Abstract
Today’s world is highly dependent on electronic technology and protecting this data from cyber-attacks is a challenging issue. Cyberspace is considered as a new frontier where it represents a digital ecosystem, the next generation of Internet and network applications, promising a whole new world of distributed and open systems that can interact, self-organize, evolve, and adapt. At present, most of the economic, commercial, cultural, social, and governmental activities and exchanges of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Lately, countless private companies and government organizations around the world are facing the problem of cyber-attacks and the danger of wireless communication technologies. Globally, no sector is considered immune from the impacts of cyberwarfare. Global multinationals, government agencies at all levels, large organisations, and critical infrastructure providers no matter where they are headquartered or what their country of origin are all targeted primarily by criminals or state actors. Inadvertent or lateral collateral damage of nation-state driven cyberwarfare impacts organizations of all sorts. Most of the challenges and conflicts facing countries and groups today involve cyberspace. To conduct cyberspace operations, cyber target information must be collected in cyberspace, and cyber targets must be selected to achieve effective operational objectives. This article highlights the advancements presented in the field of cyber security and to investigate the challenges, weaknesses, and strengths of the proposed methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tan S, Xie P, Guerrero J, Vasquez J, Li Y, Guo X (2021) Attack detection design for dc microgrid using eigenvalue assignment approach. Energy Rep 7:469–476
Judge MA, Manzoor A, Maple C, Rodrigues JJ, ul Islam, S. (2021) Price-based demand response for household load management with interval uncertainty. Energy Rep 7:8493–8504
Aghajani G, Ghadimi N (2018) Multi-objective energy management in a micro-grid. Energy Rep 4:218–225
Khan S, Shiwakoti N, Stasinopoulos P, Chen Y (2020) Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. Accid Anal Prev 148:105837
Furnell S, Shah J (2020) Home working and cyber security—an outbreak of unpreparedness? Comput Fraud Secur 2020(8):6–12
Mehrpooya M, Ghadimi N, Marefati M, Ghorbanian S (2021) Numerical investigation of a new combined energy system includes parabolic dish solar collector, stirling engine and thermoelectric device. Int J Energy Res 45(11):16436–16455
Alibasic A, Al Junaibi R, Aung Z, Woon WL, Omar MA (2016) Cybersecurity for smart cities: a brief review. In: International workshop on data analytics for renewable energy integration. Springer, Cham, pp 22–30
Parks R, Duggan D (2011) Principles of cyberwarfare. IEEE Secur Priv Mag 9(5):30–35. Available: https://doi.org/10.1109/msp.2011.138
Jamal AA, Majid AAM, Konev A, Kosachenko T, Shelupanov A (2021) A review on security analysis of cyber physical systems using machine learning. Materials today: proceedings
Ashraf J, Keshk M, Moustafa N, Abdel-Basset M, Khurshid H, Bakhshi A, Mostafa R (2021) IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain Cities Soc 72:103041
2019 Cyber Security Risk Report: What's Now and What's Next|Aon, Aon, 2019. [Online]. Available: https://www.aon.com/cyber-solutions/thinking/2019-cyber-security-risk-report-whats-now-and-whats-next/. Accessed 30 May 2022
Bobbio A, Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M (2022) A cyber warfare perspective on risks related to health IoT devices and contact tracing. Neural Comput Appl, 1–15.https://doi.org/10.1007/s00521-021-06720-1
Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo K-KR (2021) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev 55(2):1029–1053. https://doi.org/10.1007/s10462-021-09976-0
Aliwa E, Rana O, Perera C, Burnap P (2021) Cyberattacks and countermeasures for in-vehicle networks. ACM Comput Surv 54(1):1–37. https://doi.org/10.1145/3431233
Kong P-Y (2021) A Survey of cyberattack countermeasures for unmanned aerial vehicles. IEEE Access 9:148244–148263. https://doi.org/10.1109/access.2021.3124996
Yaacoub J, Noura H, Salman O, Chehab A (2021) Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Int J Inf Secur 21(1):115–158. https://doi.org/10.1007/s10207-021-00545-8
Xiong W, Legrand E, Åberg O, Lagerström R (2021) Cyber security threat modeling based on the MITRE enterprise ATT&CK Matrix. Softw Syst Model 21(1):157–177. https://doi.org/10.1007/s10270-021-00898-7
Robinson M, Jones K, Janicke H (2015) Cyber warfare: issues and challenges. Comput Secur 49:70–94
Allianz AL (2020) Allianz risk barometer: identifying the major business risks for 2020. Retrieved from https://www.agcs.allianz.com/news-and-insights/reports/allianz-risk-barometer.html
Kallenbach P (2022) Perspectives on cyber risk: new threats and challenges in 2022—Insight—MinterEllison. [online] Minterellison.com. Available at: https://www.minterellison.com/articles/perspectives-on-cyber-risk-new-threats-and-challenges-in-2022
The Australian Cyber Security Centre. ACSC annual cyber threat report—1 July 2020 to 30 June 2021. Australian Signals Directorate. https://www.cyber.gov.au/acsc/view-all-content/reports-and-statistics/acsc-annual-cyber-threat-report-2020-21. Accessed 11 March 2022
Kure HI, Islam S, Ghazanfar M, Raza A, Pasha M (2021) Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system. Neural Comput Appl 34(1):493–514. https://doi.org/10.1007/s00521-021-06400-0
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chandra, R., Prasad, P.W.C. (2023). Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review. In: Mukhopadhyay, S.C., Senanayake, S.N.A., Withana, P.C. (eds) Innovative Technologies in Intelligent Systems and Industrial Applications. CITISIA 2022. Lecture Notes in Electrical Engineering, vol 1029. Springer, Cham. https://doi.org/10.1007/978-3-031-29078-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-29078-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29077-0
Online ISBN: 978-3-031-29078-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)