ISSN (Online): 2321-3418
server-injected
Engineering and Computer Science
Open Access

An Analysis of the Challenges in Cyber Security and the Emerging Trends in the Current Technologies

DOI: 10.18535/ijsrm/v13i12.ec03· Pages: 2698-2706· Vol. 13, No. 12, (2025)· Published: December 21, 2025
PDF
Views: 569 PDF downloads: 140

Abstract

Cybersecurity plays a significant role within the discipline of IT. Nowadays, the biggest challenge is protecting information. Whenever we think about cyber security, the initial thought that comes to mind is "cybercrimes," which are becoming more and more common every day. Companies and governments are taking many steps to prevent these cybercrimes, but despite these efforts, many individuals are still very concerned about cyber security. This paper mainly concentrates on the challenges that cyber security faces in the context of the newest technologies. It also concentrates on the most current undertakings in cyber security techniques, ethics, and trends that are transforming the profession.

References

  1. Abdulsalam, Y. S., & Hedabou, M. (2021). Security and privacy in cloud computing: technical review. Future Internet, 14(1), 11.Google Scholar ↗
  2. Al-Sarayreh, D. R. (2024). Jordanian Cybercrime Law No.(17) of 2023 between Regulating Social Media Sites and Restricting Freedom of Opinion. Scholars International Journal of Law, Crime and Justice, 7(09), 339-351.Google Scholar ↗
  3. Bailey, D. E., Faraj, S., Hinds, P. J., Leonardi, P. M., & von Krogh, G. (2022). We are all theorists of technology now: A relational perspective on emerging technology and organizing. Organization Science, 33(1), 1-18.Google Scholar ↗
  4. Balkin, J. M. (2021). How to regulate (and not regulate) social media. J. Free Speech L., 1, 71.Google Scholar ↗
  5. Choi, K. S., Lee, C. S., & Merizalde, J. (2023). Spreading viruses and malicious codes. In Handbook on Crime and Technology (pp. 232-250). Edward Elgar Publishing.Google Scholar ↗
  6. Dastagiraiah, C. (2025). Online Secure Transaction System with Crpytography.Google Scholar ↗
  7. Deora, R. S., & Chudasama, D. (2021). Brief study of cybercrime on an internet. Journal of communication engineering & Systems, 11(1), 1-6.Google Scholar ↗
  8. Dhayanidhi, G. (2022). Research on IoT threats & implementation of AI/ML to address emerging cybersecurity issues in IoT with cloud computing.Google Scholar ↗
  9. Golightly, L., Chang, V., Xu, Q. A., Gao, X., & Liu, B. S. (2022). Adoption of cloud computing as innovation in the organization. International Journal of Engineering Business Management, 14, 18479790221093992.Google Scholar ↗
  10. Goni, O., Ali, M. H., Alam, M. M., & Shameem, M. A. (2022). The basic concept of cyber crime. Journal of Technology Innovations and Energy, 1(2), 16-24.Google Scholar ↗
  11. Gupta, N., Jindal, V., & Bedi, P. (2023). A survey on intrusion detection and prevention systems. SN Computer Science, 4(5), 439.Google Scholar ↗
  12. Hazra, R., Chatterjee, P., Singh, Y., Podder, G., & Das, T. (2024). Data encryption and secure communication protocols. In Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning (pp. 546-570). IGI Global.Google Scholar ↗
  13. Hendrycks, D., Mazeika, M., & Woodside, T. (2023). An overview of catastrophic AI risks. arXiv preprint arXiv:2306.12001.Google Scholar ↗
  14. Hodson, C. J. (2024). Cyber risk management: Prioritize threats, identify vulnerabilities and apply controls. Kogan Page Publishers.Google Scholar ↗
  15. Ibrahim, H. (2022). A review on the mechanism mitigating and eliminating internet crimes using modern technologies: Mitigating internet crimes using modern technologies. Wasit Journal of Computer and Mathematics Science, 1(3), 50-68.Google Scholar ↗
  16. jalal yousef Zaidieh, A. (2024). Combatting cybersecurity threats on social media: Network protection and data integrity strategies. Journal of Artificial Intelligence and Computational Technology, 1(1).Google Scholar ↗
  17. Kaur, G., Bonde, U., Pise, K. L., Yewale, S., Agrawal, P., Shobhane, P., ... & Gangarde, R. (2024). Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime. Engineering Proceedings, 62(1), 6.Google Scholar ↗
  18. Kondrashenko, I., & Grechykhina, N. (2021). Varieties of computer viruses and methods of protection against them. Antivirus programs. НАУКА–ВИРОБНИЦТВУ, 13.Google Scholar ↗
  19. Martin, A. S. (2023). Outer space, the final frontier of cyberspace: Regulating cybersecurity issues in two interwoven domains. Astropolitics, 21(1), 1-22.Google Scholar ↗
  20. Nidup, Y. (2021). Awareness about the online security threat and ways to secure the youths. Journal of Cybersecurity, 3(3), 133.Google Scholar ↗
  21. Nikiforova, A. (2022, April). Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first. In The International Research & Innovation Forum (pp. 3-15). Cham: Springer International Publishing.Google Scholar ↗
  22. Oladoyinbo, T. O., Oladoyinbo, O. B., & Akinkunmi, A. I. (2024). The Importance Of Data Encryption Algorithm In Data Security. Current Journal of International Organization of Scientific Research Journal of Mobile Computing & Application (IOSRJMCA), 11(2), 10-16.Google Scholar ↗
  23. Rathi, S. K., Keswani, B., Saxena, R. K., Kapoor, S. K., Gupta, S., & Rawat, R. (Eds.). (2024). Online social networks in business frameworks. John Wiley & Sons.Google Scholar ↗
  24. Sharif, M. H. U., & Mohammed, M. A. (2022). A literature review of financial losses statistics for cyber security and future trend. World Journal of Advanced Research and Reviews, 15(1), 138-156.Google Scholar ↗
  25. Tomassi, A., Falegnami, A., & Romano, E. (2024). Mapping automatic social media information disorder. The role of bots and AI in spreading misleading information in society. Plos one, 19(5), e0303183.Google Scholar ↗
  26. Vinoth, S., Vemula, H. L., Haralayya, B., Mamgain, P., Hasan, M. F., & Naved, M. (2022). Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings, 51, 2172-2175.Google Scholar ↗
  27. Whittaker, J. M., Edwards, M., Cross, C., & Button, M. (2023). “I have only checked after the event”: Consumer approaches to safe online shopping. Victims & Offenders, 18(7), 1259-1281.Google Scholar ↗
Author details
Alanoud Amer Saleem Alrkeebat
✉ Corresponding Author
👤 View Profile →