Study of Cyber Security

Abstract

In the modern context, ‘cyber attacks’ or ‘cyber hazards’ otherwise referred as ‘cyber crimes’, is a highly referred term because of its complex and evolving nature in a sphere unseen to the human eye; ‘cyber sphere’. The perpetrators and the victims of cybercrimes are reported from all over the world with no particular location, meaning any individual of any part of a region can be subjected to a cyber threat or actively participate in the particular area. As individuals who are living in a highly digitalized society, it is a vital need to be aware of the potential threats that comes with the use of information technology and how to be protected from these threats. Cyber security aims in protecting individuals from this border-less crimes and to ensure their safety while protecting their personal data, when surfing internet/ World Wide Web. The research has been conducted in the context of Socio-legal, analytical and qualitative research formats in order to provide an understanding on the current position of cyber security. Safeguarding the information has become an enormous problem in the current day. The cyber security the main thing that originates in mind is 'cyber crimes' which are aggregate colossally daily. Different governments and organizations are taking numerous measures to keep these cyber wrongdoings. Other than different measures cyber security is as yet a of cyber security discuss in it. The cyber-terrorism could make associations lose billions of dollars in the region of organizations.

Country : India

1 Prof. Sunita Totade2 Vaishnavi S. Kadu3 Vishakha S. Payghan4 Dhanashree P. Dhote

  1. HOD, Department of MCA, Vidyabharati Mahavidyalaya, Amravati, India
  2. Student, Department of MCA, Vidyabharati Mahavidyalaya, Amravati, India
  3. Student, Department of MCA, Vidyabharati Mahavidyalaya, Amravati, India
  4. Student, Department of MCA, Vidyabharati Mahavidyalaya, Amravati, India

IRJIET, Volume 6, Issue 10, October 2022 pp. 122-125

doi.org/10.47001/IRJIET/2022.610022

References

  1. A Sophos Article 04.12vl.dNA, eight trends changing network security by James Lyne.
  2. Cyber Security: Understanding Cyber Crimes-Sunit Belapura Nina Godbole.
  3. Computer Security Practices in Non Profit Organisation – A NetAction Report by Audrie Krause.
  4. A look back on Cyber Security 2012 by Luis corrons – Panda Labs.
  5. International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 page nos.68 – 71 ISSN 2229-5518, “Study of Cloud Computing in HealthCare Industry “by G.nikhita Reddy, G.J.Ugander Reddy.
  6. IEEE security and Pravicy Magazine – IEEECS “Safety Critical System – Next Generation “July/Aug 2013.
  7. CIO Asia, September 3rd, H1 2013: Cyber security in malasia by Avanthi Kumar.
  8. K. Thakur, M. Qiu, K. Gai and M. L. Ali, "An Investigation on Cyber Security Threats and Security Models," 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY, 2015, pp. 307-311, doi: 10.1109/CSCloud.2015.71.
  9. J. Akram and L. Ping, "How to build a vulnerability benchmark to overcome cyber security attacks," in IET Information Security, vol. 14, no. 1, pp. 60-71, 1 2020, doi: 10.1049/iet-ifs.2018.5647.
  10. Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, 24-31. doi:10.1016/S2212-5671(15)01077.
  11. Cabaj,  K., Kotulski,  Z., Księżopolski,  B., & Mazurczyk, W. (2018). Cybersecurity: trends, issues, and challenges. EURASIP Journal on Information Security. doi:10.1186/s13635-018-0080-0.
  12. https://www.csis.org/news/cybersecurity-agenda-45th-president13
  13. http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf
  14. https://www.cyberbit.com