Reference Hub1
Introduction to the Cyber-Security Landscape

Introduction to the Cyber-Security Landscape

Manoj Kumar M. V., S. L. Shiva Darshan, Prashanth B. S, Vishnu Yarlagadda
ISBN13: 9781668486665|ISBN10: 1668486660|ISBN13 Softcover: 9781668486672|EISBN13: 9781668486689
DOI: 10.4018/978-1-6684-8666-5.ch001
Cite Chapter Cite Chapter

MLA

M. V., Manoj Kumar, et al. "Introduction to the Cyber-Security Landscape." Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., IGI Global, 2023, pp. 1-21. https://doi.org/10.4018/978-1-6684-8666-5.ch001

APA

M. V., M. K., Shiva Darshan, S. L., B. S, P., & Yarlagadda, V. (2023). Introduction to the Cyber-Security Landscape. In S. Shiva Darshan, M. Manoj Kumar, B. Prashanth, & Y. Vishnu Srinivasa Murthy (Eds.), Malware Analysis and Intrusion Detection in Cyber-Physical Systems (pp. 1-21). IGI Global. https://doi.org/10.4018/978-1-6684-8666-5.ch001

Chicago

M. V., Manoj Kumar, et al. "Introduction to the Cyber-Security Landscape." In Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., 1-21. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8666-5.ch001

Export Reference

Mendeley
Favorite

Abstract

The importance of cybersecurity in the contemporary digital age is profound. In this chapter, the authors will traverse through the complex and evolving landscape of cybersecurity, exploring its progression, the driving forces behind it, the key challenges it faces, and its future trajectory. With an in-depth analysis of various threat actors and types of cyber threats, the authors will delve into the tools and technologies developed to combat these threats. The authors also explore and compare different cybersecurity approaches, studying their effectiveness and their implications. Through real-world case studies of major cyber-attacks, the chapter will provide insightful lessons learned and the impact they had on the cybersecurity landscape. We will also discuss the often-overlooked human factor in cybersecurity, focusing on the significance of cybersecurity training and the psychology of social engineering attacks. By providing a comprehensive overview of the field, this chapter aims to equip the reader with a well-rounded understanding of cybersecurity.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.