Submitted:
05 September 2024
Posted:
09 September 2024
You are already at the latest version
Abstract
Keywords:
I. Introduction
II. Zero Trust Architecture (zta)
A. Verify Identity
B. Least Privilege Access
C. Micro-Segmentation
D. Continuous Monitoring and Analysis
E. Encryption
F. Dynamic Policy Enforcement
III. Artificial Intelligence (AI) and Machine Learning

A. Artificial Intelligence (AI)
B. Machine Learning (ML)
C. Deep Learning (DL)
IV. Extended Detection and Response (xdr)

V. Cloud Security
A. Reduce Your Attack Surface
B. Reduce Implementation of Artificial Intelligence and Machine Learning for Cloud
C. Zero Trust Model
D. Security Access Service Edge

VI. Biometric Authentication
VII. Quantum-Resistant Cryptography
VIII. Container Security
A. Image Security
B. Container Runtime Security
C. Security of Orchestration Platforms
D. Network Security
E. Access Control and Identity Management:
IX. Internet of Things (iot) Security

X. Deception Technology
XI. Conclusions
References
- Rao, P.S.; Krishna, T.G.; Muramalla, V.S.S.R. Next-gen Cybersecurity for Securing Towards Navigating the Future Guardians of the Digital Realm. International Journal of Progressive Research in Engineering Management and Science (IJPREMS) 2023, 3, 178–190. [Google Scholar]
- Javed, U.; Henry, J. (2024). Guardians of the Digital Realm: Navigating the Frontiers of Cybersecurity (No. 12106). EasyChair.
- Chandra, G.R.; Sharma, B.K.; Liaqat, I.A. UAE’s strategy towards most cyber resilient nation. International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019, 8, 2803–2809. [Google Scholar] [CrossRef]
- Indu, P.; Bhattacharyya, S. Early work vis-à-vis current trends in internet of things security. Innovations in Cybersecurity Education 2020, 127–156. [Google Scholar] [CrossRef]
- Faizan, A. Guardians of the Digital Realm: Navigating the Frontiers of Cybersecurity. Integrated Journal of Science and Technology 2024, 1. [Google Scholar]
- Shoetan, P.O.; Amoo, O.O.; Okafor, E.S.; Olorunfemi, O.L. Synthesizing AI'S impact on cybersecurity in telecommunications: A conceptual framework. Computer Science & IT Research Journal 2024, 5, 594–605. [Google Scholar] [CrossRef]
- Mitcham, Z.S.; Msa, C. (2024). Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO's Guide to Protecting the Digital World. eBookIt. com.
- Okoye, C.C.; Nwankwo, E.E.; Usman, F.O.; Mhlongo, N.Z.; Odeyemi, O.; Ike, C.U. Securing financial data storage: A review of cybersecurity challenges and solutions. International Journal of Science and Research Archive 2024, 11, 1968–1983. [Google Scholar] [CrossRef]
- Gupta, P. Securing Tomorrow: The Intersection of AI, Data, and Analytics in Fraud Prevention. Asian Journal of Research in Computer Science 2024, 17, 75–92. [Google Scholar] [CrossRef]
- Kanaan, A.; AL-Hawamleh, A.; Aloun, M.; Alorfi, A.; Abdalwahab Alrawashdeh, M. Fortifying Organizational Cyber Resilience: An Integrated Framework for Business Continuity and Growth amidst Escalating Threat Landscapes. International Journal of Computing and Digital Systems 2024, 16, 1–13. [Google Scholar]
- Sodiya, E.O.; Umoga, U.J.; Amoo, O.O.; Atadoga, A. Quantum computing and its potential impact on US cybersecurity: A review: Scrutinizing the challenges and opportunities presented by quantum technologies in safeguarding digital assets. Global Journal of Engineering and Technology Advances 2024, 18, 049–064. [Google Scholar] [CrossRef]
- Nasereddin, A. A comprehensive survey of contemporary supply chain management practices in charting the digital age revolution. Uncertain Supply Chain Management 2024, 12, 1331–1352. [Google Scholar] [CrossRef]
- Qawasmeh, S.A.D.; AlQahtani, A.A.S.; Khan, M.K. Navigating Cybersecurity Training: A Comprehensive Review. arXiv preprint 2024, arXiv:2401.11326. [Google Scholar]
- Tyagi, A.K. (2024). Blockchain and Artificial Intelligence for Cyber Security in the Era of Internet of Things and Industrial Internet of Things Applications. In AI and Blockchain Applications in Industrial Robotics (pp. 171-199). IGI Global.
- Khan, I.U.; Ouaissa, M.; Ouaissa, M.; Abou El Houda, Z.; Ijaz, M.F. (Eds.). (2024). Cyber Security for Next-Generation Computing Technologies. CRC Press.
- Anyanwu, A.; Olorunsogo, T.; Abrahams, T.O.; Akindote, O.J.; Reis, O. DATA CONFIDENTIALITY AND INTEGRITY: A REVIEW OF ACCOUNTING AND CYBERSECURITY CONTROLS IN SUPERANNUATION ORGANIZATIONS. Computer Science & IT Research Journal 2024, 5, 237–253. [Google Scholar] [CrossRef]
- Dawson, P. (2020). Defending assessment security in a digital world: Preventing e-cheating and supporting academic integrity in higher education. Routledge.
- Chipfumbu, C.T.; Tsokota, T.; Marovah, T. Cyber-Security awareness and its contribution towards sustainable human development: Insights from the Zimbabwean context. International Cybersecurity Law Review 2024, 1–18. [Google Scholar] [CrossRef]
- Amoo, O.O.; Atadoga, A.; Abrahams, T.O.; Farayola, O.A.; Osasona, F.; Ayinla, B.S. The legal landscape of cybercrime: A review of contemporary issues in the criminal justice system. World Journal of Advanced Research and Reviews 2024, 21, 205–217. [Google Scholar] [CrossRef]
- Fundira, M.; Edoun, E.I.; Pradhan, A. Adapting to the digital age: Investigating the frameworks for financial services in modern communities. Business Strategy & Development 2024, 7, e303. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).