Abstract

For almost twenty years, the Internet has been a driving force in global communication and an integral part of people's everyday lives. As a result of technical developments and declining prices, over 3 billion people worldwide now utilize the Internet. The Internet has created a global infrastructure, and it is worth billions of dollars annually to the global economy (Judge et al.). Today's economic, commercial, cultural, social, and governmental activities and exchanges occur in Cyberspace, involving individuals, enterprises, non-profit organizations, and government and governmental agencies (Aghajani and Ghadimi 220). Cyberspace is the birthplace of much of the world's most essential and sensitive data, produced by transferring vital and sensitive information to it and developing fundamental and sensitive infrastructures and systems. (Akhavan-Hejazi and Mohsenian-Rad ). Also, most citizens spend time and energy interacting in this arena, which has become the focal point of media migration and financial transactions (Siniosoglou et al.) Most of a country's material and spiritual resources are invested in Cyberspace, and most of an individual's material and spiritual resources are either gained from or have a substantial influence on it (Amir and Givargis). That is to say, many facets of individuals' lives depend on this area, and its instability, insecurity, and difficulties have an impact beyond its borders (Li et al.). For example, figure 1 shows the projected cost of cybercrimes worldwide as the negative impact of insecure Cyberspace. Nonetheless, governments face new security threats in the digital realm. Due to the low barrier to entrance, anonymity, the ambiguity of the unstable geographical region, the dramatic impact, and the lack of public transparency in Cyberspace, there are powerful and weak actors in Cyberspace, including governments, organized and terrorist organizations, and even individuals (Li and Qinghui). It distinguishes cyber risks from conventional national security concerns, which tend to be more obfuscated and whose actors can typically be traced back to certain governments and states in a specific region (Sarker). Analysts have speculated on the effects of cyber assaults for over a decade (Shin et al.). A virus's purpose may be described as an attack on the financial papers of an economic system or a disruption of a country's stock market. It is also possible for severe and potentially widespread physical or economic harm to arise from delivering an inaccurate message that causes a country's power plant to halt and fail or interrupt the air traffic control system, which adds to air mishaps (Li and Qinghui).

Document Type

Paper

Disciplines

Information Security

DOI

10.25776/yzt2-e329

Publication Date

4-12-2023

Upload File

wf_yes

Share

COinS
 

Cyber Security in Cyber Space

For almost twenty years, the Internet has been a driving force in global communication and an integral part of people's everyday lives. As a result of technical developments and declining prices, over 3 billion people worldwide now utilize the Internet. The Internet has created a global infrastructure, and it is worth billions of dollars annually to the global economy (Judge et al.). Today's economic, commercial, cultural, social, and governmental activities and exchanges occur in Cyberspace, involving individuals, enterprises, non-profit organizations, and government and governmental agencies (Aghajani and Ghadimi 220). Cyberspace is the birthplace of much of the world's most essential and sensitive data, produced by transferring vital and sensitive information to it and developing fundamental and sensitive infrastructures and systems. (Akhavan-Hejazi and Mohsenian-Rad ). Also, most citizens spend time and energy interacting in this arena, which has become the focal point of media migration and financial transactions (Siniosoglou et al.) Most of a country's material and spiritual resources are invested in Cyberspace, and most of an individual's material and spiritual resources are either gained from or have a substantial influence on it (Amir and Givargis). That is to say, many facets of individuals' lives depend on this area, and its instability, insecurity, and difficulties have an impact beyond its borders (Li et al.). For example, figure 1 shows the projected cost of cybercrimes worldwide as the negative impact of insecure Cyberspace. Nonetheless, governments face new security threats in the digital realm. Due to the low barrier to entrance, anonymity, the ambiguity of the unstable geographical region, the dramatic impact, and the lack of public transparency in Cyberspace, there are powerful and weak actors in Cyberspace, including governments, organized and terrorist organizations, and even individuals (Li and Qinghui). It distinguishes cyber risks from conventional national security concerns, which tend to be more obfuscated and whose actors can typically be traced back to certain governments and states in a specific region (Sarker). Analysts have speculated on the effects of cyber assaults for over a decade (Shin et al.). A virus's purpose may be described as an attack on the financial papers of an economic system or a disruption of a country's stock market. It is also possible for severe and potentially widespread physical or economic harm to arise from delivering an inaccurate message that causes a country's power plant to halt and fail or interrupt the air traffic control system, which adds to air mishaps (Li and Qinghui).