A Close Glimpse on the Security Challenges in the Smart Era

A Close Glimpse on the Security Challenges in the Smart Era

Somya Goyal, Ayush Gupta, Shirisha Bansal, Jyotir Moy Chatterjee
DOI: 10.4018/978-1-6684-5250-9.ch021
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Today the world is facing many cyber-crimes irrespective of the geographical boundaries, and privacy is being compromised all across the globe. According to some assessments, the extent and frequency of data breaches are increasing alarmingly, prompting organizations throughout the world to take action to address what appears to be a worsening situation. In today's world we cannot live without technology and cyber security is vital for keeping our personal information safe. This chapter would improve the awareness about technical, privacy, and security infringements and help in protecting data by prioritizing the most assailed sectors. It will help the key audience to learn about data leaks and other ways our privacy and security gets compromised due various challenges, diverse up-to-date prevention and detection policies, fresh challenges, favourable answers, and exciting opportunities.
Chapter Preview
Top

Introduction

Human life without technology is like birds without feathers. We are surrounded by technology at all times and use it to solve a variety of difficulties. It is the result of added knowledge and its use in all processes, skills, techniques, and methods used in manufacturing products and technical research (Shapira et al., 2013). The advancement in the technological lives raises the need of more secure information systems to avoid the leak of information. As now-a-days, the real power lies in the information only. The internet is used by approximately 4.9 billion people across the world as of 2022.

The epidemic of the Corona virus has also demonstrated the relevance of technology in our daily lives. We can utilise technology to remain in touch, work, communicate, and, well, survive. When grocery shops and marketplaces were closed, technology aided us in meeting our food needs. Those who have managed to keep their jobs amid the epidemic have done so because to technological advancements.

Technology has progressed steadily from the stone era to roughly 100 years ago, and it has now developed and updated on a massive and widespread scale in a very short period of time. AI is a ground-breaking technology that has been growing rapidly and has the potential to change the world (Sinha et al., 2022; Lodha et al., 2022; Mohammad et al., 2022). Nobody can argue that technology has become so vital in our lives that it’s almost impossible to picture life without it (Goyal, 2022; Panwar et al., 2022.; Kumar et al., 2022; Sobhani et al., 2022). Almost every industry has been impacted by technology and it is used in almost everything be it transactions, creating job profiles, education, business, healthcare, news, awareness, communication and even security purposes such as spy-cams, doorbells, etc. In today’s world, life without technology is like living alone on an isolated island (Goyal, 2022.a; Goyal, 2022.b; Goyal, 2022.c). Artificial Intelligence (AI), Machine Learning (ML) and IOT are inseparable parts of our lives.

Every coin has two sides, so with the conveniences and boons of technology also come the harms and threats to individuals and organisations. With the data being online unwanted and mischievous people can access it through some loopholes and use it for fraudulent and malicious acts. As we are aware technology today is evolving at a very rapid pace and so are the loopholes in it. It is impossible to find all the vulnerabilities in the system beforehand. It is a huge challenge for us to make the systems secure as we need to catch all the loopholes to make sure the system is secure but if the hacker catches hold of even one vulnerability it can immensely damage and compromise a system and information.

The IT security systems are not too capable of protecting users and organisations from the unauthorised access of information by hackers. People can be easily hacked exposing them and their personal data high-risk attack subjects (Shu & Yao, 2012) Often it is too simple to trick people into clicking on harmful links and or downloading and installing malicious apps. and or backdoor’s resulting in infecting their corporate networks and electronic devices. In terms of local cyberattacks, worldwide India has ranked at 11th and has already had 2,299,682 occurrences in the first quarter of 2020.

Figure 1.

Top Cyber security Challenges

978-1-6684-5250-9.ch021.f01

Complete Chapter List

Search this Book:
Reset