Digital Technologies Research and Applications

Review

Cyberattacks and Cybersecurity: Concepts, Current Challenges, and Future Research Directions

Downloads

Ţălu, M. (2025). Cyberattacks and Cybersecurity: Concepts, Current Challenges, and Future Research Directions. Digital Technologies Research and Applications, 4(1), 44–60. https://doi.org/10.54963/dtra.v4i1.919

Authors

  • Mircea Ţălu

    Faculty of Automation and Computer Science, The Technical University of Cluj-Napoca, 26-28 George Baritiu Street, Cluj-Napoca 400027, Romania ; SC ACCESA IT SYSTEMS SRL, Constanța St., no. 12, Platinia, Cluj-Napoca 400158, Romania

Cyberspace is the foundation of modern economic, social, and governmental activities, making cybersecurity an essential component in addressing the escalating threat of cyberattacks. These attacks, which exploit vulnerabilities through methods such as malware, data breaches, and Distributed Denial of Service attacks, lead to significant disruptions ranging from financial losses for businesses to political and military consequences. As the digital landscape evolves, the need for robust cybersecurity measures to protect interconnected systems and safeguard digital ecosystems becomes increasingly urgent. This paper provides a review of the foundational concepts of cybersecurity, offering an in-depth analysis of current challenges and strategies. Furthermore, by critically assessing the weaknesses in existing methods, this study identifies knowledge gaps and proposes actionable future research directions aimed at mitigating cyber threats.

Keywords:

Cyberattacks; Cybersecurity; Digital Ecosystems; Emerging Threats; Security Frameworks

References

  1. Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Rep 2021, 7, 8176–8186. DOI: https://doi.org/10.1016/j.egyr.2021.08.126
  2. Murali, R.J.; S K., B.S.S.; Raj, S.S.O.N.N. An extensive examination of cyber attacks and cyber security, encompassing recent advancements and emerging trends. In Proceedings of the 2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, 04–05 April 2024; pp. 1–5. DOI: https://doi.org/10.1109/ICONSTEM60960.2024.10568588
  3. Alhidaifi, S.M.; Asghar, M.R.; Ansar, I.S. A survey on cyber resilience: key strategies, research challenges, and future directions. ACM Comput. Surv 2024, 56, 1–48. DOI: https://doi.org/10.1145/3649218
  4. Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; et al. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 2023, 12, 1333. DOI: https://doi.org/10.3390/electronics12061333
  5. Kaur, J.; Ramkumar, K.R. The recent trends in cyber security: a review. J. King Saud Univ. - Comput. Inf. Sci 2022, 34, 5766–5781. DOI: https://doi.org/10.1016/j.jksuci.2021.01.018
  6. Diaba, S.Y.; Shafie-khah, M.; Elmusrati, M. Cyber-physical attack and the future energy systems: a review. Energy Rep 2024, 12, 2914–2932. DOI: https://doi.org/10.1016/j.egyr.2024.08.060
  7. Walton, S.; Wheeler, P.R.; Zhang, Y.I.; et al. An integrative review and analysis of cybersecurity research: current state and future directions. J. Inf. Syst 2021, 35, 155–186. DOI: https://doi.org/10.2308/ISYS-19-033
  8. Ţălu, M. Security and privacy in the IIoT: threats, possible security countermeasures, and future challenges. Computing&AI Connect 2025, 2, 1–12. DOI: https://doi.org/10.69709/CAIC.2025.139199
  9. Lee, N. Counterterrorism and Cybersecurity: Total Information Awareness, 1st ed.; Springer: New York, NY, USA, 2013; p. 246. DOI: https://doi.org/10.1007/978-1-4614-7205-6
  10. Giacomello, G. Security in Cyberspace: Targeting Nations, Infrastructures, Individuals; Bloomsbury Publishing: London, UK, 2014; pp. 4–6.
  11. Richet, J.L. Cybersecurity Policies and Strategies for Cyberwarfare Prevention; IGI Global: Hershey, PA, USA, 2015; pp.5–7.
  12. Blakemore, B. Policing Cyber Hate, Cyber Threats and Cyber Terrorism, 1st ed.; Taylor & Francis: Abingdon, UK, 2016. DOI: https://doi.org/10.4324/9781315601076
  13. Kremling, J.; Parker, A.M.S. Cyberspace, Cybersecurity, and Cybercrime; SAGE Publications: Thousand Oaks, CA, USA, 2017; p. 216.
  14. Sarker, I.H. CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things 2021, 14, 100393. DOI: https://doi.org/10.1016/j.iot.2021.100393
  15. Cao, J.; Ding, D.; Liu, J.; et al. Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks. Inf. Sci. 2021, 548, 69–84. DOI: https://doi.org/10.1016/j.ins.2020.09.046
  16. Bhol, S.G.; Mohanty, J.R.; Pattnaik, P.K. Taxonomy of cybersecurity metrics to measure strength of cybersecurity. Mater. Today. Proc. 2023, 80, 2274–2279. DOI: https://doi.org/10.1016/j.matpr.2021.06.228
  17. Bardin, J.S. Cyber warfare. In Computer and Information Security Handbook, 4th ed.; Vacca, J.R., Ed.; M. Kaufmann: Cambridge, MA, USA, 2025; pp. 1345–1380.
  18. Willett, M. Cyber Operations and their Responsible Use, 1st ed.; International Institute for Strategic Studies (IISS): London, UK, 2024; pp. 48–50.
  19. Obi, O.C.; Akagha, O.V.; Dawodu, S.O.; et al. Comprehensive review on cybersecurity: modern threats and advanced defense strategies. Comput. Sci. IT Res. J. 2024, 5, 293–310.
  20. Moore, D. Offensive Cyber Operations: Understanding Intangible Warfare; Oxford University Press: New York, NY, USA, 2022; pp. 36–38.
  21. Herrmann, D. Cyber espionage and cyber defense. In Information Technology for Peace and Security; Reuter, C., Ed.; Springer Vieweg: Wiesbaden, Germany, 2019; pp. 52–54.
  22. Rivera, R.; Pazmiño, L.; Becerra, F.; et al. An analysis of the cyber espionage process. In Developments and Advances in Defense and Security. Smart Innovation, Systems and Technologies; Rocha, A., Fajardo-Toro, C.H., Rodríguez, J.M.R., Eds.; Springer: Singapore, 2022; 255, pp. 3–14. DOI: https://doi.org/10.1007/978-981-16-4884-7_1
  23. Ahmed, M.; Gaber, M. An investigation on the cyber espionage ecosystem. J. Cyber Sec. Technol 2024, 1–25. DOI: https://doi.org/10.1080/23742917.2024.2399389
  24. Romano, S.P. Cyber warfare and ethical frontiers: elevating conflict to the digital frontline of global struggles. In Mind, Body, and Digital Brains. Integrated Science; Santoianni, F., Giannini, G., Ciasullo, A., Eds.; Springer: Cham, Switzerland, 2024; Volume 20, pp. 231–252. DOI: https://doi.org/10.1007/978-3-031-58363-6_15
  25. Sfetcu, N. Advanced Persistent Threats in Cybersecurity: Cyber Warfare; MultiMedia Publishing: Bucharest, Romania, 2024; pp. 4–6.
  26. Kostyuk, N.; Sidorova, J. Military cybercapacity: measures, drivers and effects. In Research Handbook on Cyberwarfare; Stevens, T., Devanny, J., Eds.; Edward Elgar Publishing: Cheltenham, UK, 2024. DOI: https://doi.org/10.4337/9781803924854.00013
  27. Maathuis, C. Towards trustworthy AI-based military cyber operations. In Proceedings of 19th International Conference on Cyber Warfare and Security, University of Johannesburg, South Africa, 26–27 March 2024.
  28. Ma, X.; Abdelfattah, W.; Luo, D.; et al. Non-cooperative game theory with generative adversarial network for effective decision-making in military cyber warfare. Ann. Oper. Res 2024. DOI: https://doi.org/10.1007/s10479-024-06406-6
  29. Kim, Y.; Kim, D.; Lee, D.; et al. Integrated scenario authoring method using mission impact analysis tool due to cyberattacks. J. Internet Comput. Serv 2023, 24, 107–117. DOI: https://doi.org/10.7472/jksii.2023.24.6.107
  30. Li, K.C.; Susilo, W.; Chen, X. Advances in Cyber Security: Principles, Techniques, and Applications; Springer Nature: Singapore, 2018; pp. 4–7.
  31. Bock, L. Modern Cryptography for Cybersecurity Professionals; Packt Publishing: Birmingham, UK, 2021; pp. 28–30.
  32. Pal, O.; Kumar, V.; Khan, R.; et al. Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography; CRC Press: Boca Raton, FL, USA, 2023; pp. 44–46.
  33. Jøsang, A. Cyber operations. In Cybersecurity; Springer: Cham, Switzerland, 2025; pp. 337–354. DOI: https://doi.org/10.1007/978-3-031-68483-8_16
  34. Becote, B.; Rimal, B.P. Complexity science and cyber operations: a literature survey. Complex Syst. Model. Simul 2023, 3, 327–342. DOI: https://doi.org/10.23919/CSMS.2023.0018
  35. Bates, J. Measuring complexity using information fluctuation: A tutorial. 2020.
  36. Sharma, P.; Gupta, H. Emerging Cyber Security Threats and Security Applications in Digital Era. In Proceedings of the 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 14–15 March 2024; pp. 1–6. DOI: https://doi.org/10.1109/ICRITO61523.2024.10522181
  37. Sharma, M. Enhancing Security and Privacy in Cyber-Physical Systems: Challenges and Solutions. In Proceedings of the 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 08-10 January 2024; pp. 0682–0686. DOI: 10.1109/CCWC60891.2024.10427691
  38. Duary, S.; Choudhury, P.; Mishra, S.; et al. Cybersecurity Threats Detection in Intelligent Networks using Predictive Analytics Approaches. In Proceedings of the 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM), Noida, India, 21–23 February 2024; pp. 1–5. DOI: 10.1109/ICIPTM59628.2024.10563348
  39. Admass, W.S.; Munaye, Y.Y.; Diro, A.A. Cyber security: State of the art, challenges, and future directions. Cybersecur. Appl. 2024, 2, 100031. DOI: https://doi.org/10.1016/j.csa.2023.100031
  40. Humayun, M.; Niazi, M.; Jhanjhi, N.; et al. Cyber security threats and vulnerabilities: a systematic mapping study. Arab. J. Sci. Eng 2020, 45, 3171–3189. DOI: https://doi.org/10.1007/s13369-019-04319-2
  41. Xing, K.; Li, A.; Jiang, R.; et al. Detection and Defense Methods of Cyber Attacks. In MDATA: A New Knowledge Representation Model. Lecture Notes in Computer Science; Jia, Y., Gu, Z., Li, A., Eds.; Springer: Cham, Switzerland, 2021; Volume 12647, pp. 185–198. DOI: https://doi.org/10.1007/978-3-030-71590-8_11
  42. Prasad, R.; Rohokale, V. Cyber Threats and Attack Overview. In Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology; Springer: Cham, Switzerland, 2020. DOI: https://doi.org/10.1007/978-3-030-31703-4_2
  43. Traer, S.; Bednar, P. Motives Behind DDoS Attacks. In Digital Transformation and Human Behavior. Lecture Notes in Information Systems and Organisation; Metallo, C., Ferrara, M., Lazazzara, A., et al., Eds.; Springer: Cham, Switzerland, 2021; Volume 37, pp. 135–147. DOI: https://doi.org/10.1007/978-3-030-47539-0_10
  44. Munk, T. The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity, 1st ed.; Routledge: London, UK, 2022; pp. 25–27.
  45. Prince, N.U.; Faheem, M.A.; Khan, O.U.; et al. AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction. Nanotechnol. Percept. 2024, 20, 332–353.
  46. Mahfuri, M.; Ghwanmeh, S.; Almajed, R.; et al. Transforming Cybersecurity in the Digital Era: The Power of AI. In Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, UAE, 26–28 February 2024; pp. 1–8. DOI: https://doi.org/10.1109/ICCR61006.2024.10533072
  47. Fatima, F.; Hyatt, J.C.; Rehman, S.U.; et al. Resilience and risk management in cybersecurity: A grounded theory study of emotional, psychological, and organizational dynamics. J. Econ. Technol 2024, 2, 247–257.
  48. Shaikh, F.A.; Siponen, M. Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions. Inf. Syst. Front 2024, 26, 1109–1120. DOI: https://doi.org/10.1007/s10796-023-10404-7
  49. Almansoori, A. Behavior Types from Cybersecurity Perspective: An Overview. In Current and Future Trends on Intelligent Technology Adoption. Studies in Computational Intelligence; Al-Sharafi, M.A., Al-Emran, M., Tan, G.W.H., et al., Eds.; Springer: Cham, Switzerland, 2024; Volume 1161, pp. 203–215. DOI: https://doi.org/10.1007/978-3-031-61463-7_10
  50. Alazab, M.; Alazab, A. Advances in Cybersecurity and Reliability. Information 2024, 15, 361. DOI: https://doi.org/10.3390/info15060361
  51. Cochran, K.A. The CIA Triad: Safeguarding Data in the Digital Realm. In Cybersecurity Essentials; Apress: Berkeley, CA, USA, 2024; pp. 17–32. DOI: https://doi.org/10.1007/979-8-8688-0432-8_2
  52. Rahul, S.; Kumaran, U.; Sai, T.T.; et al. Preventing SQL Injection Attacks on Web Applications for Enhanced Security and CIA Triad Compliance. In Advances in Information Communication Technology and Computing. AICTC 2024. Lecture Notes in Networks and Systems; Goar, V., Kuri, M., Kumar, R., et al., Eds.; Springer: Singapore, 2024; Volume 1074, pp. 99–110. DOI: https://doi.org/10.1007/978-981-97-6103-6_8
  53. Pandey, R.; Anjimoon, S.; Asha, V.; et al. Developing Robust Cybersecurity Policies and Governance Frameworks in Response to Evolving Legal and Regulatory Landscapes. In Proceedings of the 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, Raigarh, India, 05-07 June 2024; pp. 1–6. DOI: https://doi.org/10.1109/OTCON60325.2024.10687438
  54. Martino, L. Cybersecurity: Intersecting Technology and Policy. In Cybersecurity in Italy. Springer Briefs in Cybersecurity; Springer: Cham, Switzerland, 2024; pp. 1–9. DOI: https://doi.org/10.1007/978-3-031-64396-5_1