Suche senden
Hochladen
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
•
0 gefällt mir
•
15 views
IRJET Journal
Folgen
https://www.irjet.net/archives/V9/i4/IRJET-V9I403.pdf
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 5
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Â
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
Â
Cyber Security Intelligence
Cyber Security Intelligence
ijtsrd
Â
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
Â
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
Â
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
Â
Cyber Investigation Portal
Cyber Investigation Portal
IRJET Journal
Â
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
Â
Empfohlen
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Â
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
Â
Cyber Security Intelligence
Cyber Security Intelligence
ijtsrd
Â
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
Â
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
Â
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
Â
Cyber Investigation Portal
Cyber Investigation Portal
IRJET Journal
Â
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
Â
Robots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
Â
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
Â
Class activity 4
Class activity 4
Jeewanthi Fernando
Â
IBM Security Services
IBM Security Services
Rainer Mueller
Â
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
IRJET Journal
Â
Cyber Security
Cyber Security
IRJET Journal
Â
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
Â
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
Â
Case Study.pdf
Case Study.pdf
DamaineFranklinMScBE
Â
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
Â
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
Â
188
188
vivatechijri
Â
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
IRJET Journal
Â
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
Â
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
Â
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
Â
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
Â
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
Cognizant
Â
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
eresavenzon
Â
Cybersecurity report
Cybersecurity report
Kevin Leffew
Â
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
Weitere ähnliche Inhalte
Ă„hnlich wie A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
Robots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
Â
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
Â
Class activity 4
Class activity 4
Jeewanthi Fernando
Â
IBM Security Services
IBM Security Services
Rainer Mueller
Â
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
IRJET Journal
Â
Cyber Security
Cyber Security
IRJET Journal
Â
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
Â
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
Â
Case Study.pdf
Case Study.pdf
DamaineFranklinMScBE
Â
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
Â
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
Â
188
188
vivatechijri
Â
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
IRJET Journal
Â
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
Â
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
Â
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
Â
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
Â
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
Cognizant
Â
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
eresavenzon
Â
Cybersecurity report
Cybersecurity report
Kevin Leffew
Â
Ă„hnlich wie A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
(20)
Robots in The Chemical Industry
Robots in The Chemical Industry
Â
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
Â
Class activity 4
Class activity 4
Â
IBM Security Services
IBM Security Services
Â
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
Â
Cyber Security
Cyber Security
Â
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Â
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Â
Case Study.pdf
Case Study.pdf
Â
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
Â
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Â
188
188
Â
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
Â
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Â
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Â
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Â
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
Â
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
Â
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
Â
Cybersecurity report
Cybersecurity report
Â
Mehr von IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
Mehr von IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
KĂĽrzlich hochgeladen
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Â
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Â
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
Â
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
hamedmustafa094
Â
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
Â
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
MairaAshraf6
Â
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
Â
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Kamal Acharya
Â
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
Â
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
Â
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Â
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
Â
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
Â
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
Â
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Â
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
smsksolar
Â
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
Â
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Call Girls Mumbai
Â
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
Â
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
RAJNEESHKUMAR341697
Â
KĂĽrzlich hochgeladen
(20)
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Â
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Â
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
Â
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
Â
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
Â
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
Â
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Â
Online food ordering system project report.pdf
Online food ordering system project report.pdf
Â
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Â
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
Â
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Â
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Â
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
Â
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
Â
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Â
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
Â
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
Â
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Â
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
Â
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
Â
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 13 A Comprehensive Review of Cyber Security, Threats and Cyber Attacks Aditya P. Rajpara1, Sejal Thakkar2 1Department of Computer Engineering, Indus University, Ahmedabad, India 2Asistant Professor CE Department IITE Indus University ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Today, cyberspace hosts the majority of economic, commercial, cultural, social, and governmental activity and relationships at all levels, includingpeople,non- governmental organizations, andgovernmententities.Inthe world of information technology, cyber security is critical. The first thing that springs to mind when we think of cyber security is "cyber-crime," which is on the rise. To tackle cybercrime, several governmentsandcorporationsare using several measures. Despite several efforts, cyber security continues to be a major concernformanyindividuals.Cyber- attacks are an issue for governments all around the world, and protecting sensitive information from them is tough. A variety of companies use a variety of ways to scale back the results of cyberattacks so as to realize this goal. Cyber security monitors real-time data on the most recent IT data. This article will examine the challenges, weaknesses, and strengths of the proposed methods that have beenproposed by researchers around the globe to prevent cyber-attacksor reduce the damage caused, as well as the complexities,weak points, and strengths of the proposed techniques that have been proposed by researchers all over the world to prevent cyber-attacks or minimize the damage. Key Words: Cyber-Crimes, Cyber-Attacks, Cyber Security, Cyberspace. 1. INTRODUCTION The Internet is the most rapidly expanding infrastructure in modern society. But due to these emerging technologies, we are not able to protect our privacy effectively. As a result, network security has become an issue recently. Making the Internet safer (and protecting Internetusers)hasbecomean integral part of the development of new services and government policy. The Internet has created a huge international network that has generated billions of dollars annually for the world economy. Diverse parts of citizens' lives are connected with this space, and any instability, insecurity, or obstacles in this spacewill havea directimpact on different aspects of the life of residents. Until governments comes back with a transparent definition of a cyber-attack that’s acceptedandfavoredbytheinternational community, it’ll definitely be terribly troublesome for consultants to deal with the advanced and numerous dimensions and aspects of the difficulty. The availability ofa thorough definition of a cyber-attack will surely have an immediate impact on the legal environment in which to continue and identify the consequences of this type of threats. For decades, the Internet has performed a giant function in worldwide communication and has grown to be more and more incorporated into the lives of human beings all throughout the world. The Internet has created a great worldwide community that has generated billions of greenbacks yearly for the worldwide economy. Most media sports are transferred to this area, maximum economic exchanges are carried out in thisarea,anda largepercentage of residents' time and sports are spent interacting in this zoneis. Nevertheless, our online world has posed new protection-demanding situations for governments. Our online world has caused robust and vulnerable actors, together with governments, prepared and terrorist corporations, or even people in this area. Cyber threats consist of cyber warfare, cybercrime, cyber terrorism, and cyber espionage. This divides cyberdangersfromtraditional threats to national security. There are diverse possibilities for intense, and now and then, vast bodily or financial damage. There isn't any doubt that the dearth of a clean and complete definition now no longer obscures the main criminal path. This also leads to variation in interpretation and practice, and, in the end, to the success of sometimes contradictory criminal conclusions. As a result of the importance and necessity of obtaining an appropriate definition, "cybersecurity" can be defined as a strategy for reducing security issues in order to safeguardthereputation of the firm, commercial damage, or economic damage. It is important to note that this is not a one-time process and it's a never-ending process. The owner of the business has to keep everything up-to-date in order for it to stay in compliance with the mandate. 2. FUNDAMENTAL CONCEPTS The true objective of cybersecurity is to keep your information safe from theft and tampering. Consider three essential cybersecurity objectives in order to do this. 1. The confidentiality of information is safeguarded. 2. Preservation of Information Integrity 3. Restricting access to information to only those who have been approved. The CIA triad model is intended to guide data security strategies within the confines of a society or corporation. This model is similarly mentioned in place of the AIC (availability, Integrity, and Confidentiality) triad to sidestep the mistake with the Central Intelligence Agency. The CIA
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 14 standards are ones that most societies and businesses practice once they have connected a new request, made a record, or when assuring access to information. Fig -1: CIA Triad 1) Confidentiality Assuring that your complicated data is only accessible to authorized people and that no information is leaked to undesired parties. If your key is private and will not be shared, who will have access to it? This will jeopardize your confidentiality. Confidentiality Protection Techniques:  Encryption of data  Two-factor or multi-factor authentication  Biometrics Verification 2) Integrity Ensure that all of your data is accurate and reliable and that it does not vary from one fact to anotherduringtheprogram. Methods of ensuring integrity are:  No one illegal should have access to the records as this violates privacy. As a result, there will be controls for operator contact.  Appropriate backups must be available in order to return quickly.  A version supervisor must be present to monitor who has altered the log. 3) Availability There will be no denial of service messages whenever the operator requests a resource for a section of the statistics (DoS). The evidence must be accessible in its entirety. For example, if an attacker takes control of a website, it might causea DoS, which makes it difficult to access. 3. CYBER CRIMES Any unlawful conduct that involves a computer as its principal means of commission and theft is referred to as cybercrime. The United States Department of Justice has broadened the definition of cybercrime to encompass any criminal behavior that involvesthestoringofproofstored on the computer.Cybercrimes encompasscrimesmadepossible by computers, such as network intrusions and the spread of computer viruses, as well as computer-based variants of existing crimes, such as identity theft, stalking, bullying, and terrorism, all of which have become important people's and government's concerns. In simpler terms, cybercrime is when someone steals a person's identity, sells contraband, stalks victims, or uses harmful software to disrupt operations. Cybercrime will grow in unison with technology's rising importance in people's lives. Chart -1: Intersection of attack, crime and breach 4. CYBER SECURITY Data privacy and security are always the highest security areas of focus for any company. We currently live in a world where every data is digitally saved or stored in cyberspace. On social networking sites, users may interact with family and friends in a secure atmosphere. Cybercriminals will continue to attack social networking sites in order to collect personal information fromhomeusers.Apersonshouldtake all essential security steps not just when using social networking sites, but when using a bank.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 15 Chart -2: Incidents in cyber security The comparison of cyber securityincidentsreportedinIndia between 2015 and 2020 demonstrates the cyber security dangers. As crime rates rise, so, too, do security precautions. According to Silicon Valley Bank's countrywide poll of technology and healthcare professionals, organizations feel cyber assaults pose a severe danger to both their data and their business succession. 1] This year, 98 percent of organizations are maintaining or expanding their cyber security efforts, with half increasing resources committed to online threats. 2] The majority of businesses are planningforcyberassaults when they occur, not if they occur. 3] Only one-third are entirely confident in the protection of their information, and even fewer are confident in their business partners' security procedures. The number of malware specimens for Macswouldcontinue to rise, but at a considerably slower rate than for PCs. Because Windows 8 will allow users to construct programs for nearly any device (PCs, tablets, and smartphones) running Windows 8,harmful applicationssimilartothose for Android will be feasible; hence, these are some of the projected developments in security. Network, server, intranet, and computer systems are all protected by cyber-security specialists. To improve your security, you must first understand the different types of cyber security. Malware or hacking are examples of disruptors that can affect a computer network's security. Physical and digital data are protected from unauthorized access, disclosure, misuse, unlawful alteration, and deletion by information security. Organizational security is founded on three fundamental principles: confidentiality, integrity, and availability. Best practices in cybersecurity go beyond these ideas. The lack of qualified workers to undertake the job is a significant barrier in cyber-security. Each plan must be individually devised and implemented for each organization. The conflict betweenthesecuritysituationand the demand for cyber performance is significant. Rapid data flow to cyberspace almost always reduces the overall system's security. For technology professionalswhowantto prove production, security indicators are often in direct conflict with each other because they reduce, prohibit, or delay user access; In addition, they consumeindicationsthat indicate vital system resources and react to managerial attention. The objectives of the applicable regulatory body dictate the substance of the security policy. The national security goals are not the same as the business security goals. It is not ven possible to expect resource providers to adhere to the customer security policy unless a formal contract is in place. In companies, it is common to have a centrally centralized security unit that is responsible for cyber-security policy and related standards and solutions. 5. CYBER SPACE THREATS Any destructive attack that tries to obtain unauthorized access to data, disrupt digital activity, or damage data is considered a cyber security hazard. Cyber threats include corporate espionage, hacktivists, terrorist organizations, hostile nation-states, criminal organizations, lone hackers, and dissatisfied workers. In recent years, a number of high-profile cyber-attacks have resulted in the exposing of critical data. For example, the Equifax data breach in 2017 exposed the personal information of approximately 143 million people, including birth dates, addresses, and Social Securitynumbers.Hackers got access to Marriott International's networks in 2018 and stole the personal information of roughly 500 million customers, according to the company. The inability of the firm to build, test, and retest technological measures like encryption and authentication permitted the cyber security danger in both cases. 6 Types of Cyber Threats Cyber security experts should be well-versed in the following sorts of cyber security risks. 1. Malware Malicious software includes spyware, ransomware, viruses, even worms. Whenever a user clicks on a broken link or document, malware is activated and destructive software is installed. As per Cisco, once the virus is activated, it can:  Critical network components have limited access (ransomware)  Install more potentially hazardous applications.  Send data from the hard disc to obtain information without being discovered (spyware).  Individual partsaredisrupted,renderingthesystem unworkable.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 16 2. Phishing Phishing attacks employ forged communication, such as an email, to deceive the recipient into opening it and following the instructions contained inside, suchassubmittinga credit card number. The goal, according to Cisco, is to "collect personal data such as credit card and login passwords or infect the victim's PC with malware." 3. Denial of Service A denial of service attack floods a computer or network with requests, making it unable to reply.AdistributedDoSassault achieves the same result as a single DoS attack, except it originates through a computer network. Cybercriminals typically use a flood attack to disrupt the "handshake" protocol and carry out a DoS. Additional ways may be employed, and some hackers take advantage of the downtime to conduct further attacks. A botnet, according to Jeff Melnick of Netwrix, an information technology security software company, is a type of DDoS in which a hacker may infect millions of machines with malware and control them. Botnets, also known as zombie systems, are computer networks that are designed to assault and overcome a target's processing capability. 4. Man in the Middle Attack A man-in-the-middle (MITM) attack occurs whenever attackers insert themselves into a two-party transaction. Cisco claims that after stopping transmission, they can filter and collect data. When a visitor connects to an unsecured public Wi-Fi network, MITM attacks are common. After erecting a firewall between both the visitorandthenetwork, the attackers employ malware to download software and steal data. 5. SQL Injection When malicious code is injected into a SQL server, SQL injection is a type of cyber-attack. Data is leaked when a system is infected. It's as easy as putting the malicious script into a vulnerable website's search field. 6. Zero-day Exploit The zero-day (0-day) exploit is a cyber-attack that targets a security flaw that the software developer or antivirus suppliers are unaware of. The attacker discovers the software flaw before anybody else is interested in fixing it, writes an exploit, and uses it to launch an attack. Such assaults are highly likely to succeed since no defenses are in place. As a result, zero-day attacks are a significant security concern. Web browsers, which are typical targets because of their widespread use, and email attachments that exploit flaws in the program that opens the attachment, or in specific file formats such as Word, Excel, PDF, or Flash, are common attack vectors. 6. CONCLUSION In the third millennium, cyberspace and associated technologies constitute one of the mostimportantsourcesof power. National security can no longer be defined by the threat posed by citizens' declining quality of life. The second is the removal of cyber threats' geographical component. In the past, cyber-attacks created vulnerabilities to military threats. Cyber threats are intermittent, multifaceted, and multidimensional, and their level of harm is quite high since they are related to critical networksandinfrastructure. They cannot be contained only by traditional measures, such as the deployment of military and police power, and governments alone are unable to combat them; strong bilateral collaborationbetweengovernmentsandthe private sector is recommended. "Cybersecurity" surveys increased in the late 2010s. That gesture is more likely to quicken than slow, but its timing varies extensively among our situations. In our undertaking, we left the repercussions of a straight, armed military "cyberwar" to the cross. The purpose of these situationsisto provide an opinion on some of the ups and downsthatmight result. It is clear that cyberwar or at minimum cyber battle will continue to occur because hostilities will erupt, and the internet, like the sea, land, space, and air, is a difficult field. Furthermore, others already have put an inordinateamount of effort into cyber-fighting situations that can be cast off together with this document. We recognize that major warfare between influential conditions fought primarily or even exclusively in cyberspace would be a break that could send a significant amount of the driving forces that we highlight in significant ways. The internet is one of the most complex environments that humans have created, yet it is nonetheless static (for the time being) - an engineering environment made up of numerical machines built and programmed by societies. Acceptance, like satisfaction, is dysfunctional in the situation. Another notion is that downside risks are simpler to envision than upward prospects. Computer security is a broad issue that is growing increasingly relevant as the world becomes increasingly linked, with networks being used to conduct crucial activities. With each New Year that passes, cyber-crime and the protection of information continue to split along distinct routes. Organizations are being tested not only in terms of how they defend their infrastructure, but also in terms of how they require new platforms and intelligence to do so, thanks to the latest and disruptive technologies, as well as the new cyber tools and threats that emerge every day. Although there is no ideal answer to cybercrime, we should do everything we can to reduce it to ensure a safeandsecure future in cyberspace.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 17 REFERENCES [1] https://www.sciencedirect.com/science/article/pii/S2 352484721007289W.-K. Chen, Linear Networks and Systems(Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135. [2] https://www.researchgate.net/publication/35247769 0_Research_Paper_on_Cyber_SecurityB. Smith, “An approach to graphs of linear forms (Unpublishedwork style),” unpublished. [3] https://www.researchgate.net/publication/26012666 5_A_Study_Of_Cyber_Security_Challenges_And_Its_Eme rging_Trends_On_Latest_Technologies. [4] https://images.squarespace- cdn.com/content/v1/5ef07334254666386ed45a91/1 608262717294- MSU10IM5OR3JH523TK7Y/CIA+Triad.png?format=10 00w [5] https://images.app.goo.gl/MgDezi2B9cKtU8H87 [6] https://images.app.goo.gl/Qbr2ydnNKEF7p8Fc8 [7] https://onlinedegrees.und.edu/blog/types-of-cyber- security-threats/ [8] https://www.researchgate.net/publication/33191403 2_On_Cyber_Crimes_and_Cyber_Security [9] https://www.slideshare.net/amirkhan452/chapter2do cx-251434147 [10] https://www.coursehero.com/file/p5c44ij/These- differences-can-be-characterized-in-terms-of-threats- to-whichever-property/
Jetzt herunterladen