Literature Review on Combating Cyber Threats
Deepu C P
Department of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College
Chemperi, Kannur Email:deepu3dra5@gmail.com
Swathi Ravi M D
epartment of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College
Chemperi, Kannur Email:raviswathi931@gmail.com
Lajin C P
Department of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College
Chemperi, Kannur Email:lajincp1011@gmail.com
Faheema Hassan
Department of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College
Chemperi, Kannur Email:faheemah703@gmail.com
Mr.Rasheed Ahamed Azad V
Assistant Professor Department of Computer Science and Engineering (Cyber Security) Vimal Jyothi Engineering College
Chemperi, Kannur Email:rasheedklpm@vjec.ac.in
Abstract—Technological advancement is accelerating, but this may also endanger people to cyberattacks. RSA and all the other traditional encryption techniques were once thought to be unforgivable, but were soon broken with the emergence of quantum computing, which removed them for the Quantum Resistant Algorithm. This traditional method is thought to be robust with regard to the current available technologies. However, this would change because, with each technological advancement, a system thought to be perfectly secure today will find its weakness tomorrow. Threats extend much beyond problems with encryption. Software flaws, weak passwords, phishing schemes, social engineering techniques more complex threats like artifi- cial intelligence tools, such as hacking automated toolkits and deepfake-based identity fraud, are all utilised by cybercriminals to obtain confidential information without authorisation. In the digital age, cybersecurity is a constant struggle due to the growing likelihood of data breaches, ransomware attacks even major system failures are caused by the growth in digital infrastructure.
Index Terms—Cybersecurity, Hybrid Security Systems, Physical-Digital Integration, AI/ML Security, Proactive Cyber Defense, Fake Data Generation.