Skip to main content

Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review

  • Conference paper
  • First Online:
Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1029))

  • 214 Accesses

Abstract

Today’s world is highly dependent on electronic technology and protecting this data from cyber-attacks is a challenging issue. Cyberspace is considered as a new frontier where it represents a digital ecosystem, the next generation of Internet and network applications, promising a whole new world of distributed and open systems that can interact, self-organize, evolve, and adapt. At present, most of the economic, commercial, cultural, social, and governmental activities and exchanges of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Lately, countless private companies and government organizations around the world are facing the problem of cyber-attacks and the danger of wireless communication technologies. Globally, no sector is considered immune from the impacts of cyberwarfare. Global multinationals, government agencies at all levels, large organisations, and critical infrastructure providers no matter where they are headquartered or what their country of origin are all targeted primarily by criminals or state actors. Inadvertent or lateral collateral damage of nation-state driven cyberwarfare impacts organizations of all sorts. Most of the challenges and conflicts facing countries and groups today involve cyberspace. To conduct cyberspace operations, cyber target information must be collected in cyberspace, and cyber targets must be selected to achieve effective operational objectives. This article highlights the advancements presented in the field of cyber security and to investigate the challenges, weaknesses, and strengths of the proposed methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tan S, Xie P, Guerrero J, Vasquez J, Li Y, Guo X (2021) Attack detection design for dc microgrid using eigenvalue assignment approach. Energy Rep 7:469–476

    Article  Google Scholar 

  2. Judge MA, Manzoor A, Maple C, Rodrigues JJ, ul Islam, S. (2021) Price-based demand response for household load management with interval uncertainty. Energy Rep 7:8493–8504

    Article  Google Scholar 

  3. Aghajani G, Ghadimi N (2018) Multi-objective energy management in a micro-grid. Energy Rep 4:218–225

    Article  Google Scholar 

  4. Khan S, Shiwakoti N, Stasinopoulos P, Chen Y (2020) Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. Accid Anal Prev 148:105837

    Article  Google Scholar 

  5. Furnell S, Shah J (2020) Home working and cyber security—an outbreak of unpreparedness? Comput Fraud Secur 2020(8):6–12

    Article  Google Scholar 

  6. Mehrpooya M, Ghadimi N, Marefati M, Ghorbanian S (2021) Numerical investigation of a new combined energy system includes parabolic dish solar collector, stirling engine and thermoelectric device. Int J Energy Res 45(11):16436–16455

    Article  Google Scholar 

  7. Alibasic A, Al Junaibi R, Aung Z, Woon WL, Omar MA (2016) Cybersecurity for smart cities: a brief review. In: International workshop on data analytics for renewable energy integration. Springer, Cham, pp 22–30

    Google Scholar 

  8. Parks R, Duggan D (2011) Principles of cyberwarfare. IEEE Secur Priv Mag 9(5):30–35. Available: https://doi.org/10.1109/msp.2011.138

  9. Jamal AA, Majid AAM, Konev A, Kosachenko T, Shelupanov A (2021) A review on security analysis of cyber physical systems using machine learning. Materials today: proceedings

    Google Scholar 

  10. Ashraf J, Keshk M, Moustafa N, Abdel-Basset M, Khurshid H, Bakhshi A, Mostafa R (2021) IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain Cities Soc 72:103041

    Article  Google Scholar 

  11. 2019 Cyber Security Risk Report: What's Now and What's Next|Aon, Aon, 2019. [Online]. Available: https://www.aon.com/cyber-solutions/thinking/2019-cyber-security-risk-report-whats-now-and-whats-next/. Accessed 30 May 2022

  12. Bobbio A, Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M (2022) A cyber warfare perspective on risks related to health IoT devices and contact tracing. Neural Comput Appl, 1–15.https://doi.org/10.1007/s00521-021-06720-1

  13. Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo K-KR (2021) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev 55(2):1029–1053. https://doi.org/10.1007/s10462-021-09976-0

    Article  Google Scholar 

  14. Aliwa E, Rana O, Perera C, Burnap P (2021) Cyberattacks and countermeasures for in-vehicle networks. ACM Comput Surv 54(1):1–37. https://doi.org/10.1145/3431233

    Article  Google Scholar 

  15. Kong P-Y (2021) A Survey of cyberattack countermeasures for unmanned aerial vehicles. IEEE Access 9:148244–148263. https://doi.org/10.1109/access.2021.3124996

    Article  Google Scholar 

  16. Yaacoub J, Noura H, Salman O, Chehab A (2021) Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int J Inf Secur 21(1):115–158. https://doi.org/10.1007/s10207-021-00545-8

  17. Xiong W, Legrand E, Åberg O, Lagerström R (2021) Cyber security threat modeling based on the MITRE enterprise ATT&CK Matrix. Softw Syst Model 21(1):157–177. https://doi.org/10.1007/s10270-021-00898-7

    Article  Google Scholar 

  18. Robinson M, Jones K, Janicke H (2015) Cyber warfare: issues and challenges. Comput Secur 49:70–94

    Article  Google Scholar 

  19. Allianz AL (2020) Allianz risk barometer: identifying the major business risks for 2020. Retrieved from https://www.agcs.allianz.com/news-and-insights/reports/allianz-risk-barometer.html

  20. Kallenbach P (2022) Perspectives on cyber risk: new threats and challenges in 2022—Insight—MinterEllison. [online] Minterellison.com. Available at: https://www.minterellison.com/articles/perspectives-on-cyber-risk-new-threats-and-challenges-in-2022

  21. The Australian Cyber Security Centre. ACSC annual cyber threat report—1 July 2020 to 30 June 2021. Australian Signals Directorate. https://www.cyber.gov.au/acsc/view-all-content/reports-and-statistics/acsc-annual-cyber-threat-report-2020-21. Accessed 11 March 2022

  22. Kure HI, Islam S, Ghazanfar M, Raza A, Pasha M (2021) Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system. Neural Comput Appl 34(1):493–514. https://doi.org/10.1007/s00521-021-06400-0

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. W. C. Prasad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chandra, R., Prasad, P.W.C. (2023). Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review. In: Mukhopadhyay, S.C., Senanayake, S.N.A., Withana, P.C. (eds) Innovative Technologies in Intelligent Systems and Industrial Applications. CITISIA 2022. Lecture Notes in Electrical Engineering, vol 1029. Springer, Cham. https://doi.org/10.1007/978-3-031-29078-7_16

Download citation

Publish with us

Policies and ethics