Submit Search
Upload
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
•
0 likes
•
17 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i3/IRJET-V9I3140.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
IRJET Journal
Class activity 4
Class activity 4
Jeewanthi Fernando
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
cyber security.pdf
cyber security.pdf
Arivukkarasu Dhanapal
Cyber security
Cyber security
Shivam Yadav
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
Recommended
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
IRJET Journal
Class activity 4
Class activity 4
Jeewanthi Fernando
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
cyber security.pdf
cyber security.pdf
Arivukkarasu Dhanapal
Cyber security
Cyber security
Shivam Yadav
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
188
188
vivatechijri
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
online Marketing
CyberSecurity.pdf
CyberSecurity.pdf
Suleiman55
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
C018131821
C018131821
IOSR Journals
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
online Marketing
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
IRJET Journal
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
IRJET Journal
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
Robots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
Cyber Security Intelligence
Cyber Security Intelligence
ijtsrd
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
null - The Open Security Community
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
tanyamudgal4
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
Amy Cernava
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Threat, Attack and Vulnerability Play a Key Role in Cyber Security
188
188
vivatechijri
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
online Marketing
CyberSecurity.pdf
CyberSecurity.pdf
Suleiman55
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
C018131821
C018131821
IOSR Journals
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
online Marketing
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
IRJET Journal
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
IRJET Journal
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
Robots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
Cyber Security Intelligence
Cyber Security Intelligence
ijtsrd
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
null - The Open Security Community
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
tanyamudgal4
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
Amy Cernava
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
Similar to Threat, Attack and Vulnerability Play a Key Role in Cyber Security
(20)
188
188
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
CyberSecurity.pdf
CyberSecurity.pdf
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
C018131821
C018131821
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
Examining the emerging threat of Phishing and DDoS attacks using Machine Lear...
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Robots in The Chemical Industry
Robots in The Chemical Industry
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
Cyber Security Intelligence
Cyber Security Intelligence
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
result management system report for college project
result management system report for college project
Tonystark477637
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Recently uploaded
(20)
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
result management system report for college project
result management system report for college project
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 773 Threat, Attack and Vulnerability Play a Key Role in Cyber Security B Satyanarayana Assistant Professor, Dept. Of Computer Science, GITAM Institute of Science, GITAM (Deemed to be UNIVERSITY), A. P, INDIA. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Studying attacks, threats, and vulnerabilities of cyber infrastructure are composed of hardware and software systems, networks, corporate networks, intranets, and uses of cyber intrusions is the purpose of this study. The objective has Finished, the paper attempts to explain the importance of network intrusions and cyber theft. A brightly detailed discussion comprises the reasons behind the rapid surge in cybercrime. The paper also includes a complete explanation and classification of cyber security role-plays in network intrusion and cyber recognition theft, a discussion of the reasons for the growth in cybercrime and their impact. Lastly, the authors mention some measures and solutions to protect cyberspace from attacks, threats, and vulnerabilities. They conclude that even though technology has a role to play in reducing the effects of cyber attacks, wecannotunderestimate the impact of cyber attacks on society., the vulnerability exists in While literature supports psychological susceptibilities in humans as dangerous, it is unclear whether psychological susceptibilities are equallydangerousinanimalscyber attacks investment in organizational education Key Words: Cyber-Warfare, Vulnerability, Cyber-attack, Threat 1. INTRODUCTION In recent times people are going on the digitalization or cashless transaction so multifold. Even the government and defense organizations have experienced significant cyber losses and disruptions. The crime environment in the online community is different from the webspace Because of this, enforcing cybercrime laws is extremely difficult proper space law in any society. If you contrast age in real life with age in the online community, you will find thatagein real life is self-authenticating while age in the online community is not. A child under the age of 18 can easily hide his age in Cyberspace and can access the restricted resourceswhereas in true He would have difficulty securing the information in such a magnetic field.Cybersecurityinvolvestheprevention, detection, and response to cyber-attacks. The penetration of computers in society is a welcome step towards modernization but needs to provide keen competition with challenges associated with technology. Some of the advanced techniques for hacking used to penetrate the network, the security vulnerabilities which was not able to identify, it very difficult for the security professionals to find hackers The defense mechanism is mainly concerned with the understanding of their Defend against future attacks by taking into consideration the network, the attacker, the attacker's inspiration, the attack method, and the network's security weaknesses. 2. Background present media, Different sectors, and organizations are having hot discussions about The topic of cyber security is over-hyped and artificially inflated by fear-mongering firms, with misleading terms 'cyber-warfare 'In a recent study by Intelligence Squared, a variety of advertisements were designed to evoke an emotional response rather than a rational one. the number of threats like twenty and three, cyber-war has enhanced. Cyber security is the security concept of discussion topic that can inspire independent thinking researchers. In fact, many of those who call for caution suggest this type of discussion security experts. Rather than lack of government involvement, poor security is the primary cause of many cybercrimes policies implementation. He offers suggestions against requiring Internet users to identifythem.Thesecountriesarepenalized for not complying with attribution requirements, which has led to censorship and international human rights violations. However, whichever perspective one may take, it is evident cyber-security is a very important and current subject that should be discussed. This paper gives the general or realistic definition of cyber-securityfortheInformationWorldacceptstheconcept, but suggests different key elements for activities inclusion. Technology programs are based on a type of research documents and reportspublished. Becausecyber-attacksare on the rise, governments andsecuritycompanies all over the world are taking bold and preemptive action to reduce the risk of successful attacks against critical infrastructure . It meanstherelationshipPhysiqueandcyberspaceareseparate domains. By detectingand responding to incidents relatedto cyber security, that infrastructure is protected Government-backed Internet suppression and military strikes on civilians was prevalent with physical actions following prepared the way for cyber-events. Recent cyber- events may be known to IT people Supervisory Control and Data Acquisition (SCADA) systems virus. SCADA malware uses The global financial and physical consequences of these vulnerabilities.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 774 The Comprehensive National Cybersecurity Initiative (CNCI) is an updated national cyber-securitystrategyforthe United States includes the following objectives: (1)Build a initial sentance of (Cyber) threats of today's immediate nature. (2) Full spectrum of threats. (3)Strengthen the future of the cyber-security environment. These goals alsounderlinetheComprehensive National Cybersecurity Initiative. . Paper work by the Department of Homeland Security suggests that cyber security, which transcends national boundaries, is a global problemrequiringglobal cooperation. No single group, nation, or agency can claim ownership. The report proposesa RoadmapforCybersecurity exploration.In recognition of the presidential directives cited above, the roadmap draws on the second revision of the IRC's Hard Problem List from 2005 to identify the eleven "hard problems" to be addressed by research and development. 3. Methodology Despite many changes since the first Symantec Internet Security Threat Report, this edition includes a lot of new information. It includes not only trends in the industry, but also focuses on threats from our research. There is a lot that goes into security, including attack, threat, and vulnerability. These terms are all closely related. One way an attack can be carried out is by exploiting a vulnerability in the system . For example, if you have a computer with outdated software, it could be vulnerable to viruses and other attacks. This is why it is important to regularly update your computers and anti-virus software. 3.1 Threats : Cybersecurity threats encompass a widerangeofpotentially illegal activities on the internet. Cybersecurity threats against utility assets have been recognized for decades, but with the rise of new cyber attacks over recent years commercial power distribution systems are also being targeted by criminal organizationsandforeigngovernments. These attacks can result in massive blackouts that could seriously affect economies andhealth.Theterrorist'sattacks so give the attention has been paid to the security of critical infrastructures. Computers that are not secure may lead to fatal disruptions, the exposure of private information, and fraud. Cyber threats result from the exploitation of cyber system vulnerabilities by users with unauthorized access. Some crimes target computer networks or services directly like malware, viruses, or denial of service attacks and Fraud, identity theft, phishing scams, cyberbullying,orothercrimes perpetuated by networks or devices thathavenoconnection with those networks or devices, cyberstalking. a. Cyber Theft: This is the most common cyber-attack committed in cyberspace. This one type offense is normally referred to as hacking in the generic sense. It involves using the internet to steal information or assets. It is also called illegal access, by using the malicious code to crack machines or network security beyond user knowledge or consent, for tampering with the complex data .Cyber thieves use methods such as plagiarism, hacking, piracy, espionage, DNS cache poisoning, and identity theft in order to gain access to your information. The Most of the security websites has described the various cyber threats b. Cyber Vandalism: When data is damaged or exploited rather than stolen or misused, then it is called cyber vandalism. It means the effect on network services is disrupted or stopped. This deprives the authorized users of accessing the information contained on the network. Cybercrime such as this can act as a time bomb, causing damage at a precise moment. These are very severe kinds of cybercrime: creating and distributing harmful software that damages computer systems, intentionally inserting malicious code, such as viruses, into a network for monitoring, following, disrupting, stopping, or performing any other action, without the permission of the owner of the network. C. Web Jacking: Web jacking is gaining access and controlling another website in order to gain control ofa web server, intrudrer may be chance control the data on the real space. d. Stealing cards information: cheating of credit or debit card information by stealing into the e-commerce server. e. Cyber Terrorism: Use of, or misuse of, the internet and misuse of this information to commit violence against civilians that is usually politically motivated f. Child Pornography: The act of creating, distributing, or accessing pornographic material sexually exploiting underage children through computer networks g. Cyber Contraband: sending of illegal items or information through the internet that is banned in some locations, like prohibited material. h. Spam: It includes the Violation of SPAM Act, through the unauthorized transmission of spam by transfer illegal product marketing or immoral content proliferation via emails i. Cyber Assault by Threat: The advantages of network such as electronic mails, multimedia objects , or phones for scare People who fear for their own life, the lives of their families, or the welfare of people for whom they are responsible . This is accomplished by blackmailing a person
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 775 until he is forced to transfer funds to an untraceable bank account through an online payment service. j.Denial of service: Defeating a denial of service attack or distributed denial of service attack by affecting the availability of the computer resource is known as a denial of service attack (DoS).Due to more requests than the computer can handle, the victim's computer crashes. DoS attacks may vary in their methods, motives, and targets, but they generally involve a person or people trying to halt the functioning of an Internet service or site, for a temporary or indefinite period of time. These are also known as email bombing if via used is email. E-bay, Yahoo, Amazon suffered from this attack 3.2 Attacks As a result of the effect on critical infrastructure and data, cyber-attacks are a huge problems in the world ,that needs to be addressed. The increase of technologyisattendAttacks and threats are difficult to identify, and prevention is not easy. the users are not confirm the new technology due to the frequent cyber-attacks less security of data. A cyber- attack is when someone gains or attempts to gain unauthorized access to a computer maliciously a. Untargeted attacks: non-targeted attacks in attackers indiscriminately target as users and services as possible. They notice the vulnerabilitiesoftheserviceornetwork. The attacker can take the advantage of technologies like Phishing: Phishing means fake people sending emails to several users and asking them for personal information like baking, credit card. They encourage the visits of fake websites and give good offers. The customers open the links on the electronic mails to enter their information, and so they remain unaware that the fraud has occurred. Water holing: A fake website ordummysitecanbepublished or a legitimate website can be compromised to obtain personal information from visitors. Ransomware: It is one type of malware, it can spread, disk encrypting extortion malware application. Scanning: Hacking a wide swath of the Internet at random b. Targeted attacks: Targeted attacks in attackers, attacks on the targeted users in the cyber world. Email-bornespear- phishing Sends links to malicious software and advertisements containing links for downloads to targeted individuals. Deploying a botnet. It delivers a DDOS (Distributed Denial of Service) attack Subverting the supply chain. To attack In general, attackers will first probe your systems for a possible vulnerability in the network or software being delivered to your organization. 3.3 Vulnerability Intruders are capable of executing commands, accessing unauthorized data, and/or striking denial-of-serviceattacks by exploiting vulnerabilities in systems or designs. Vulnerabilities can be found in a variety of areas in the systems. Weaknesses in the hardware or software of a system, weaknessesinpoliciesandproceduresadoptedinits implementation, and weaknesses within the system users themselves all contribute to system weaknesses. These weaknesses can be caused by hardware or softwarefailures, policies, and procedures employed by thesystem,andby the system's users. It is possible to find software vulnerabilities in operating systems, application software, and control software like communication protocols and device drives. Software design flaws are caused by a variety of factors, including human factors and software complexity.Technical vulnerabilities frequently occur due to human weaknesses. Complacency, negligence, and incompetenceall poserisksto systems, and ignoring them has severe consequences. In 2015, an unexpected number of vulnerabilities were identified as zero-day exploits that have been weaponized, and web attack exploit kits are adapting and evolving them more quickly than ever. As more devices are connected, vulnerabilities will be exploited 4. Results and Analysis Secure the System: There are basically three methods to secure the system from outside threats and attacks. Prevention: Security would be achieved by using a firewall, security software, and antivirus software for users. You are doing everything possible to keep the threat out. Detection: to be sure you detect when such failures happen. Every day update the infrastructure like security software and hardware. Reaction: Detect the failure has little value if you cannot respond. If anything it's happens so your security software warns. 4.1Preventing from Attack and Threats Recovering from Viruses, Worms, and Trojan Horses Avoiding Social Engineering and Networking Attacks Avoiding the Pitfalls of Online Trading Using Caution with USB Drives Securing Wireless Networks 4.2 Preventing from Email and communication Using Caution with Email Attachments
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 776 Reducing Spam Using Caution With Digital Signatures Using Instant Messaging and Chat Rooms Safely Staying safe on social Network Sites 4.3 Safe Browsing Evaluating Your Web Browser's Security Settings Shopping Safely Online Web Site Certificates Bluetooth Technology 5. Conclusion Researchers have found that users with computer literacy are the best defense against cyber attacks and it is most vulnerable which are identified in this research as new employees within an organization, as specified, with the attacker seeking personally noticeable data. From those engaged and Further supported in this research are the psychological variables that contribute to the user , network vulnerability. This paperconsummatethat,whiletechnology has a role to play in reducing the impact of cyber attacks, threat and vulnerability reside with human , impulses behavior and psychological predispositions that can be influenced through education. Despite efforts to reduce cyberattacks, there has yet to be a solution to overcome the threat of cybercrime. The future work of the cyber attack, threat and vulnerability reductioninthenetwork implement the cyber security model. REFERENCES 1. “Data Protection Using Random Number In Association With ASCII Values”,M.SureshKumar,G. Babu Rao, International Research Journal of Engineering and Technology (IRJET), Volume: 03, Issue: 06, June-2016. 2. Abomhara, Mohamed, and G. M. Kien. "Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks." Journal of Cyber Security 4 (2015): 65-88 3. “Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users" International Journal of Computer, Electrical, Automation, Control, and Information Engineering Vol:9, No:3, 2015 4. “Detection and Prevention of Passive Attacks in Network Security” ISSN: 2319-5967 ISO9001:2008 Certified International Journal of Engineering Science and Innovative Technology(IJESIT)Volume 2, Issue 6, November 2013 5. Al-Mohannadi, Hamad, et al. "Cyber-Attack Modeling Analysis Techniques: An Overview." Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. IEEE, 2016. 6. “Internet Security Threat Report Internet Report “VOLUME 21, APRIL 2016https://www.symantec.com/content/dam/sy mantec/docs/reports/istr-21-2016-en.pdf 7. Rowe, Dale C., Barry M. Lunt, and Joseph J. Ekstrom. "The role of cyber-security in information technology education." Proceedings of the 2011 conference on Information technology education.ACM, 2011 8. Razzaq, Abdul, et al. "Cyber security: Threats, reasons, challenges, methodologies, and stateofthe art solutions for industrial applications. “Autonomous Decentralized Systems(ISADS),2013 IEEE Eleventh International Symposium on. IEEE, 2013 9. . Byres, Eric, and Justin Lowe. "The myths and facts behind cyber security risks for industrial control systems." Proceedings of the VDE Kongress. Vol. 116. 2004 10. "Common Cyber Attacks: Reducing The Impact Gov.UK" https://www.gov.uk/...data/.../Common_Cyber_Atta cks-Reducing_The_Impact.pd 11. "CYBERSECURITY:CHALLENGESFROMASYSTEMS, COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE PERSPECTIVE” Issues in Information Systems Volume 16, Issue III, pp. 191- 198, 2015 12. Ahmad, Ateeq. "Type of Security Threats and Its Prevention." Int. J. Computer Technology & Applications, ISSN (2012): 2229-6093 13. Ten, Chee-Wooi, Chen-Ching Liu, and Govindarasu Manimaran. "Vulnerability assessment of cyber BIOGRAPHY Mr. B Satyanarayana Assistant Professor Dept of Computer Science, GITAM INSTITUTE OF SCIENCE GITAM (DEEMED TO BE UNIVERSITY), VISAKHAPATNAM
Download now