THE EVOLUTION OF CYBER SECURITY: CHALLENGES AND SOLUTIONS IN THE 21ST CENTURY
DOI:
https://doi.org/10.63330/aurumpub.005-017Keywords:
Cyber Security, Digital Crimes, Data Protection, Information TechnologyAbstract
The central theme of this term paper is the evolution of cybersecurity in the 21st century, with an emphasis on the main challenges faced by individuals, organizations and governments, as well as the solutions developed to mitigate risks in the digital environment. Considering the exponential advance of technology, the growing dependence on information systems and the sophistication of cybercrime, it is essential to understand how cybersecurity has become a strategic agenda on a global scale. The general objective of the research was to critically analyze the evolution of cybersecurity, identifying the main contemporary threats, such as ransomware attacks, system invasions, vulnerabilities in Internet of Things (IoT) devices and the fragility of legislation in the face of new forms of digital crime. To this end, a qualitative, exploratory methodology was adopted, based on a bibliographic and documentary review. We consulted academic works, technical reports, political speeches and specialized studies by renowned authors and institutions in the field, such as Doneda (2019), Bauman (2017), Castells (2003), Anderson and Moore (2020), as well as organizations such as the OECD, IBM, the World Economic Forum and the International Institute for Strategic Studies. The research is structured in three main chapters. The first provides a historical and conceptual overview of cybersecurity, from its beginnings to its consolidation as a priority in digital governance. The second chapter discusses the technical, organizational, legal and social challenges of cybersecurity in the current context, highlighting the decentralization of work, the regulatory gap and the lack of a security culture in corporate environments. Implemented solutions are also analyzed, such as the Zero Trust model, advanced cryptography, the use of artificial intelligence to detect threats and the importance of international cooperation. The third chapter summarizes the main findings, highlighting the complexity of the scenario and the need for interdisciplinary and collaborative approaches. It concludes that cyber security can no longer be treated solely as a technical issue, but as a cross-cutting challenge that demands integration between technology, legislation, education, governance and public policies. Protecting cyberspace requires coordinated action at local and global level, aimed not only at defending systems, but also at preserving rights, privacy and social trust in the digital age.
Downloads
References
ANDERSON, Ross; MOORE, Tyler. Security Economics and the Internal Market. European Network and Information Security Agency – ENISA, 2020. Disponível em: https://www.enisa.europa.eu. Acesso em: 10 jul. 2025.
ARAUJO, Márcio T.; FERREIRA, Fernando Nicolau Freitas. Política de Segurança da Informação. 2. ed. –: Ciência Moderna, 2009.
BAUMAN, Zygmunt. Vigilância líquida. Rio de Janeiro: Zahar, 2017.
BOER, M.; VAZQUEZ, J. Cyber Security & Financial Stability: how cyber-attacks could materially impact the global financial system. Institute of International Finance, set. 2017. Disponível em: https://www.iif.com/Publications/ID/228/Cyber-Security- Financial-Stability-How-Cyber-attacks-Could-Materially-Impact-the-Global-Financial- System. Acesso em: 14 jul. 2025.
CASTELLS, Manuel. A galáxia da internet: reflexões sobre a internet, os negócios e a sociedade. Rio de Janeiro: Zahar, 2003.
CLARKE, R.; KNAKE, R. Cyber War: The Next Threat to National Security and What to Do About It. Rio de Janeiro: Brasport, 2015.
CLOUGH, Jonathan. Principles of Cybercrime. New York: Cambridge University Press, 2010.
DONEDA, Danilo. Da privacidade à proteção de dados pessoais. São Paulo: Thomson Reuters Brasil, 2019.
FERREIRA, Ana Paula; ALMEIDA, Lucas Henrique. Cibersegurança e o modelo Zero Trust: uma abordagem emergente frente ao trabalho remoto. Revista Gestão e Tecnologia, v. 21, n. 2, p. 132–148, 2021.
FONTES, Edison Luiz Gonçalves. Segurança da Informação: o usuário faz a diferença. Rio de Janeiro: Saraiva, 2007.
GARTZKE, E. The Myth of Cyberwar: bringing war in cyberspace back down to Earth. International Security, Cambridge, v. 38, n. 2, p. 41-73, out. 2013. Disponível em: https://www.mitpressjournals.org/doi/pdf/10.1162/ISEC_a_00136. Acesso em: 14 jul. 2025.
GRAGIDO, Will; MOLINA, Daniel; PIRC, John; SELBY, Nick; HAY, Andrew. Blackhatonomics: an inside look at the economics of cybercrime. Waltham: Elsevier, 2013.
IBM SECURITY. Cost of a Data Breach Report 2024. Armonk, NY: IBM Corporation, 2024. Disponível em: https://www.ibm.com/security/data-breach. Acesso em: 10 jul. 2025.
INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES (IISS). Strategic Survey
2018: The Annual Assessment of Geopolitics. Londres: IISS, 2018. JUNCKER, Jean-Claude. Discurso sobre o estado da União. 2017.
LAUDON, Kenneth; LAUDON, Jane. Sistemas de Informações Gerenciais. –: Pearson Universidades, 2014.
LE DRIAN, Jean-Yves. Discurso na 72ª Assembleia Geral da ONU, setembro de 2017.
LLOYD’S OF LONDON. Estimativas de perdas financeiras devido a ciberataques. Julho de 2017.
NYE, Joseph S. The Future of Power. New York: PublicAffairs, 2011.
OCDE. Cybersecurity Policy Making at a Turning Point. 2012. Disponível em: http://www.oecd.org/sti/ieconomy/cybersecurity%20policy%20making.pdf. Acesso em: 14 jul. 2025.
REZENDE, Denis Alcides. Governança de Tecnologia da Informação e Comunicação: fundamentos, modelos e aplicação nas organizações. 3. ed. São Paulo: Atlas, 2020.
SCHMIDT, Guilherme. Crimes Cibernéticos. 2014. Disponível em: https://gschmidtadv.jusbrasil.com.br/artigos/149726370/crimes-ciberneticos. Acesso em: 14 jul. 2025.
SPYMAN, Hacking. Manual Completo do Hacker. 3. ed. –: Book Express, 2000.
WORLD ECONOMIC FORUM. Global Risks Report 2018. Genebra: WEF, 2018. Disponível em: https://www.weforum.org/reports/the-global-risks-report-2018. Acesso em: 14 jul. 2025.
ZÚQUETE, André. Segurança em Redes e Sistemas Computacionais. Lisboa: FCA, 2022.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 David Aguiar (Autor)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.