Understanding Cyber Threats Through Human Behavior, Artificial Intelligence, and Cloud Security


Authors : Prajakta Vilas Thakar

Volume/Issue : Volume 11 - 2026, Issue 2 - February


Google Scholar : https://tinyurl.com/22svtazj

Scribd : https://tinyurl.com/5ctdjb6r

DOI : https://doi.org/10.38124/ijisrt/26feb739

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Staying safe online isn’t just a good idea these days—it’s essential. We live our lives on the internet, using smart devices and cloud services for just about everything. Sure, that makes things faster and easier, but it also brings big risks. Hacking, stolen data, and scams are everywhere. This study digs into how cyber protection has evolved and why it’s so important for both businesses and personal privacy. Surprisingly, the biggest factor isn’t the tech itself—it’s us. People keep making the same mistakes. Even with all the warnings, folks still reuse passwords or skip two-factor authentication. We want to believe technology can save us, but honestly, our habits need to change first. Behind the curtain, artificial intelligence spots threats quicker than ever. These systems are powerful, especially when companies lock down their cloud setups. But old security rules just can’t keep up with new threats. That’s why “zero trust” security isn’t just a buzzword anymore—it’s a real approach, where nobody gets a free pass and every login is questioned.

Keywords : Cyber Threats, Data Protection, Artificial Intelligence, Network Security, Digital Forensics, Privacy, Zero Trust

References :

  1. Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
  2. Cisco. (2023). Annual Cybersecurity Report. Cisco Systems.
  3. ENISA. (2024). Threat Landscape Report. European Union Agency for Cybersecurity.
  4. ISC2. (2024). Global Cybersecurity Workforce Study.
  5. NIST. (2021). Cybersecurity Framework. U.S. Department of Commerce.
  6. Schneier, B. (2018). Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. Norton.
  7. Stallings, W. (2019). Cryptography and Network Security: Principles and Practice. Pearson.
  8. Symantec. (2022). Internet Security Threat Report. Retrieved from www.symantec.com.
  9. Xu, Y., & Li, T. (2021). Artificial Intelligence in Cybersecurity. IEEE Access, 9, 45132–45147.

Staying safe online isn’t just a good idea these days—it’s essential. We live our lives on the internet, using smart devices and cloud services for just about everything. Sure, that makes things faster and easier, but it also brings big risks. Hacking, stolen data, and scams are everywhere. This study digs into how cyber protection has evolved and why it’s so important for both businesses and personal privacy. Surprisingly, the biggest factor isn’t the tech itself—it’s us. People keep making the same mistakes. Even with all the warnings, folks still reuse passwords or skip two-factor authentication. We want to believe technology can save us, but honestly, our habits need to change first. Behind the curtain, artificial intelligence spots threats quicker than ever. These systems are powerful, especially when companies lock down their cloud setups. But old security rules just can’t keep up with new threats. That’s why “zero trust” security isn’t just a buzzword anymore—it’s a real approach, where nobody gets a free pass and every login is questioned.

Keywords : Cyber Threats, Data Protection, Artificial Intelligence, Network Security, Digital Forensics, Privacy, Zero Trust

Paper Submission Last Date
31 - March - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe