International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Cyber Security: Threats and its prevention

Author Affiliations

  • 1Bhilai Institute of Technology, Durg, CG, India
  • 2Bhilai Institute of Technology, Durg, CG, India

Res. J. Computer & IT Sci., Volume 11, Issue (1), Pages 12-15, June,20 (2023)

Abstract

The term “Cyber Security” is very important nowadays. This two-letter word Cyber Security in which Cyber means anything which is related to Internet & Security means protection. We can say that whenever we try to protect our E-Systems i.e., computers, mobile devices, servers, networks, databases, etc. from malicious attacks then it is known as Cyber Security. Many organizations deal with ecommerce applications with their fragile network. Vital web security services are intent to cyber-attacks so it is very important for the organizations to improve their performance & security of E-Systems to make sure that the data of users follow integrity & confidentiality. There are many techniques of prevention of cyber-attack suggested or proposed by many people from which we can protect our E-Systems from these types of malicious attacks. But unfortunately, no single solution can work for all E-Systems devices & services although we can use some techniques i.e., Network security techniques, Application security techniques, Information security techniques, Operational security techniques, etc. to overcome the cyber threats. We can use many safety tips from which we can protect our E-Systems from cyber threats. In this era, we need such tools of protection against these cyber-attacks. For example, we can use Anti-viruses, strong passwords; avoid using public Wi-Fi network connections, updating our systems frequently, etc. The objective of this research is that how we can protect our E-Systems from doing simple changes in our habits while using E-System’s computers or devices that work with the help of the internet.

References

  1. Mbelli, T. M., & Dwolatzky, B. (2016)., Cyber security, a threat to cyber banking in South Africa: An approach to network and application security., In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 1-6. IEEE.
  2. Al Shaer, D., Al Musaimi, O., De la Torre, B. G., & Albericio, F. (2020)., Hydroxamate siderophores: Natural occurrence, chemical synthesis, iron binding affinity and use as Trojan horses against pathogens., European Journal of Medicinal Chemistry, 208, 112791.
  3. Sneed, H. M. (2005)., Testing an e-government Web site., In Seventh IEEE International Symposium on Web Site Evolution (p. 3). IEEE.
  4. Meszaros, J., & Buchalcevova, A. (2017)., Introducing OSSF: A framework for online service cyber security risk management., Computers & Security, 65, 300-313.
  5. Stevens, C. (2020)., Assembling cyber security: The politics and materiality of technical malware reports and the case of Stuxnet., Contemporary Security Policy, 41(1), 129-152.
  6. Kuznetsov, D. I., & Ryabchina, L. S. (2019)., Information security of the Internet of Things systems., Bulletin of Kryvyi Rih National University, 49, 80-83.
  7. G. Immerman, (2020)., The importance of edge computing for the iot., URL: https://www. machinemetrics.com/blog/edge-computing-iot.
  8. Jamal, A. A., Majid, A. A. M., Konev, A., Kosachenko, T., & Shelupanov, A. (2023)., A review on security analysis of cyber physical systems using Machine learning., Materials Today: Proceedings, 80, 2302-2306.
  9. Alghamdi, M. I. (2021)., WITHDRAWN: Determining the impact of cyber security awareness on employee behaviour: A case of Saudi Arabia.,
  10. Al-Ghamdi, M. I. (2021)., Effects of knowledge of cyber security on prevention of attacks., Materials Today: Proceedings.
  11. Paulsen, C. (2016)., Cyber securing small businesses., Computer, 49(8), 92-97.
  12. Ventura, R. A. (2015)., Avengers: Age of Ultron., Philosophy Now, 111, 46-47.