Cyber Security : Strategy to Security Challenges A Review

Authors

  • Shruti Rajesh Nistane  CSE, Jawaharlal Darda Institute of Engineering and Technology, Yavatmal, Maharashtra, India
  • Radhika Rajesh Sharma  CSE, Jawaharlal Darda Institute of Engineering and Technology, Yavatmal, Maharashtra, India

DOI:

https://doi.org/10.32628/IJSRST229170

Keywords:

Confidentiality, Ransomware Attack, Cyber Threat, Integrity, Availability.

Abstract

During recent years,the wireless communication and technologies have given rise to many cyber crimes and exploited the cyber security. Cybersecurity is the protection and prevention of internet-connected systems like hardware, software and data from cyberthreats and harms.Cyber security is important for the protection of confidentiality, integrity and availability of information assets. Perhaps the biggest challenge of cyber security is the continuous and immense growth in technology. The paper proposes challenges and issues related to cyber security. Some major challenges are phishing attacks, ransomware attack, IoT attacks and many more. This paper proposes a framework describing cyber terrorism. So there is need to create awareness about cyber security so that there will be safe and secure environment for users.

References

  1. G.Nikhita Reddy1 , G.J. Ugander Reddy2 , “A study of cyber security challenges and its emergning trends on latest technologies”, 1- 6.
  2. Some perspectives on cyber security: 2012”, 16 November 2012, 2 – 22.
  3. BhavnaArora.:Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science. 8(7). 540-542.(2016). DOI: https://doi.org/10.1016/j.pisc.2016.06.014
  4. Barry M. Lunt, Dale C. Rowe, Joseph J. Ekstrom.: The Role of Cyber-Security in Information Technology Education. In Proceedings of the 2011 Conference on Information Technology Education. ACM, New York, NY, USA 113-122, (2011)
  5. Bruce Schneier. 2018. Crypto- Gram. https://www.schneier.com/crypto-gram/archives/2018/0615.html#1. AccessedAugust 18, 2018
  6. EirikAlbrechtsen.:Qualitative Study of Users' View on Information Security. Computers & Security. 26(4).276-289.(2007).DOI: https://doi.org/10.1016/j.cose.2006.11.004.
  7. ScottE.Jasper.:US Cyber Threat Intelligence Sharing Frameworks. International Journal of Intelligence and Counter Intelligence. 30(1).53-65.(2017).DOI: https://doi.org/10.1080/08850607.2016.1230701.
  8. Abdallah, A. E., Mahbub, K., Palomar, E., Wagner, T. D.:A Novel Trust Taxonomy for Shared Cyber Threat Intelligence. Security and Communication Networks.2018, Article 9634507. DOI:https:/doi.org/10.1155/2018/9634507.
  9. 9Emmanuel, S., Thomas, T., Vijayaraghavan, A.P. : Machine Learning and Cybersecurity. Machine Learning Approaches in Cyber Security Analytics. 37-47. 2020. Springer, Singapore. DOI: https://doi.org/10.1007/978-981-15-1706-8_3
  10. Deibert, R. (2012). Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace. Journal of military and strategic studies, 14.
  11. Weber, R. H., & Studer, E. (2016). Cybersecurity in the Internet of Things: Legal aspects. Computer Law \& Security Review, 32, 715- 728.
  12. SS Raghav, “cyber security in india's counter terrorism strategy”, 2-5.
  13. Dr Gulshan Rai, “National Cyber Security Policy”, draft volume 1.0, 6-21, 26 Mar 2011.
  14. Evgeny Lebanidze Cigital, “NRECA / Cooperative Research Network Smart Grid Demonstration Project Guide to Developing a Cyber Security and Risk Mitigation Plan”, 17-125.
  15. Li, W., & Joshi, A. (2008). Security issues in mobile ad hoc networks-a survey. Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, 1-23.
  16. G.Nikhita Reddy l . G.J. Ugander Reddy2 . "A study of cyber security challenges and its emergning trends on latest technologies", 1-6.
  17. "Why Cyber Security Is Important", State of Wyoming, Office Of the Chief Information Officer, 2001 Capitol Ave, Rm 237, Cheyenne, WY 82002, 2-2.
  18. K Yadav, “Conclusions and Future Scope of the Work”, 2012, 3-4.

Downloads

Published

2022-02-28

Issue

Section

Research Articles

How to Cite

[1]
Shruti Rajesh Nistane, Radhika Rajesh Sharma "Cyber Security : Strategy to Security Challenges A Review" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 9, Issue 1, pp.316-319, January-February-2022. Available at doi : https://doi.org/10.32628/IJSRST229170