Cyber Security Study on Attack, Threat, Vulnerability

Abstract

This research aims to investigate risks linked to cyber infrastructure, including hardware, software systems, networks, and intranets, with an emphasis on cyber intrusions. The objective is to underscore the importance of network intrusions and cyber theft by examining factors that have fueled the growth of cybercrime. This paper offers a detailed definition of cybersecurity and its role in counteracting network intrusions and cyber theft, while analyzing the drivers behind the rise in cybercriminal activities and their impacts. Additionally, preventive strategies and potential remedies to reduce cybersecurity vulnerabilities are discussed. The paper concludes that while technology can diminish the effects of cyberattacks, human behavior and psychological aspects are key vulnerabilities. Nonetheless, there is optimism about the role of educational initiatives within organizations in mitigating cyber threats.

Country : India

1 Samiksha S Kanse2 Dr. S. B. Sarvaiya

  1. MCA-II, Department of MCA, Vidhya Bharti Mahavidyalaya, Amravati, Maharashtra, India
  2. Head, Department of MCA, Vidhya Bharti Mahavidyalaya, Amravati, Maharashtra, India

IRJIET, Volume 8, Issue 10, October 2024 pp. 289-292

doi.org/10.47001/IRJIET/2024.810039

References

  1. Jibril, A. B., et al. Customers’ perception of cybersecurity threats toward e-banking adoption and retention: A conceptual study. in ICCWS 2020 15th International Conference on Cyber Warfare and Security. 2020. Academic Conferences and publishing limited.
  2. Al-Mohannadi, Hamad, et al. "Cyber-Attack Modeling Analysis Techniques: An Overview." Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. IEEE, 2016.
  3. Panja, B., et al. Cybersecurity in banking and financial sector: Security analysis of a mobile banking application. in 2013 international conference on collaboration technologies and systems (CTS). 2013. IEEE.
  4. Rowe, Dale C., Barry M. Lunt, and Joseph J. Ekstrom. "The role of cyber-security in information technology education." Proceedings of the 2011 conference on Information technology education.ACM, 2011.
  5. Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65-88.
  6. Ahmad, A. (2012). Type of security threats and it’s prevention. Int. J. Computer Technology & Applications, 3(2), 750-752.
  7. Al-Mohannadi, H., Mirza, Q., Namanya, A., Awan, I., Cullen, A., &Disso, J. (2016, August). Cyberattack modeling analysis techniques: An overview. In 2016 IEEE 4th international conference on future internet of things and cloud workshops (FiCloudW) (pp. 69- 76). IEEE.
  8. “Internet Security Threat Report Internet Report “Volume 21, April 2016. https://www.symantec.com/content/dam/symant ec/docs/reports/istr-21-2016-en.
  9. Ten, C. W., Liu, C. C., & Manimaran, G. (2008). Vulnerability assessment of cybersecurity for SCADA systems. IEEE.
  10. Yadav, V. (2020). A Study of Threats, Detection and Prevention in Cybersecurity. International Research Journal of Engineering and Technology (IRJET), May, 1150-1153.