CYBER SECURITY AND THREATS

Authors

  • Mr. Saurabh Bobade Dept. of CSE Shri Sai College of Engineering and Technology Chandrapur, India
  • Mr. Lowlesh Yadav Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Mr. Neehal Jiwane Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India

DOI:

https://doi.org/10.59367/47606n69

Keywords:

cyber security, cyber threats, data mining, cybercrime, cyber terrorism.

Abstract

The rapid developments of technology have provided huge areas of new opportunity and potential sources of efficiency for organizations of all sizes, these new technologies have also brought unprecedented threats with them. However, multimedia editing tools can be used to efficiently and seamlessly alter the content of digital data, thus compromising the credibility of information. Cyber security defined as the protection of systems, networks and data in cyberspace to preserve the original data and to remove all doubt about genuineness.  In business this is a critical and challenging issue in the cyber world. Cyber security will only become more important as more devices the internet of things become connected to the internet. This paper focus on types of cyber security, types of vulnerabilities and cyber threats techniques, techniques to avoid threats. Finally ends up with advantages of cyber world.

References

H. Suryotrisongko and Y. Musashi, "Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspec-tive,"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA), Kaohsiung, Taiwan, 2019, pp. 162-167, doi: 10.1109/SOCA.2019.00031.

Y. Liu, H. Qin, Z. Chen, C. Shi, R. Zhang and W. Chen, "Research on Cyber Security Defense Technology of Power Generation Acquisition Terminal in New Energy Plant,"2019 IEEE International Conference on Energy Internet (ICEI), Nanjing, China, 2019, pp. 25-30, doi: 10.1109/ICEI.2019.00011

F. Alkhudhayr, S. Alfarraj, B. Aljameeli and S. Elkhdiri, "Information Security:A Review of Information Security Issues and Tech-niques,"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 2019, pp. 1-6, doi: 10.1109/CAIS.2019.8769504.

Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth” IJRECE VOL. 7 ISSUE 1 ( JANUARY-MARCH 2019) pg no 275-278

C. Ten, G. Manimaran and C. Liu, "Cybersecurity for Critical Infrastructures: Attack and Defense Modeling," in IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 40, no. 4, pp. 853-865, July 2010, doi: 10.1109/TSMCA.2010.2048028.

Downloads

Published

2024-03-11

Issue

Section

Articles

How to Cite

CYBER SECURITY AND THREATS. (2024). International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM), 3(1), 423-430. https://doi.org/10.59367/47606n69

Similar Articles

1-10 of 48

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)

1 2 > >>