ArticlePDF Available

Physical Security to Cybersecurity (Challenges and Implications in the Modern Digital Landscape)

Authors:

Abstract

The transition from physical security to cybersecurity is a critical aspect of modern security management in the digital age. This research paper explores the challenges and implications of this transition, with a focus on the impact on digital assets and information, challenges for individuals, organizations, and governments, and best practices for mitigating cybersecurity risks. The literature review discusses the evolution of physical security and cybersecurity, key concepts and frameworks in cybersecurity, and best practices for managing cybersecurity risks. The research findings highlight the limitations of physical security in the digital landscape and emphasize the need for a proactive and comprehensive approach to cybersecurity. Contributions to the field of cybersecurity include insights into the evolving nature of cybersecurity threats, the importance of risk assessment and incident response planning, and the need for governance and risk management strategies. The limitations of the study are acknowledged, and recommendations for future research are provided. Overall, this research paper contributes to the field of cybersecurity by providing valuable insights and recommendations for enhancing cybersecurity measures in the modern digital landscape.
J. Electrical Systems 20-4s (2024): 692-702
692
1 Basheer Riskhan
2 Abdul Moqset Raufi
3 Muhammad Hamza
Usmani
Physical Security to Cybersecurity
(Challenges and Implications in the
Modern Digital Landscape)
Abstract: - The transition from physical security to cybersecurity is a critical aspect of modern security management in the digital age.
This research paper explores the challenges and implications of this transition, with a focus on the impact on digital assets and
information, challenges for individuals, organizations, and governments, and best practices for mitigating cybersecurity risks. The
literature review discusses the evolution of physical security and cybersecurity, key concepts and frameworks in cybersecurity, and
best practices for managing cybersecurity risks. The research findings highlight the limitations of physical security in the digital
landscape and emphasize the need for a proactive and comprehensive approach to cybersecurity. Contributions to the field of
cybersecurity include insights into the evolving nature of cybersecurity threats, the importance of risk assessment and incident response
planning, and the need for governance and risk management strategies. The limitations of the study are acknowledged, and
recommendations for future research are provided. Overall, this research paper contributes to the field of cybersecurity by providing
valuable insights and recommendations for enhancing cybersecurity measures in the modern digital landscape.
Keywords: Modern security management, Digital age, Transition, Physical security, Challenges.
I. INTRODUCTION
With the increasing reliance on technology and the pervasive use of the internet, the field of security has evolved
from traditional physical security measures to encompass the critical aspect of cybersecurity. In today's digital age,
where information and data are highly valuable assets, protecting them from cyber threats has become a paramount
concern for individuals, organizations, and governments alike. This paper aims to provide a comprehensive
overview of the transition from physical security to cybersecurity, including the background, terminology, statistics
on cybersecurity breaches, current developments in the field, and the limitations of physical security in the digital
age[1].
1.1 Background: Definition and Terminology of Physical Security and Cybersecurity
Physical security refers to the measures and mechanisms implemented to safeguard physical assets, such as
buildings, equipment, and personnel, from unauthorized access, theft, vandalism, or damage. It includes security
measures such as access control systems, surveillance cameras, security guards, alarms, and locks [2].
On the other hand, cybersecurity refers to the protection of digital assets, including data, networks, systems,
devices, and applications, from cyber threats, such as hackers, malware, ransomware, and social engineering
attacks. Cybersecurity measures involve a combination of technical, administrative, and physical controls, such as
firewalls, antivirus software, encryption, employee training, and incident response plans [2].
1.2 Statistics on the Growing Threat of Cybersecurity Breaches
The increasing reliance on digital technologies has also led to a rise in cybersecurity breaches, posing significant
threats to individuals, organizations, and governments worldwide. According to various reports and statistics, the
scale and frequency of cyber-attacks have been steadily increasing in recent years. For example, the number of data
breaches reported in 2020 alone reached a record high of 3,932, a 48% increase compared to the previous year,
with over 37 billion records exposed globally, and also the average cost of a data breach in 2020 was estimated to
be $3.86 million, with an average time to identify and contain a breach of 280 days. Ransomware attacks have
become more prevalent, with ransomware incidents increasing by 485% in 2020, and the average ransom demand
reaching $170,404. Next, cyber attacks on critical infrastructure, including energy, transportation, and healthcare,
have also risen, with significant consequences for public safety and national security.
These statistics highlight the growing threat and impact of cybersecurity breaches, emphasizing the need for
robust cybersecurity measures to protect against these risks [3].
1
School of Computing and Informatics, Albukhary International University, Jalan Tun Abdul razak, Alor Setar Kedah Darul Aman,
Malaysia. b.riskhan@aiu.edu.my
2 School of Computing and Informatics, Albukhary International University, Jalan Tun Abdul razak, Alor Setar Kedah Darul Aman,
Malaysia. moqset.raufi@student.aiu.edu.my
3 School of Computing, Universiti Utara Malaysia, Sintok, Bukit Kayu Hitam, Kedah, Malaysia. m_hamza_usmani@ahsgs.uum.edu.my
Copyright © JES 2024 on-line : journal.esrgroups.org
J. Electrical Systems 20-4s (2024): 692-702
693
1.3 Current Developments in the Field of Cybersecurity
The field of cybersecurity is rapidly evolving to keep pace with the ever-changing landscape of cyber threats.
Innovative technologies and approaches are continuously being developed and implemented to enhance
cybersecurity defenses. Some of the current developments in the field of cybersecurity include [4]:
Artificial intelligence (AI) and machine learning (ML) are being used to detect and respond to cyber threats
in real-time, enabling automated and proactive defenses.
Advanced encryption techniques, such as quantum-resistant cryptography, are being developed to protect
against future threats from quantum computers.
Cloud security is becoming a critical focus, with advancements in cloud-based security solutions to protect
data and applications stored in the cloud.
Threat intelligence and information sharing among organizations and countries are being emphasized to
enable a collaborative defense against cyber threats.
The use of behavioral analytics and user behavior monitoring is gaining prominence to identify anomalous
activities and potential insider threats.
Regulations and standards, such as the General Data Protection Regulation (GDPR) and the NIST
Cybersecurity Framework, are being implemented to ensure organizations adhere to best practices and
guidelines for cybersecurity.
DevSecOps, an approach that integrates security into the entire software development lifecycle, is being
adopted to build secure software from the ground up.
Zero-trust architecture, where no user or system is automatically trusted, is being implemented to reduce
the risk of unauthorized access.
Cybersecurity awareness training and education programs are being prioritized to promote a culture of
cybersecurity among employees and end-users.
Cyber threat hunting, a proactive approach to identifying and mitigating threats before they cause damage,
is gaining importance in cybersecurity operations.
1.4 Limitations of Physical Security in the Digital Age
While physical security measures have been crucial in protecting physical assets in the past, they have
limitations in the digital age where cyber threats are pervasive. The following limitations of physical security
highlight the need for robust cybersecurity measures to protect against the growing threats in the digital age [5],
which are:
Inability to protect against cyber threats: Physical security measures, such as locks, alarms, and security
guards, are designed to protect against physical threats but are ineffective against cyber threats that do not
require physical access. Cyber threats, such as malware, ransomware, and social engineering attacks, can
penetrate and disrupt systems and networks without any physical presence.
Lack of scalability and flexibility: Physical security measures are often location-dependent and may not be
easily scalable or adaptable to changing environments. In contrast, cybersecurity measures can be
implemented across geographically dispersed systems and networks, making them more scalable and
flexible.
Limited visibility and monitoring: Physical security measures may not provide comprehensive visibility
and monitoring of digital assets, making it challenging to detect and respond to cyber threats in real-time.
Cybersecurity measures, such as security information and event management (SIEM) systems, enable
centralized monitoring and analysis of security events and incidents for timely detection and response.
II. PROBLEM STATEMENT
The transition from physical security to cybersecurity presents several challenges and implications that need to
be addressed in the modern digital landscape. Some of the key problem statements are:
2.1 Transition from Physical Security to Cybersecurity: Challenges and Implications
The increasing reliance on digital systems and networks has led to a significant shift from physical security to
cybersecurity as the primary means of protecting assets. However, this transition poses challenges and implications
that need to be addressed, including:
Lack of awareness and understanding: Many organizations may not fully comprehend the nature and
severity of cyber threats, resulting in inadequate cybersecurity measures. There may be a lack of awareness
J. Electrical Systems 20-4s (2024): 692-702
694
and understanding of the complex and evolving threat landscape, leading to ineffective cybersecurity
strategies and defenses.
Limited expertise and skills: The field of cybersecurity requires specialized skills and expertise to design,
implement, and manage robust defenses against cyber threats. However, there may be a shortage of skilled
cybersecurity professionals, leading to inadequate cybersecurity capabilities and vulnerabilities in
organizations.
Budget constraints: Cybersecurity measures often require significant investments in technologies, tools,
and personnel, which may pose budget constraints for organizations. Limited budgets may result in
compromises in cybersecurity defenses, leaving organizations vulnerable to cyber attacks.
Legacy systems and infrastructure: Organizations may have legacy systems and infrastructure that may not
be designed with cybersecurity considerations, making them vulnerable to cyber threats. Retrofitting
cybersecurity measures into legacy systems can be challenging and costly, resulting in potential
vulnerabilities.
Complex regulatory landscape: The regulatory landscape for cybersecurity is complex and constantly
evolving, with varying requirements across different jurisdictions and industries. Organizations may
struggle to navigate and comply with these regulations, resulting in potential legal and financial risks.
Human factors and behavior: Human factors, such as employee awareness, training, and behavior, play a
crucial role in cybersecurity. However, human errors, negligence, and malicious actions can undermine
cybersecurity defenses, posing significant challenges in managing the human element of cybersecurity.
2.2 Need for Meaningful Understanding and Investigation in the Field of Cybersecurity
As cybersecurity becomes increasingly critical in the digital age, there is a need for meaningful understanding
and investigation in the field of cybersecurity. First of all, developing a comprehensive understanding of the threat
landscape. Organizations need to understand the evolving nature of cyber threats, including the different types of
threats, their motivations, tactics, and techniques. This understanding is crucial in designing effective cybersecurity
measures that can mitigate a wide range of threats.
Additionally, investigating emerging technologies and approaches. The field of cybersecurity is continuously
evolving, with new technologies and approaches being developed to enhance defenses against cyber threats.
Meaningful investigation and evaluation of emerging technologies, such as AI, ML, blockchain, and quantum-
resistant cryptography, can provide insights into their potential applications and limitations in cybersecurity.
Besides, research on cybersecurity best practices, frameworks, and guidelines can provide organizations with
evidence-based recommendations for building effective cybersecurity defenses. This includes understanding the
effectiveness of different cybersecurity measures, identifying gaps in current practices, and developing strategies
to address those gaps [14,15].
Furthermore, human factors play a crucial role in cybersecurity, and investigating the human element of
cybersecurity can provide insights into the impact of human behavior, awareness, and training on cybersecurity
defenses [16, 17]. This includes understanding the psychology of cyber attackers, studying employee behaviors
and attitudes towards cybersecurity, and developing effective cybersecurity awareness and training programs. Also,
cyber threats can have significant economic and societal impacts, including financial losses, reputational damage,
disruption of critical services, and loss of public trust. Meaningful investigation into the economic and societal
impact of cyber threats can inform policymakers, organizations, and stakeholders about the need for cybersecurity
investments and strategies.
2.3 Importance of Addressing Cybersecurity Risks in the Modern Digital Landscape
The modern digital landscape is characterized by the rapidly growing dependence on digital technologies and
interconnected networks. In this landscape, addressing cybersecurity risks has become of paramount importance
due to the following reasons:
1) Firstly, organizations store and process vast amounts of sensitive and critical data, including intellectual
property, financial information, customer data, and operational data, in digital systems. Cybersecurity
measures are essential to protect these critical assets from unauthorized access, theft, modification, or
destruction, which can result in significant financial and reputational losses [18].
2) Secondly, cyber attacks can disrupt business operations, causing financial losses and reputational damage.
Cybersecurity measures are crucial for ensuring the continuity of business operations, safeguarding the
availability, integrity, and confidentiality of data, and preventing disruptions to critical services [19].
J. Electrical Systems 20-4s (2024): 692-702
695
3) Moreover, compliance with regulations. Organizations are subject to various regulations and legal
requirements related to cybersecurity, including data protection laws, industry-specific regulations, and
contractual obligations. Failure to comply with these regulations can result in legal and financial consequences.
Addressing cybersecurity risks is necessary to ensure compliance with these regulations and mitigate legal and
financial risks. Besides, Cyber attacks can compromise the privacy of individuals and organizations by stealing
personal data, confidential information, and sensitive intellectual property. Cybersecurity measures are vital in
protecting privacy and maintaining trust among customers, partners, and stakeholders.
4) Next, national security. Cyber threats not only pose risks to individual organizations but also to the overall
national security of a country. Cyber attacks can target critical infrastructure, government agencies, defense
systems, and other essential services, posing significant risks to national security. Addressing cybersecurity
risks is crucial for safeguarding the national security interests of a country.
5) Lastly, reputation and trust. Organizations' reputation and trust among customers, partners, and stakeholders
are valuable assets that can be severely impacted by cybersecurity breaches. Reputational damage resulting
from cyber attacks can have long-lasting consequences, including loss of customers, partners, and market
share. Addressing cybersecurity risks is essential for protecting the reputation and trust of organizations in the
digital landscape.
III. LITERATURE REVIEW
3.1 Evolution of Physical Security and Cybersecurity
The field of physical security has a long history, with roots dating back to ancient times when basic physical
barriers, such as walls, gates, and guards, were used to protect valuable assets. Over the years, physical security
has evolved to incorporate various technologies, including access control systems, video surveillance, intrusion
detection systems, and security personnel, to safeguard physical assets, premises, and people. However, with the
rapid advancements in technology and the increasing reliance on digital systems, the concept of security has
expanded beyond physical boundaries to encompass cybersecurity [6,7].
Cybersecurity has emerged as a specialized field of security that focuses on protecting digital assets, such as
data, systems, networks, and devices, from cyber threats. Cyber threats include a wide range of malicious activities,
such as hacking, malware attacks, social engineering, phishing, ransomware, and insider threats, that can exploit
vulnerabilities in digital systems and cause significant harm. Cybersecurity has become an essential aspect of
modern security practices, as organizations and individuals alike face increasing risks of cyber attacks due to the
interconnected nature of digital systems and the growing sophistication of cyber threats [8].
3.2 Key Concepts and Frameworks in Cybersecurity
Several key concepts and frameworks have been developed in the field of cybersecurity to provide a systematic
approach to understanding and addressing cyber threats. Some of the key concepts and frameworks in cybersecurity
include [11]:
CIA Triad: The CIA triad stands for Confidentiality, Integrity, and Availability, which are considered the
three fundamental pillars of cybersecurity. Confidentiality involves protecting information from
unauthorized access, integrity ensures that information is accurate and trustworthy, and availability ensures
that information is accessible when needed. The CIA triad provides a comprehensive framework for
designing and implementing cybersecurity measures to protect digital assets.
Defense-in-Depth: Defense-in-Depth is a cybersecurity strategy that involves the use of multiple layers of
defense mechanisms to protect against cyber threats. This strategy recognizes that no single security
measure can provide complete protection against all types of cyber threats and emphasizes the need for a
multi-layered approach that includes technical, procedural, and human factors defenses. Defense-in-Depth
can include measures such as firewalls, intrusion detection systems, antivirus software, access controls,
encryption, employee training, and incident response plans [9].
Risk Management: Risk management is a critical concept in cybersecurity that involves identifying,
assessing, and mitigating risks to digital assets. Risk management frameworks, such as the NIST
Cybersecurity Framework, provide a structured approach to managing cybersecurity risks by focusing on
five core functions: Identify, Protect, Detect, Respond, and Recover. Risk management helps organizations
prioritize their cybersecurity efforts, allocate resources effectively, and make informed decisions to
mitigate cybersecurity risks.
J. Electrical Systems 20-4s (2024): 692-702
696
Threat Intelligence: Threat intelligence involves gathering and analyzing information about cyber threats,
including their tactics, techniques, and procedures (TTPs), to better understand and respond to them. Threat
intelligence can include data on known vulnerabilities, threat actors, malware, phishing campaigns, and
other indicators of compromise (IOCs). Threat intelligence is a crucial component of proactive
cybersecurity measures, as it helps organizations stay informed about the evolving threat landscape and
take preemptive actions to mitigate risks [10].
3.3 Challenges and Implications of the Transition from Physical Security to Cybersecurity
The transition from physical security to cybersecurity presents several challenges and implications that
organizations and stakeholders must address. Some of the key challenges and implications include [12]:
First, Technological complexity. Cybersecurity is a highly complex and rapidly evolving field that requires
specialized knowledge, skills, and expertise. Organizations need to keep up with the rapid advancements in
technology, emerging threats, and evolving regulations to effectively address cybersecurity risks. However, the
complexity of cybersecurity can be a significant challenge, as it requires continuous learning, training, and
investment in technology and expertise.
In addition, legal and regulatory challenges. The field of cybersecurity is subject to numerous legal and
regulatory requirements that vary by industry, jurisdiction, and type of data or system being protected.
Organizations must comply with various laws, regulations, and industry standards related to data privacy, data
breach notification, intellectual property protection, and cybersecurity practices. However, the legal and regulatory
landscape related to cybersecurity is complex and constantly evolving, posing challenges in understanding,
interpreting, and complying with the diverse and dynamic requirements.
Besides, resource constraints. Implementing effective cybersecurity measures can require significant resources,
including financial, technical, and human resources. Small and medium-sized enterprises (SMEs) and organizations
with limited budgets may face challenges in allocating adequate resources for cybersecurity. Additionally, the
shortage of skilled cybersecurity professionals and the increasing demand for cybersecurity expertise can further
strain the resources of organizations, particularly those with limited budgets or in regions with a scarcity of
cybersecurity talent.
3.4 Best Practices and Strategies for Mitigating Cybersecurity Risks
To effectively address the challenges and implications of the transition from physical security to cybersecurity,
organizations can adopt best practices and strategies for mitigating cybersecurity risks [13]:
Firstly, the key best practice and strategy is comprehensive risk management. Organizations should adopt a
comprehensive risk management approach that includes identifying, assessing, and mitigating cybersecurity risks.
This includes conducting regular risk assessments, prioritizing risks based on their impact and likelihood,
implementing appropriate security controls, and continuously monitoring and updating cybersecurity measures to
adapt to changing threats and technologies. Furthermore, organizations should implement a Defense-in-Depth
strategy that includes multiple layers of defense mechanisms to protect against different types of cyber threats. This
includes a combination of technical, procedural, and human factors defenses, such as firewalls, intrusion detection
systems, antivirus software, access controls, encryption, employee training, and incident response plans.
Another key is that organizations should invest in employee awareness and training programs to educate
employees about cybersecurity best practices, raise their awareness about the importance of cybersecurity, and
empower them to identify and report potential security incidents. This includes regular cybersecurity training,
phishing awareness programs, and creating a culture of cybersecurity within the organization. Besides,
organizations should have well-defined incident response and business continuity plans in place to effectively
respond to cybersecurity incidents and minimize their impact. This includes having a documented plan for
detecting, responding to, and recovering from cybersecurity incidents and regularly testing and updating the plans
to ensure their effectiveness [20, 21]. Cybersecurity issues are essential for all [22-25] to protect the system for any
domain of applicatios
Moreover, organizations should actively collaborate with other stakeholders, such as industry peers,
government agencies, and cybersecurity communities, to share information about emerging threats, vulnerabilities,
and best practices. This includes participating in information sharing forums, threat intelligence sharing initiatives,
and industry-specific cybersecurity collaborations to collectively address cybersecurity risks. The last key is
compliance with legal and regulatory requirements. Organizations should diligently comply with relevant legal and
regulatory requirements related to cybersecurity, including data privacy, data breach notification, intellectual
J. Electrical Systems 20-4s (2024): 692-702
697
property protection, and cybersecurity practices. This includes staying updated with the changing legal and
regulatory landscape, conducting regular audits to assess compliance, and addressing any gaps or deficiencies.
IV. RESEARCH METHODOLOGY
4.1 Research Design and Approach
This research paper utilized a literature review approach to investigate the evolution of physical security to
cybersecurity, key concepts and frameworks in cybersecurity, challenges and implications of the transition, as well
as best practices and strategies for mitigating cybersecurity risks. A systematic review of relevant literature from
peer reviewed journals, books, reports, and other reputable sources was conducted to gather comprehensive and
reliable information on the topic.
4.2 Data Collection and Analysis
The data for this research paper were collected through extensive review and analysis of existing literature on
the topic. Relevant articles, books, reports, and other reputable sources were identified and thoroughly reviewed to
extract key information related to the research objectives. The collected data were then analyzed using qualitative
methods, including content analysis and thematic analysis, to identify patterns, trends, and common themes in the
literature. The findings were synthesized and organized into relevant sections to develop a comprehensive literature
review.
4.3 Ethical Considerations
As this research paper relied solely on the analysis of existing literature, no human subjects were involved, and
no ethical approval was required. However, it is important to note that ethical considerations should be taken into
account when conducting research in the field of cybersecurity, including the protection of sensitive information,
privacy concerns, and adherence to relevant laws and regulations related to data privacy and intellectual property.
4.4 Limitations of the Research Methodology
There are several limitations to the research methodology adopted in this paper, including limited access to up
to date and comprehensive literature. As the field of cybersecurity is rapidly evolving, the literature available at the
time of this research may not encompass all the latest developments and trends in the field. Also, Bias in literature
selection. The literature review process may be subject to selection bias, as the articles, books, and reports included
in the analysis were selected based on the researcher's judgment and availability of resources. Other relevant
literature may have been excluded unintentionally. This research paper relied solely on the analysis of existing
literature, and no primary data were collected. Therefore, the findings are limited to the quality and scope of the
literature reviewed.
In addition, the findings of this research may not be generalizable to all organizations or industries, as
cybersecurity risks and best practices may vary depending on the context, size, and nature of the organization.
Besides, as this research paper did not involve any primary data collection, ethical considerations were limited.
However, researchers should always consider ethical implications when conducting research in the field of
cybersecurity, such as protecting sensitive information and adhering to relevant laws and regulations. Despite these
limitations, the findings of this research paper provide valuable insights into the evolution of physical security to
cybersecurity, key concepts and frameworks in cybersecurity, challenges and implications of the transition, as well
as best practices and strategies for mitigating cybersecurity risks. Future research can build upon these findings by
conducting empirical studies and primary data collection to further validate and extend the findings of this literature
review.
V. FINDINGS AND ANALYSIS
5.1 Impact of the Transition from Physical Security to Cybersecurity on Digital Assets and Information
The transition from physical security to cybersecurity has had a significant impact on digital assets and
information. In the digital age, organizations and individuals store and process vast amounts of data, including
sensitive and valuable information, which are vulnerable to cyber threats. Cybersecurity breaches can result in
unauthorized access, data theft, financial loss, reputational damage, and legal implications. The impact of
cybersecurity breaches can be severe and far-reaching, with potential consequences for businesses, governments,
and individuals.
J. Electrical Systems 20-4s (2024): 692-702
698
5.2 Challenges and Implications of the Transition for Individuals, Organizations, and Governments
The transition from physical security to cybersecurity presents various challenges and implications for
individuals, organizations, and governments. Some of the key challenges and implications include:
a) Increased complexity of threats: Cybersecurity threats are constantly evolving and becoming more
sophisticated, making it challenging for individuals, organizations, and governments to keep up with the latest
threats and vulnerabilities.
b) Skills gap: There is a shortage of skilled cybersecurity professionals who can effectively manage and mitigate
cybersecurity risks. This skills gap poses a challenge for organizations and governments in building a robust
cybersecurity workforce.
c) Rapid technological advancements: The rapid pace of technological advancements, such as the Internet of
Things (IoT), cloud computing, and artificial intelligence (AI), presents new opportunities and challenges for
cybersecurity. Organizations and governments need to adapt to these changes and implement appropriate
security measures.
d) Regulatory compliance: Compliance with cybersecurity regulations and standards is crucial, but it can be
complex and challenging for organizations and governments to navigate the landscape of ever-changing
regulations and standards.
e) Human factor: Human errors, such as weak passwords, phishing attacks, and insider threats, remain a
significant challenge in cybersecurity. Raising awareness and educating individuals about cybersecurity best
practices is crucial in mitigating this challenge.
f) Resource constraints: Organizations and governments may face resource constraints in terms of budget,
technology, and expertise, which can impact their ability to implement robust cybersecurity measures.
5.3 Best Practices and Strategies for Mitigating Cybersecurity Risks in the Modern Digital Landscape
To address the challenges and implications of the transition from physical security to cybersecurity,
organizations and governments can implement best practices and strategies to mitigate cybersecurity risks. For
example, risk assessment and management. Organizations and governments should conduct regular risk
assessments to identify and prioritize cybersecurity risks. Risk management strategies, such as implementing risk
mitigation measures, risk transfer mechanisms, and contingency plans, should be developed and implemented
accordingly. Besides, organizations and governments should establish and enforce robust cybersecurity policies
and procedures that encompass all aspects of cybersecurity, including access controls, data encryption, patch
management, incident response, and employee awareness and training.
Additionally, a defense-in-depth approach involves implementing multiple layers of security controls, such as
firewalls, intrusion detection systems, antivirus software, and security awareness training, to protect against various
types of cybersecurity threats. Also, regular monitoring and auditing. Organizations and governments should
implement regular monitoring and auditing of their cybersecurity measures to detect and respond to potential
vulnerabilities and incidents in a timely manner.
Furthermore, educating employees about cybersecurity best practices, such as password hygiene, social
engineering awareness, and safe browsing habits, is crucial in mitigating human-related cybersecurity risks.
Collaboration and information sharing among organizations, governments, and other stakeholders can also help in
identifying and addressing cybersecurity threats collectively, leveraging expertise, and sharing best practices and
lessons learned.
Moreover, organizations and governments should comply with relevant cybersecurity regulations and standards
to ensure that appropriate security measures are in place. Also, keeping all software, systems, and devices up-to-
date with the latest security patches and updates is essential in mitigating known vulnerabilities and reducing the
risk of cyber attacks. Organizations and governments should have well-defined incident response plans in place to
effectively respond to and manage cybersecurity incidents when they occur. This includes having a designated
incident response team, defining roles and responsibilities, and establishing communication protocols. Encryption
and data protection is another best key and strategy. Implementing encryption measures, such as using encrypted
communication channels and encrypting sensitive data, can provide an additional layer of protection for digital
assets and information.
Backup and disaster recovery is also quite important. Regularly backing up critical data and having a robust
disaster recovery plan in place can help organizations and governments quickly restore operations in the event of
a cybersecurity incident or data breach, as well as, Continuous monitoring and improvement. Cybersecurity is an
ongoing process, and organizations and governments should continuously monitor their cybersecurity measures,
J. Electrical Systems 20-4s (2024): 692-702
699
evaluate their effectiveness, and make improvements as needed to address emerging threats and vulnerabilities.
Lastly, organizations and governments should prioritize cybersecurity awareness and training programs to educate
employees, users, and stakeholders about the importance of cybersecurity, best practices, and potential threats.
And, organizations should implement cybersecurity measures in their vendor and supply chain management
processes to ensure that third-party vendors and partners also adhere to robust cybersecurity practices.
5.4 Analysis of Best Practices and Strategies
The analysis of best practices and strategies for mitigating cybersecurity risks in the modern digital landscape
highlights the importance of a multi-faceted approach that encompasses technical, procedural, and human factors.
Robust cybersecurity policies and procedures, defense-in-depth approach, regular monitoring and auditing,
employee awareness and training, compliance with regulations and standards, and incident response planning are
some of the key strategies that can help organizations and governments effectively mitigate cybersecurity risks.
Collaboration, information sharing, encryption, backup and disaster recovery, continuous monitoring and
improvement, and vendor and supply chain management are also important factors to consider in a comprehensive
cybersecurity strategy.
However, it is important to note that there is no one-size-fits-all solution for cybersecurity, as the threat
landscape is constantly evolving, and cybersecurity measures need to be tailored to the specific needs and
requirements of each organization or government. Regular evaluation and improvement of cybersecurity measures
based on the changing threat landscape and technological advancements are crucial for maintaining robust
cybersecurity posture.
VI. DISCUSSION
In this section, we will discuss the findings and analysis presented in the previous sections and compare them
with the existing literature on the topic of transitioning from physical security to cybersecurity. We will also explore
the implications of the research findings for the field of cybersecurity and provide recommendations for future
research.
6.1 Comparison of Findings with Existing Literature
The findings of this research paper align with existing literature on the growing threat of cybersecurity breaches,
the challenges and implications of the transition from physical security to cybersecurity, and the best practices and
strategies for mitigating cybersecurity risks. The literature has consistently highlighted the increasing complexity
of cyber threats, the skills gap in the cybersecurity workforce, the rapid technological advancements contributing
to vulnerabilities, the importance of robust cybersecurity policies and procedures, the need for employee awareness
and training, compliance with regulations and standards, and the significance of incident response planning,
encryption, backup and disaster recovery, and continuous monitoring and improvement.
The research findings also support the existing literature on the limitations of physical security in the digital
age. As organizations and governments increasingly rely on digital technologies and interconnected systems,
physical security measures alone are insufficient to protect against cyber threats. The findings emphasize the need
for a holistic and multi-faceted approach to cybersecurity that encompasses technical, procedural, and human
factors.
6.2 Implications of the Research Findings for the Field of Cybersecurity
The research findings have several implications for the field of cybersecurity. First, the findings highlight the
urgent need for organizations and governments to prioritize cybersecurity and invest in robust cybersecurity
measures to safeguard their digital assets and information. The increasing threat of cybersecurity breaches requires
a proactive and comprehensive approach to cybersecurity that considers the evolving threat landscape,
technological advancements, and human factors. Also, the findings underscore the importance of cybersecurity
awareness and training programs for employees, users, and stakeholders. Human factors, such as phishing attacks,
social engineering, and insider threats, remain significant vulnerabilities in cybersecurity. Organizations and
governments should prioritize cybersecurity education and training to enhance the cybersecurity awareness and
skills of their workforce. Moreover, the findings emphasize the need for regular monitoring, auditing, and
improvement of cybersecurity measures. Cyber threats are constantly evolving, and organizations and governments
need to continuously assess and update their cybersecurity measures to address emerging threats and
vulnerabilities.
J. Electrical Systems 20-4s (2024): 692-702
700
In addition, the findings highlight the importance of compliance with regulations and standards in the field of
cybersecurity. Compliance with relevant cybersecurity regulations and standards can help organizations and
governments establish a baseline for cybersecurity best practices and ensure a consistent and standardized approach
to cybersecurity, as well as, the findings highlight the importance of collaboration, information sharing, and vendor
and supply chain management in cybersecurity. Cyber threats are often interconnected, and collaboration among
organizations, governments, and stakeholders can help in sharing threat intelligence and best practices, and
mitigating cybersecurity risks collectively.
6.3 Recommendations for Future Research
Based on the findings of this research paper, several recommendations for future research in the field of
cybersecurity can be made:
a) Further research on the evolving threat landscape: Cyber threats are constantly evolving, and research should
continue to investigate emerging threats, trends, and techniques used by cyber attackers. This can help
organizations and governments stay updated with the latest threats and develop effective countermeasures.
b) Research on cybersecurity workforce development: The skills gap in the cybersecurity workforce is a
significant challenge, and research can focus on strategies for addressing this gap, such as training and
education programs, professional certifications, and talent recruitment and retention strategies.
c) Investigation of human factors in cybersecurity: Human factors, such as employee awareness, behavior, and
insider threats, remain a significant vulnerability in cybersecurity. Further research can explore effective
strategies for enhancing cybersecurity awareness, education, and skills among employees and users.
d) Research on cybersecurity regulations and standards: Compliance with regulations and standards is crucial in
the field of cybersecurity. Further research can focus on evaluating the effectiveness of existing regulations
and standards, identifying gaps, and proposing recommendations for improving compliance and ensuring a
consistent and standardized approach to cybersecurity.
e) Research on emerging technologies and their implications for cybersecurity: Rapid technological
advancements, such as Internet of Things (IoT), Artificial Intelligence (AI), and Blockchain, have significant
implications for cybersecurity. Further research can investigate the vulnerabilities, risks, and best practices
associated with these emerging technologies to ensure that cybersecurity measures keep pace with
technological advancements.
f) Research on incident response and recovery strategies: Incident response planning, backup and disaster
recovery, and continuous monitoring and improvement are critical components of effective cybersecurity.
Further research can focus on evaluating incident response and recovery strategies, identifying best practices,
and developing frameworks for effective incident management in the modern digital landscape.
g) Research on supply chain security: Supply chain security has gained increased attention in recent years, as
cyber attackers often target vulnerabilities in the supply chain to gain unauthorized access to systems and data.
Further research can investigate supply chain security best practices, risk assessment methods, and vendor
management strategies to enhance the resilience of supply chains against cyber threats.
h) Research on cybersecurity governance and risk management: Cybersecurity governance and risk management
play a crucial role in ensuring a proactive and comprehensive approach to cybersecurity. Further research can
investigate effective governance frameworks, risk assessment methodologies, and risk mitigation strategies for
organizations and governments to manage cybersecurity risks effectively.
Concluding Remarks
The transition from physical security to cybersecurity is a critical and ongoing process in the modern digital
landscape. The research findings highlight the growing threat of cybersecurity breaches, the limitations of physical
security, and the need for meaningful understanding and investigation in the field of cybersecurity. Best practices
and strategies for mitigating cybersecurity risks have been discussed, emphasizing the importance of a proactive
and comprehensive approach to cybersecurity. The findings contribute to the field of cybersecurity and provide
directions for future research and practical applications to enhance cybersecurity measures.
In conclusion, The transition from physical security to cybersecurity has become imperative in the modern
digital landscape due to the growing threat of cyber breaches. This research paper has highlighted the challenges
and implications of this transition, including the increased complexity of threats, skills gap, rapid technological
advancements, regulatory compliance, human factor, and resource constraints. The paper has also discussed best
practices and strategies for mitigating cybersecurity risks, such as risk assessment and management, robust
cybersecurity policies and procedures, defense-in-depth approach, regular monitoring and auditing, employee
J. Electrical Systems 20-4s (2024): 692-702
701
awareness and training, compliance with regulations and standards, incident response planning, encryption and
data protection, backup and disaster recovery, continuous monitoring and improvement, and vendor and supply
chain management. Overall, addressing cybersecurity risks is crucial for individuals, organizations, and
governments in the modern digital landscape. By implementing best practices and strategies, organizations and
governments can strengthen their cybersecurity posture and safeguard their digital assets and information from
potential cyber threats. Further research and investigation in the field of cybersecurity are essential to stay abreast
of the evolving threat landscape and develop effective strategies to mitigate cyber risks in the digital age
VII. CONCLUSION
This research paper has explored the transition from physical security to cybersecurity, highlighting the
evolving landscape of cybersecurity threats, the limitations of physical security in the digital age, and the need for
meaningful understanding and investigation in the field of cybersecurity. The literature review has discussed the
evolution of physical security and cybersecurity, key concepts and frameworks in cybersecurity, challenges and
implications of the transition, and best practices and strategies for mitigating cybersecurity risks. The research
findings have identified the significant impact of the transition on digital assets and information, challenges and
implications for individuals, organizations, and governments, and best practices for mitigating cybersecurity risks
in the modern digital landscape. This research contributes to the field of cybersecurity by providing insights into
the challenges and implications of transitioning from physical security to cybersecurity in the modern digital
landscape. It highlights the limitations of traditional physical security measures in the digital age and emphasizes
the need for organizations and governments to prioritize cybersecurity in their overall security strategies. The
research findings underscore the importance of a proactive and comprehensive approach to cybersecurity, including
risk assessment, incident response planning, supply chain security, governance, and risk management. The findings
can serve as a foundation for further research and practical applications in enhancing cybersecurity measures to
safeguard digital assets and information.
Limitations of the Study
This research paper has some limitations that should be acknowledged. Firstly, the research findings are based
on existing literature and secondary data, and may not capture the entire spectrum of cybersecurity challenges and
implications. Primary data collection through surveys, interviews, or case studies could provide more in-depth
insights. Secondly, the rapidly evolving nature of cybersecurity threats and technologies may render some of the
findings less relevant over time. Further research and updates are necessary to keep up with the dynamic nature of
cybersecurity. Lastly, the research may have inherent biases and limitations inherent in literature reviews and desk-
based research.
REFERENCES
[1] Security applications: Lessons of real-world deployment. ACM SIGecom Exchanges, 8(2), 1-4.
[2] Self, W. H., Tenforde, M. W., Rhoads, J. P., Gaglani, M., Ginde, A. A., Douin, D. J., ... & Cass, C. (2021). Comparative
effectiveness of Moderna, Pfizer-BioNTech, and Janssen (Johnson & Johnson) vaccines in preventing COVID-19
hospitalizations among adults without immunocompromising conditionsUnited States, MarchAugust 2021. Morbidity and
Mortality Weekly Report, 70(38), 1337.C.
[3] Ventures, C. (2019). 2019 official annual cybercrime report. In Recuperado el.
[4] Pandey, S. K., Kumar, V., Sinha, D., & Das, A. K. (2021). GAN-Based Data Generation Approach for IDS: Evaluation on
Decision Tree. Advanced Computing and Systems for Security: Volume 14, 43-57.
[5] Shrestha, R., Ban, S., Devkota, S., Sharma, S., Joshi, R., Tiwari, A. P., ... & Joshi, M. K. (2021). Technological trends in heavy
metals removal from industrial wastewater: A review. Journal of Environmental Chemical Engineering, 9(4), 105688.
[6] Delle Fave, F. M., Brown, M., Zhang, C., Shieh, E., Jiang, A. X., Rosoff, H., ... & Sullivan, J. (2014, May). Security games in
the field: an initial study on a transit system. In Proceedings of the 2014 international conference on Autonomous agents and
multi-agent systems (pp. 1363-1364).
[7] Delle Fave, F. M., Jiang, A. X., Yin, Z., Zhang, C., Tambe, M., Kraus, S., & Sullivan, J. P. Game-theoretic Security Patrolling
with Dynamic Execution Uncertainty and a Case Study on a Real Transit System1.
[8] Sinha, A., Nguyen, T. H., Kar, D., Brown, M., Tambe, M., & Jiang, A. X. (2015). From physical security to cybersecurity.
Journal of Cybersecurity, 1(1), 19-35.
[9] Kar, D., Fang, F., Delle Fave, F., Sintov, N., & Tambe, M. (2015, May). " A Game of Thrones" When Human Behavior Models
Compete in Repeated Stackelberg Security Games. In Proceedings of the 2015 International Conference on Autonomous
Agents and Multiagent Systems (pp. 1381-1390).
[10] Mignan, A. (2022). Categorizing and Harmonizing Natural, Technological, and Socio-Economic Perils Following the
Catastrophe Modeling Paradigm. International Journal of Environmental Research and Public Health, 19(19), 12780.
J. Electrical Systems 20-4s (2024): 692-702
702
[11] Dehghani, A., Fendeková, E., & Marković, P. (2021). BASIS OF THE DIGITAL KPI TOOLBOX FOR OSH
MANAGEMENT. In 17 th Annual International Bata Conference for Ph. D. Students and Young Researchers (p. 149).
[12] Walker, R., Massey, R., Steele, A., Welmans, T., Robinson, M., Mourtil, E., ... & Schulhof, K. (2021). The unique and complex
considerations of digital asset custody. Journal of Securities Operations & Custody, 13(2), 150-162.
[13] Muzafar, S., Humayun, M., & Hussain, S. J. (2022). Emerging Cybersecurity Threats in the Eye of E-Governance in the Current
Era. In Cybersecurity Measures for E-Government Frameworks (pp. 43-60). IGI Global.
[14] Humayun, M., Jhanjhi, N. Z., Alruwaili, M., Amalathas, S. S., Balasubramanian, V., & Selvaraj, B. (2020). Privacy protection
and energy optimization for 5G-aided industrial Internet of Things. IEEE Access, 8, 183665-183677.
[15] Zaman, N., Low, T. J., & Alghamdi, T. (2014, February). Energy efficient routing protocol for wireless sensor network. In 16th
international conference on advanced communication technology (pp. 808-814). IEEE.
[16] Shafiq, D. A., Jhanjhi, N. Z., & Abdullah, A. (2022). Load balancing techniques in cloud computing environment: A review.
Journal of King Saud University-Computer and Information Sciences, 34(7), 3910-3933.
[17] Adeyemo, V. E., Abdullah, A., JhanJhi, N. Z., Supramaniam, M., & Balogun, A. O. (2019). Ensemble and deep-learning
methods for two-class and multi-attack anomaly intrusion detection: an empirical study. International Journal of Advanced
Computer Science and Applications, 10(9).
[18] Jhanjhi, N. Z., Brohi, S. N., Malik, N. A., & Humayun, M. (2020, October). Proposing a hybrid rpl protocol for rank and
wormhole attack mitigation using machine learning. In 2020 2nd International Conference on Computer and Information
Sciences (ICCIS) (pp. 1-6). IEEE.
[19] Lim, M., Abdullah, A., Jhanjhi, N. Z., Khan, M. K., & Supramaniam, M. (2019). Link prediction in time-evolving criminal
network with deep reinforcement learning technique. IEEE Access, 7, 184797-184807
[20] Aldughayfiq, B., Ashfaq, F., Jhanjhi, N. Z., & Humayun, M. (2023, April). Yolo-based deep learning model for pressure ulcer
detection and classification. In Healthcare (Vol. 11, No. 9, p. 1222). MDPI.
[21] Aldughayfiq, B., Ashfaq, F., Jhanjhi, N. Z., & Humayun, M. (2023). Explainable AI for Retinoblastoma Diagnosis: Interpreting
Deep Learning Models with LIME and SHAP. Diagnostics, 13(11), 1932.
[22] Fatima-tuz-Zahra, N. Jhanjhi, S. N. Brohi and N. A. Malik, "Proposing a Rank and Wormhole Attack Detection Framework
using Machine Learning," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and
Statistics (MACS), Karachi, Pakistan, 2019, pp. 1-9, doi: 10.1109/MACS48846.2019.9024821.
[23] Lim M, Abdullah A, Jhanjhi N, Supramaniam M. Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement
Learning Technique. Computers. 2019; 8(1):8. https://doi.org/10.3390/computers8010008
[24] B. Hamid, N. Jhanjhi, M. Humayun, A. Khan and A. Alsayat, "Cyber Security Issues and Challenges for Smart Cities: A
survey," 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS),
Karachi, Pakistan, 2019, pp. 1-7, doi: 10.1109/MACS48846.2019.9024768.
[25] Gouda W, Sama NU, Al-Waakid G, Humayun M, Jhanjhi NZ. Detection of Skin Cancer Based on Skin Lesion Images Using
Deep Learning. Healthcare. 2022; 10(7):1183. https://doi.org/10.3390/healthcare10071183.
... On the other hand, cybersecurity refers to the protection of digital assets, including data, networks, systems, devices, and applications, from cyber threats, such as hackers, malware, ransomware, and social engineering attacks. [12] There are four functions and fifteen controls in this domain, first function is Identify which consists of one control that is site security plan (site plan), refers to the procedures in place to record a Site Security Plan (Site Plan), which serves as a summary of the security measures put in place to safeguard technological assets from physical access, as well as relevant risks and threats. Second function is Detect which consists of four controls, first is searches, refers to prevent unauthorized exfiltration of data and technology assets, physical access control mechanisms are in place to inspect personnel and their personal effects. ...
Article
Full-text available
Retinoblastoma is a rare and aggressive form of childhood eye cancer that requires prompt diagnosis and treatment to prevent vision loss and even death. Deep learning models have shown promising results in detecting retinoblastoma from fundus images, but their decision-making process is often considered a “black box” that lacks transparency and interpretability. In this project, we explore the use of LIME and SHAP, two popular explainable AI techniques, to generate local and global explanations for a deep learning model based on InceptionV3 architecture trained on retinoblastoma and non-retinoblastoma fundus images. We collected and labeled a dataset of 400 retinoblastoma and 400 non-retinoblastoma images, split it into training, validation, and test sets, and trained the model using transfer learning from the pre-trained InceptionV3 model. We then applied LIME and SHAP to generate explanations for the model’s predictions on the validation and test sets. Our results demonstrate that LIME and SHAP can effectively identify the regions and features in the input images that contribute the most to the model’s predictions, providing valuable insights into the decision-making process of the deep learning model. In addition, the use of InceptionV3 architecture with spatial attention mechanism achieved high accuracy of 97% on the test set, indicating the potential of combining deep learning and explainable AI for improving retinoblastoma diagnosis and treatment.
Article
Full-text available
Pressure ulcers are significant healthcare concerns affecting millions of people worldwide, particularly those with limited mobility. Early detection and classification of pressure ulcers are crucial in preventing their progression and reducing associated morbidity and mortality. In this work, we present a novel approach that uses YOLOv5, an advanced and robust object detection model, to detect and classify pressure ulcers into four stages and non-pressure ulcers. We also utilize data augmentation techniques to expand our dataset and strengthen the resilience of our model. Our approach shows promising results, achieving an overall mean average precision of 76.9% and class-specific mAP50 values ranging from 66% to 99.5%. Compared to previous studies that primarily utilize CNN-based algorithms, our approach provides a more efficient and accurate solution for the detection and classification of pressure ulcers. The successful implementation of our approach has the potential to improve the early detection and treatment of pressure ulcers, resulting in better patient outcomes and reduced healthcare costs.
Article
Full-text available
The literature on probabilistic hazard and risk assessment shows a rich and wide variety of modeling strategies tailored to specific perils. On one hand, catastrophe (CAT) modeling, a recent professional and scientific discipline, provides a general structure for the quantification of natural (e.g., geological, hydrological, meteorological) and man-made (e.g., terrorist, cyber) catastrophes. On the other hand, peril characteristics and related processes have yet to be categorized and harmonized to enable adequate comparison, limit silo effects, and simplify the implementation of emerging risks. We reviewed the literature for more than 20 perils from the natural, technological, and socio-economic systems to categorize them by following the CAT modeling hazard pipeline: (1) event source → (2) size distribution → (3) intensity footprint. We defined the following categorizations, which are applicable to any type of peril, specifically: (1) point/line/area/track/diffuse source, (2) discrete event/continuous flow, and (3) spatial diffusion (static)/threshold (passive)/sustained propagation (dynamic). We then harmonized the various hazard processes using energy as the common metric, noting that the hazard pipeline’s underlying physical process consists of some energy being transferred from an energy stock (the source), via an event, to the environment (the footprint).
Article
Full-text available
Cloud Computing is a robust model that allows users and organizations to purchase required services per their needs. The model offers many services such as storage, platforms for deployment, convenient access to web services, and so on. Load Balancing is a common issue in the cloud that makes it hard to maintain the performance of the applications adjacent to the Quality of Service (QoS) measurement and following the Service Level Agreement (SLA) document as required from the cloud providers to enterprises. Cloud providers struggle to distribute equal workload among the servers. An efficient LB technique should optimize and ensure high user satisfaction by utilizing the resources of VMs efficiently. This paper presents a comprehensive review of various Load Balancing techniques in a static, dynamic, and nature-inspired cloud environment to address the Data Center Response Time and overall performance. An analytical review of the algorithms is provided, and a research gap is concluded for the future research perspective in this domain. This research also provides a graphical representation of reviewed algorithms to highlight the operational flow. Additionally, this review presents a fault-tolerant framework and explores the other existing frameworks in the recent literature.
Article
Full-text available
The 5G is expected to revolutionize every sector of life by providing interconnectivity of everything everywhere at high speed. However, massively interconnected devices and fast data transmission will bring the challenge of privacy as well as energy deficiency. In today's fast-paced economy, almost every sector of the economy is dependent on energy resources. On the other hand, the energy sector is mainly dependent on fossil fuels and is constituting about 80% of energy globally. This massive extraction and combustion of fossil fuels lead to a lot of adverse impacts on health, environment, and economy. The newly emerging 5G technology has changed the existing phenomenon of life by connecting everything everywhere using IoT devices. 5G enabled IIoT devices has transformed everything from traditional to smart, e.g. smart city, smart healthcare, smart industry, smart manufacturing etc. However, massive I/O technologies for providing D2D connection has also created the issue of privacy that need to be addressed. Privacy is the fundamental right of every individual. 5G industries and organizations need to preserve it for their stability and competency. Therefore, privacy at all three levels (data, identity and location) need to be maintained. Further, energy optimization is a big challenge that needs to be addressed for leveraging the potential benefits of 5G and 5G aided IIoT. Billions of IIoT devices that are expected to communicate using the 5G network will consume a considerable amount of energy while energy resources are limited. Therefore, energy optimization is a future challenge faced by 5G industries that need to be addressed. To fill these gaps, we have provided a comprehensive framework that will help energy researchers and practitioners in better understanding of 5G aided industry 4.0 infrastructure and energy resource optimization by improving privacy. The proposed framework is evaluated using case studies and mathematical modelling.
Article
Digital assets as an asset class has matured with increasing rates of adoption among retail and institutional investors. As custodians engage, they are facing unique complexities across many regulatory bodies, new varieties of audit and controls considerations and evolving risk frameworks. There are also opportunities for custodians to add new services, such as lending, staking and trading. Per Deloitte’s 2020 Blockchain Survey, 94 per cent of banking and capital markets executives said that they believe that digital assets will be at least somewhat important in the next three years. This paper explores various considerations for custodians of digital assets as explained from the various leaders within Deloitte’s digital asset practice.
Chapter
The growing technologies in the world include machine learning (ML), the internet of things (IoT), and artificial intelligence (AI). Cybersecurity is the application of technologies that play a significant part in making secure data and reducing the risk among the users, such as computer programs, networks, data, and devices from the different cyber-attacks. In the current era of communication and information technologies, it is not possible to think of a good government without e-government. The main objective of this chapter is to look at the last 10 years of associated research articles, book chapters, and published reports on cybersecurity threats and attacks focused and founded on the e-government applications and emerging technologies for the measurement of cybersecurity. The results of this research have been used on machine learning techniques for taking authentic and scientific results. In the light of the studies, a new door will open for researchers and professionals.
Article
Rapid industrialization, with economic prosperity set as the prime goal, has always created some secondary intolerable problems such as heavy metal contamination, wastewater that need remediation. Industrial wastewater is the major contributors to contamination of aquatic and terrestrial ecosystems with toxic heavy metals like arsenic, copper, chromium, cadmium, nickel, zinc, lead, and mercury whose hazardous bio-accumulative nature in biotic systems is attributed to their high solubility in the aquatic environments. There has, therefore, always been a need for the removal and/or recovery of these toxic, non-biodegradable, and persistent heavy metals from the industrial wastewater. For several decades, extensive investigations have been performed for easy, efficient, and economic removal of heavy metals with a varying degree of success. Chemical precipitation, adsorption, ion floatation, ion-exchange, coagulation/flocculation and electrochemical methods have been the most readily available conventional methods for the removal of these heavy metals. These methods however have posed some serious shortcomings such as high sludge production needing further treatment, low removal efficiency and high energy requirements. In the present years, newer more efficient, more economic and innovative technologies are being investigated. Recently photocatalysis, electrodialysis, hydrogels, membrane separation technique and introducing newer adsorbents have been developed for better adsorption. Hence in this paper, we have reviewed efforts and technological advances achieved so far in the pursuit of more efficient removal and recovery of heavy metals from industrial wastewaters and have evaluated their efficiency dependence on various parameters such as pH, temperature & initial dosing.