Authors :
Prajakta Vilas Thakar
Volume/Issue :
Volume 11 - 2026, Issue 2 - February
Google Scholar :
https://tinyurl.com/22svtazj
Scribd :
https://tinyurl.com/5ctdjb6r
DOI :
https://doi.org/10.38124/ijisrt/26feb739
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Staying safe online isn’t just a good idea these days—it’s essential. We live our lives on the internet, using smart
devices and cloud services for just about everything. Sure, that makes things faster and easier, but it also brings big risks.
Hacking, stolen data, and scams are everywhere.
This study digs into how cyber protection has evolved and why it’s so important for both businesses and personal
privacy. Surprisingly, the biggest factor isn’t the tech itself—it’s us. People keep making the same mistakes. Even with all
the warnings, folks still reuse passwords or skip two-factor authentication. We want to believe technology can save us, but
honestly, our habits need to change first.
Behind the curtain, artificial intelligence spots threats quicker than ever. These systems are powerful, especially when
companies lock down their cloud setups. But old security rules just can’t keep up with new threats. That’s why “zero trust”
security isn’t just a buzzword anymore—it’s a real approach, where nobody gets a free pass and every login is questioned.
Keywords :
Cyber Threats, Data Protection, Artificial Intelligence, Network Security, Digital Forensics, Privacy, Zero Trust
References :
- Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
- Cisco. (2023). Annual Cybersecurity Report. Cisco Systems.
- ENISA. (2024). Threat Landscape Report. European Union Agency for Cybersecurity.
- ISC2. (2024). Global Cybersecurity Workforce Study.
- NIST. (2021). Cybersecurity Framework. U.S. Department of Commerce.
- Schneier, B. (2018). Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. Norton.
- Stallings, W. (2019). Cryptography and Network Security: Principles and Practice. Pearson.
- Symantec. (2022). Internet Security Threat Report. Retrieved from www.symantec.com.
- Xu, Y., & Li, T. (2021). Artificial Intelligence in Cybersecurity. IEEE Access, 9, 45132–45147.
Staying safe online isn’t just a good idea these days—it’s essential. We live our lives on the internet, using smart
devices and cloud services for just about everything. Sure, that makes things faster and easier, but it also brings big risks.
Hacking, stolen data, and scams are everywhere.
This study digs into how cyber protection has evolved and why it’s so important for both businesses and personal
privacy. Surprisingly, the biggest factor isn’t the tech itself—it’s us. People keep making the same mistakes. Even with all
the warnings, folks still reuse passwords or skip two-factor authentication. We want to believe technology can save us, but
honestly, our habits need to change first.
Behind the curtain, artificial intelligence spots threats quicker than ever. These systems are powerful, especially when
companies lock down their cloud setups. But old security rules just can’t keep up with new threats. That’s why “zero trust”
security isn’t just a buzzword anymore—it’s a real approach, where nobody gets a free pass and every login is questioned.
Keywords :
Cyber Threats, Data Protection, Artificial Intelligence, Network Security, Digital Forensics, Privacy, Zero Trust