Cyber Security for the Economy and Protecting Cyber Space Reliant Societies Again Cyber Threats

Authors

  •   Department of Computer Engineering, Poornima Institute of Engineering & Technology, Jaipur, India

Keywords:

Cyber Security, Cyber Crime, Cyber Space, Cloud Services, Ransom Ware

Abstract

Internet is essential for development for both social and economic sectors to form vital infrastructures. Due to the increased use of Internet Cyber Threats are evolving and increasing rapidly. Two interrelated objectives of Cyber Security aims for strengthening cyber Security for the economy and protecting cyber space reliant societies again cyber threats. But, to achieve these two objectives in parallel is complex, and probably the main challenge of Cyber Security policy. With this objective, this paper analyses the background, characteristics, current research work, counter measure techniques and future research perspectives of Cyber security. Initially, mobile cloud computing is highlighted and then features and recent survey issues has discussed. Finally future trends have been discussed [1].

References

  1. OECD (2012), "Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy", OECD Digital Economy Papers, No. 211, OECD Publishing, Paris. DOI: http://dx.doi.org/10.1787/5k8zq92vdgtl-en
  2. cybersecurity-related-incidents-in-india-during-2016.http://www.bgr.in/news/cert-in-reports-50362-/cybersecurity-related-incidents-in-india-during-2016(Feburary,2016).
  3. Thomas H. Karas and Lori K. Parrott , Judy H. Moore , Metaphors for Cyber Security ,Sandia National Laboratories P.O. Box 5800 Albuquerque, NM 87185-0839.
  4. Luca Urciuoli, Toni Mannisto, Juha Hinsta and Tamanna Kahn. “Supply Chain Cyber Security— Potential Threats,” Information & Security: An International Journal 29, no. 1 (2013): 51–68. http://www.ndm.net/ips/pdf/junipernetworks/Juniper%20Architecture%20for%20Secure%20SCADA%20and%20Distributed%20Control%20System%20Networks.pdf.
  5. Steven R. Chabinsky “Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Lines,” Journal of National Security Law & Policy 4, no. 1 (2010): 27. 30 Trusted Computing Group.FactSheet.2009.http://www.trustedcomputinggroup.org/files/resource_files/7f38fa361d093519add14cb3d28efea6/fact%20sheet%20May202009.pdf
  6. Symantec, 2015 Internet Security Threat Report,7(Apr.2015),FL.Retrieved from http://know.symantec.com/LP=1123.
  7. David E. Sanger and Nicole Perlroth, Bank Hackers Steal Millions via Malware, International New York Times (Feb. 14, 2015) (noting that, since late 2013, an unknown group of hackers has reportedly stolen $300 million -and possibly as much as triple that amount - from banks across the world), FL. Retrieved from http://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html.
  8. Promoting Private Sector Cybersecurity Information Sharing,Exec.Order No.13691(Feb. 20, 2015),80 Fed.Reg.9349,FL. Retrieved from http://www.gpo.gov/fdsys/pkg/FR-2015-02-20/pdf/2015-03714.pdf.
  9. Integrated Defense Staff,“National Informatics Center”,Ministry of Defense,India.
  10. whereareweoncybersecurityinindia.https://securityintelligence.com/whereareweoncybersecurity-in-india (November, 2016).
  11. http://im.rediff.com/money/2016/jun/02graph4.jpg

Downloads

Published

2018-03-25

Issue

Section

Research Articles

How to Cite

[1]
, " Cyber Security for the Economy and Protecting Cyber Space Reliant Societies Again Cyber Threats , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 6, pp.48-52, March-April-2018.