337. Retrieved from https://doi.org/10.1109/ACCESS.2021.3087109
- Abstract viewed - 308 times
- Pdf downloaded - 112 times
Mohd Hafiz Ali Mohd Anuar
Universiti Utara Malaysia
Mohamad Fadli Zolkipli
Universiti Utara Malaysia
How to Cite
An Analysis of Future Strategies to Protect Against Hackers
Vol 6 No 3 (2023): September
Submitted: Jul 12, 2023
Published: Aug 18, 2023
In these articles, we take a deep dive into the ever-changing nature of hacking, its effects on cybersecurity, and future strategies to combat it. The difficulty of ensuring cyber security is further heightened by the fact that the study shows how technology, policy, and human factors all interact with one another. We look at how modern hacking techniques including phishing attacks, malware, exploiting outdated software, password cracking, and Denial of Service (DoS) may have far-reaching effects. Future hacking is expected to be characterized by a rise in AI-driven attacks, Internet of Things vulnerabilities, sophisticated ransomware, state-sponsored cyber-attacks, and cloud vulnerabilities. We propose a three-pronged strategy for addressing these threats: technological remedies; robust regulation and governance; and an increased emphasis on human factors and awareness. The paper highlights the need for a flexible, multi-layered security system capable of adapting to the ever-evolving character of cyber threats. The study promotes a sophisticated knowledge of cybersecurity and offers a road map for future resistance against hackers by combining the latest academic research with long-term strategic planning.