CYBER SECURITY CHALLENGES IN THE AGE OF DIGITALISATION: HOW CAN COMPUTERS BE PROTECTED?
Keywords:
Cyber Security, Digitalisation Era, ComputersAbstract
In the era of growing digitalisation, cybersecurity challenges have become critical issues that require serious attention from individuals and organisations. Various types of cyber threats such as ransomware, phishing, and DDoS attacks are increasingly sophisticated and diverse, demanding a comprehensive and proactive approach to digital asset protection. Ensuring computers are protected requires a combination of up-to-date security technologies such as antivirus, firewalls, data encryption, and multifactor authentication, as well as strict security policy implementation and ongoing education. Success in meeting these challenges also depends on adaptability and rapid response to dynamic threats, with the development of effective emergency response plans. The right combination of technology, policy and operational preparedness will provide robust and responsive protection amidst the complexity of today's digital landscape.
Downloads
References
Achar, S., Vijayendra, K., Hussain, S., & ... (2022). Business Trends in Digital Era: A Review. Journal of …, Query date: 2024-10-23 19:23:27. http://publish7promo.com/id/eprint/1645/
Aditya, A., Wulandari, C., & Loso, L. (2022). Cyber Notary: Between Notary Opportunities And Challenges In Facing The Era Of Digital Disruption 4.0 Towards 5.0.
International Journal of Law …, Query date: 2024-10-23 19:23:27. https://jurnal.unissula.ac.id/index.php/ijls/article/view/20365
Al-Rbeawi, S. (2023). A review of modern approaches of digitalization in oil and gas industry. Upstream Oil and Gas Technology, Query date: 2024-10-23 19:23:27. https://www.sciencedirect.com/science/article/pii/S2666260423000130
Azambuja, A. D., Plesker, C., Schützer, K., Anderl, R., & ... (2023). Artificial intelligence- based cyber security in the context of industry 4.0—A survey. Electronics, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/2079-9292/12/8/1920
Bala, I., Mijwil, M., Ali, G., & Sadıkoğlu, E. (2023). Analysing the connection between ai and industry 4.0 from a cybersecurity perspective: Defending the smart revolution. dir.muni.ac.ug. http://dir.muni.ac.ug/handle/20.500.12260/568
Bellatreche, L., Chernishev, G., Corral, A., Ouchani, S., & ... (2021). Advances in Model and Data Engineering in the Digitalization Era. Springer. https://doi.org/10.1007/978-3- 030-87657-9
Dariyabayevichc, U. (2023). A Comprehensive Analysis of Ecological Law in the Cyber Era. International Journal of Law and Policy, Query date: 2024-10-23 19:23:27. https://irshadjournals.com/index.php/ijlp/article/view/58
Firman, F.-. (2018). PENELITIAN KUALITATIF DAN KUANTITATIF. Query date: 2024-05-25
20:59:55. https://doi.org/10.31227/osf.io/4nq5e
Georgiou, K., Mittas, N., Mamalikidis, I., & ... (2021). Analyzing the roles and competence demand for digitalization in the oil and gas 4.0 era. IEEE …, Query date: 2024-10- 23 19:23:27. https://ieeexplore.ieee.org/abstract/document/9598932/
Gombár, M., Vagaská, A., Korauš, A., & Račková, P. (2024). Application of Structural Equation Modelling to Cybersecurity Risk Analysis in the Era of Industry 4.0. Mathematics, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/2227- 7390/12/2/343
Holovkin, B., Tavolzhanskyi, O., & ... (2021). Corruption as a cybersecurity threat in the new world order. … : The Quarterly Journal, Query date: 2024-10-23 19:23:27. https://procon.bg/ru/system/files/20.2.07_corruption.pdf
Husain, M., Faisal, M., Sadia, H., Ahmad, T., & Shukla, S. (2023). Advances in Cyberology and the Advent of the Next-gen Information Revolution. books.google.com. https://books.google.com/books?hl=en&lr=&id=hinKEAAAQBAJ&oi=fnd&pg=P R1&dq=cyber+digitalization+era+computer&ots= lNEmN5Wi&sig=RbZ81fG7G k0xLorLCW6TNiaeyRM
Kouroupis, K., & Sotiropoulos, L. (2024). Cyber Challenges amid the Digital Revolution in Maritime Transport. Jurid. Trib.-Rev. Compar. &Int’l L., Query date: 2024-10-23 19:23:27. https://heinonline.org/hol-cgi-
bin/get_pdf.cgi?handle=hein.journals/juridtrib14§ion=25
Kumar, S., Gupta, U., Singh, A., & Singh, A. (2023). Artificial intelligence: Revolutionizing cyber security in the digital era. Journal of Computers …, Query date: 2024-10-23 19:23:27. https://jcmm.co.in/index.php/jcmm/article/view/64
Maulana, Y., & Fajar, I. (2023). Analysis of cyber diplomacy and its challenges for the digital era community. IAIC Transactions on Sustainable Digital …, Query date: 2024-10-23 19:23:27. https://aptikom-journal.id/itsdi/article/view/587
Nair, M., Deshmukh, A., & Tyagi, A. (2024). Artificial intelligence for cyber security: Current trends and future challenges. … Secure Computing for Next …, Query date: 2024-10-23 19:23:27. https://doi.org/10.1002/9781394213948.ch5
Oruj, Z. (2023). Cyber Security: Contemporary cyber threats and National Strategies. Distance Education in Ukraine: Innovative, Normative …, Query date: 2024-10-23 19:23:27. https://jrnl.nau.edu.ua/index.php/DEU/article/view/17309
Perwej, Y., Abbas, S., Dixit, J., Akhtar, N., & ... (2021). A systematic literature review on the cyber security. International Journal of …, Query date: 2024-10-23 19:23:27. https://hal.science/hal-03509116/
Safitra, M., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/2071-1050/15/18/13369
Saniuk, S., & Grabowska, S. (2021). The concept of cyber-physical networks of small and medium enterprises under personalized manufacturing. Energies, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/1996-1073/14/17/5273
Suyitno. (2021). METODE PENELITIAN KUALITATIF KONSEP, PRINSIP DAN OPERASIONALNYA. Query date: 2024-05-25 20:59:55.
https://doi.org/10.31219/osf.io/auqfr
Tan, K., Chi, C., & Lam, K. (2022). Analysis of digital sovereignty and identity: From digitization to digitalization. arXiv Preprint arXiv:2202.10069, Query date: 2024-10- 23 19:23:27. https://arxiv.org/abs/2202.10069
Thakur, M. (2024). Cyber security threats and countermeasures in digital age. Journal of Applied Science and Education (JASE), Query date: 2024-10-23 19:23:27. http://jase.a2zjournals.com/index.php/ase/article/view/42
Vadiyala, V. (2021). Byte by Byte: Navigating the Chronology of Digitization and Assessing its Dynamic Influence on Economic Landscapes, Employment Trends, and Social …. Digitalization & Sustainability Review, Query date: 2024-10-23 19:23:27. https://www.researchgate.net/profile/Vishal-Reddy- Vadiyala/publication/377387435_Byte_by_Byte_Navigating_the_Chronology_of
_Digitization_and_Assessing_its_Dynamic_Influence_on_Economic_Landscape s_Employment_Trends_and_Social_Structures/links/65a37ed940ce1c5902dac01 e/Byte-by-Byte-Navigating-the-Chronology-of-Digitization-and-Assessing-its-
Dynamic-Influence-on-Economic-Landscapes-Employment-Trends-and-Social- Structures.pdf
Verma, A., Surendra, R., Reddy, B., & ... (2021). Cyber security in digital sector. … Intelligence and Smart …, Query date: 2024-10-23 19:23:27. https://ieeexplore.ieee.org/abstract/document/9395933/
Zhang, B., Yang, B., Wang, C., Wang, Z., Liu, B., & Fang, T. (2021). Computer vision-based construction process sensing for cyber–physical systems: A review. Sensors, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/1424-8220/21/16/5468


