ANALYSIS OF MODERN CYBER ATTACKS AND METHODS FOR THEIR PREVENTION
Keywords:
Keyword:Cybersecurity, Cyberattacks, Zero Trust Architecture (ZTA), Artificial Intelligence (AI), Machine Learning, Cyber Kill Chain (CKC), MITRE ATT&CK Framework, Threat Detection, Anomaly Detection, Behavior Analytics, Real-time Monitoring, Identity Provider (IdP), Policy Engine (PE), Policy Enforcement Point (PEP), Threat Intelligence Platform.Abstract
Abstract:This study provides a comprehensive analysis of the evolution of modern cyberattacks, their technical and organizational characteristics, and advanced architectures for combating them. Within the scope of the study, the Zero Trust Security Architecture, Artificial Intelligence (AI)-based threat detection systems, the Cyber Kill Chain model, and the MITRE ATT&CK framework are comparatively analyzed, and their effectiveness and areas of application are evaluated. This information includes an abstract definition of Zero Trust Architecture (ZTA) and presents general deployment models and use cases in which the Zero Trust approach can improve an organization’s overall information technology security posture.
Downloads
Published
2026-04-15
Issue
Section
Articles