IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

A RESEARCH PAPER ON CYBER SECURITY THREATS AND CHALLENGES

AUTHORS:
Thiwisha M.S
Mentor
P.Vanitha
Affiliation
Department of Computer Technology Dr.N.G.P Arts and Science College (Autonomous)
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The digital revolution has transformed modern civilization by enabling rapid communication, digital commerce, cloud computing, artificial intelligence systems, and interconnected infrastructures. However,this rapid technological advancement has significantly increased cyber vulnerabilities and digital threats. Cyber security has therefore emerged as a critical domain to safeguard information systems, digital assets, and national infrastructures from cyber attacks. This research paper provides an in-depth analysis of cyber crimes, attack methodologies, defense mechanisms, emerging technologies such as Artificial Intelligence, Blockchain, IoT, and Quantum Computing, along with governance policies and global frameworks. The paper also examines case studies of recent cyber attacks and discusses modern security architectures such as Zero Trust and Defense-in-Depth strategies. The study concludes that a multi-layered, technology-driven, and awareness-based approach is essential for building a resilient cyber ecosystem

Keywords
Article Metrics
Article Views
36
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

M.S, T. (2026). A Research Paper on Cyber Security Threats and Challenges. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.303

M.S, Thiwisha. "A Research Paper on Cyber Security Threats and Challenges." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.303.

M.S, Thiwisha. "A Research Paper on Cyber Security Threats and Challenges." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.303.

References
1.Stallings, (2018). Computer Security: Principles and Practice (4th ed.). Pearson. pp. 3–25.

2.Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. pp. 64–92.

3.Whitman, E., & Mattord, H. J. (2019). Principles of Information Security (6th ed.). Cengage Learning. pp. 15–40.

4.Bishop, (2019). Computer Security: Art and Science (2nd ed.). Addison-Wesley. pp. 45–78.

5.Andress, J. (2019). The Basics of Information Security (3rd ed.). pp. 101–130.

6.Vacca, R. (2017). Computer and Information Security Handbook (3rd ed.). Morgan Kaufmann. pp. 211–245.

7.Chou, (2013). Security Threats on Cloud Computing Vulnerabilities. International Journal of Computer Science & Information Technology, 5(3), pp. 79–88.

8.Cloud Security Alliance. (2022). Top Threats to Cloud Computing: Pandemic Eleven. pp. 6–28.

9.Symantec (2019). Internet Security Threat Report. Vol. 24, pp. 12–35.

10.(2023). Data Breach Investigations Report (DBIR). pp. 5–30.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
A Literature Review on Drone Technology Adoption in the Indian Construction Industry
string(8) "Tharun k" k, T.
(2026)
DOI: 10.55041/ijsmt.v2i3.274
Divine in Art: Aesthetic Rapture, Masochism, Metaphysical Awareness
string(19) "Vivechana Prajapati" Prajapati, V.
(2026)
DOI: 10.55041/ijsmt.v2i3.438
Strategic Role of Human Resource Analytics in Higher Education Institutions
string(54) "Saurabh Sonkar ,Varun Agrwal ,Neha Verma , Komal Patel" Patel, S. S. ,. A. ,. V. ,. K.
(2026)
DOI: 10.55041/ijsmt.v2i3.030
Scroll to Top