SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1846
Cyber Security Challenges on Latest Technologies
Anusha Patil1, Dr. Samita K2
1Student Dept. Of MCA, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India
2Associate Professor, Dept. Of MCA, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Data innovation relies heavily on information
security, which plays a major role. Data security has become
possibly the most challenging issue in the modern world.
'Digital wrongdoings,' which are growing exponentiallyona
daily basis, always cometomindwhenpeoplethink ofdigital
security. There are a variety of measures being taken by
governments and organizations around the world to stop
these online crime. Network security is still a major concern
for many people, despite the implementation of many
solutions. It is the focus of this study to examine the most
current challenges to digital security. This article also
discusses some of the most recent developments innetwork
security, including new ethical standards and emerging
patterns.
Keywords: cyber security, cyber-crime, cyber ethics, social
media, cloud computing, android apps.
1. INTRODUCTION
Modern technology allows us to instantly transmit and
receive virtually any type of data, including audio and video
files. But, even if we can send and receive data via email,
sound, and video files, all with the press of a button, have we
ever considered how securely our data is transportedtoand
from the other party? The response lies in digital protection.
Today, the Internet isthefastest-growingstructureinour
daily lives. It's becoming increasingly common to see new
technological advancements reshaping the worldaround us.
Digital wrongdoings are on the rise every day because of
these new technologies, which make it impossible for us to
protect our private information in an efficient manner. High
levels of security are vital in today's environment, where
more than 60% of all commercial transactionsareconducted
online. Digital security has now become a major concern.
More than only data in the IT business is covered by digital
protection; it extends into other areas like the internet and
so on[4].
Even the most recent technological improvements, such
as cloud computing,flexible registration,E-commerce,online
banking, and so on, necessitate anincreasedlevel ofsecurity.
The security of these inventions has become a need due
to the fact that they contain sensitive data about an
individual. Every country's security and economic growth
depend on enhancingdigital securityandprotectingkeydata
foundations. Legislative and administrativegrowthdepends
on making the Web more secure (as well as protecting
Internet users). There has to be a more comprehensive and
secure approach to combatingdigital misconduct.Inorderto
prevent all misconduct, policing authorities must be able to
investigate and punish digital crimes in the real world. Many
countries and state-run institutions are imposing strict
regulations on digital protectionsinordertopreventtheloss
of crucial data. Each and every person must be prepared for
this digital security and protect themselves from these
increasing digital violations[4].
2.CYBER CRIME
The phrase "digital wrongdoing" refers to any criminal
activity in which the use of a PC is a primary means of
committing the crime or conducting a burglary. If a crime
can be proven using a computer, it is considered digital
wrongdoing by the US Division of Equity. It's becoming
increasingly common for PCs tobeusedtoperpetratecrimes
that were previously unimaginableduetohuman error,such
as disruptions to businesses and the spread of computer
viruses. However, PCs can also be used to perpetrate crimes
that were previously illegal but have now taken on new
dimensions due to the widespread use of PCs. "Digital
wrongdoing" describes crimes performed with a computer
and the internet to steal somebody's identity, sell stolen
property, find victims or disrupt activities with noxious
software as "digital wrongdoing." Every time a new
technological advancement is made, it brings with it an
increase in the importance of digital wrongdoing[2].
2. NETWORK SECURITY
Any association's main priority will alwaysbeprotecting
and securing its membership' personal data. As a result,
we're now living in a society where everything is stored
electronically. Long-distance informal communication
destinations allow consumers to cooperate with loved ones
in a secure setting. Digital thieves would then proceed to
target web-based entertainment venues in order to steal
private information from customers at home. Individuals
should accept all needed safety measures in person-to-
person conversation as well as during bank exchanges[2].
 98 percent of firms are maintaining or extending
their network security assets, and half of those are
doing so in order to better protect against cyber
predators in the next year.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1847
 The majority of companies are geared up to deal
with cyber attacks when they occur rather than if
they do.
 33% of respondents are confident that their data is
safe, but less confident about their colleagues'
efforts to keep it that way.
Despite the fact that there will be new approaches to
Android-based products, it won'tbea hugeundertaking.The
fact that tablets and PDAs share a similar functioning
foundation suggests that the same virus may soon identify
them as those phases of the device life cycle. Malware
samples for Macs are increasing, although at a far slower
rate than those for PCs. Microsoft's new operating system,
Windows 8, makes it feasible for users to write programmes
that operate on virtually any device running Windows 8
(PCs, tablets, and smart mobile phones). Digital security
experts expect a number of developments in the nearfuture.
4. TRENDS CHENGING CYBER SECURITY:
4.1 Web servers
Online applications are still vulnerabletoassaultsthataimto
delete data or spread malicious software. Web servers that
have been hacked by digital criminals are used to distribute
their malicious code. There is also a risk of information-
gathering attacks, the vast majority of which go undetected
in the media. Our current focus is on protecting web servers
and online applications, and we want it to be even more
prominent. These digital lawbreakers make excellent use of
web servers as a launching pad for their information heists.
In order to avoid becoming a victim of these scams, it is
necessary to use a more secure application at all times,
especially during large transactions.
4.2 Cloud registering and its administrations
Cloud-based services are progressively being used by all
types of businesses, from small to big. As a whole, the globe
is getting closer and closer to the mist. Traffic may easily
bypass conventional pointsofevaluationinthismostcurrent
pattern, making network securitya bigchallenge.Toprevent
the loss of crucial data, webapplicationstrategycontrolsand
cloud service controls must evolve as the number of cloud-
based services grows. Security concerns remain despite the
fact that cloud administrations are developing their own
models. However, it is important to keep in mind that as the
cloud expands, so does its security risk.
4.3 API's and designated assaults
API (Advanced Persistent Threat) is a completely new type
of digital criminality. Security measures like web filters and
intrusion prevention systems (IPS) have long relied on their
capacity to distinguish between predictable and
unpredictable assaults (generally later the underlying split
the difference). Network security should interact with other
security administrations to spot attacks as they become
bolder and use more questionable tactics. The only way to
keep up with current dangers is to keep improving our
security measures in the future.
4.4 Mobile Networks
We can now connect with anyone in the globe with current
technologies. Whatever the case may be, security is a huge
issue for these portable businesses. These days, people are
using a variety of gadgets includingtabletcomputers,mobile
phones, and computers that require additional security
measures that aren't included in the programmes they are
using, making firewalls and other security measures more
vulnerable. We should look about the security concerns that
these mobile enterprises face on a daily basis. In addition,
because mobile enterprises are so prone to these kinds of
digital crimes, extreme caution should be exercised in the
case of a security breach.
4.5 IPv6: New web convention
New Internet protocol, IPv6, is replacing IPv4 (the previous
version), which has been a backbone of our companies and
Internet in general for many decades.IPv6securityisn'tonly
a matter of bringing IPv4 capabilities over to IPv6. Although
IPv6 is a cost-effective way to increase the number of IP
addresses, there are a number of fundamental modifications
to the standard that should be considered in a security
policy. When practicable, it is best to use IPv6 whenever
possible to reduce the danger of cyber attacks.
4.6 Encryption of the code
A prevalent way to make communications (or data)
impenetrable to public scrutiny or programmers is through
the use of encryption. By utilizing an encryption
computation, the message or data is divided into a code text.
The message is encoded using an encryption key, which
specifies how it will be decoded. The confidentiality and
integrity of data are ensured by encryption from the earliest
possible point of reference. Increased use of encryption, on
the other hand, exacerbatestheproblemofnetwork security.
To protect information while it travels, such as over
networks (e.g. the Internet, e-commerce), cell phones
(remote receivers, remoteradios),etc.,encryptionisutilized.
As a result, by encoding the code, one is aware if any data
spills.
5.JOBOFSOCIALMEDIAINNETWORKPROTECTION
As people become more social in a more connected world,
organizations should search for new ways to protect
individual data. The role of social media in digital protection
is enormous, and it will have a significant impact on
individual digital risks. Risk of assault increases as the
popularity of web-based entertainmentatwork grows.Since
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1848
so many individuals regularly access online entertainment
and informal communication sites, it's become a great stage
for digital fraudsters to access private data and steal crucial
information. As we know it in the real world, we're fast to
hand over our personal details, so companiesneedtoensure
that they're just as quick to see risks, respond quickly, and
avoid a breach of any kind. The programmers utilize these
virtual entertainments as a trap to get the data and
information they need since people are effectively attracted
in by them.
In order to avoid a lack of data, individuals need take
adequate precautions, especially whenitcomestomanaging
virtual entertainment.
Virtual entertainment offers companies with a unique set of
challenges since it requires individuals to be able to
exchange data with a large group of people. Additionally,
internet entertainment provides a comparable potential to
distribute fake data, which may be just as damaging as
industrially sensitive information might be. The
transmission of misleading info through online
entertainment is one of the new threats highlighted in the
2013 Global Risks report.
No matter how it can be used to commit digital crimes,
internet entertainment is a vital aspect of how an
organization is revealed, thus these companies can stop
using it. A mechanism that alerts them to a problem before
any real harm is done should be in place, barring any
unforeseen circumstances. It is critical for businesses to
realise this and recognise the necessity of analyzing data,
especially in amicable interactions, and to implement
necessary measurestominimizerisks.Virtual entertainment
should be approached in a certain way and with the proper
technological improvements in mind.
6. CYBER SECURITY TECHNIQUES
6.1 Access control and secret phrase security
Client names and secret phrases have been an important
part of our approach to data security. This might be one of
the early stages in the development of data security.
6.2 Authentication of information
In order to ensure that the reports we get are accurate, they
should be reviewed for modifications before they are
received from a reputable and dependable source. The anti-
infection software on the devices is usually able to verify
these reports. Similarly, anti-infection software is required
to protect against infection on the devices.
6.3 Malware scanners
All files and archives on the system are examined for
malicious code or destructive infections in the vast majority
of cases. "Malware" refers to programmes like worms and
Trojan horses that infect computers and areusuallyreferred
to as.
6.4 Firewalls
A firewall is software or hardware that prevents hackers,
viruses, and worms from gaining access to your computer
over the Internet. There is a firewall in place that examines
each communication and blocks those that don't adhere to
the specified security models before entering or leaving the
web. As a consequence, firewalls are critical for detecting
malicious code.
6.5 Anti-infection programming
One of the most important functions of a computer's
operating system is the ability to detect and eliminate
malicious code, such as worms and viruses. Theauto-update
feature in most antivirus packages allows the software to
download updated infection profiles so that it can scan for
new viruses as they are discovered. Each framework must
have an anti-infection programme in order to work
effectively.
7. CYBER ETHICS
The web's code is all there is to digital morals. If we follow
certain computer ethics, we can utilize the internet in a
legitimate and secure way. A few instances are given below:
 Use the Internet to stay in touch with friends and
family. To stay in touch with loved ones, coworkers,
and people all over the world by email or SMS is
easier than ever before thanks to modern
technology.
 On the internet, try not to be a domineering jerk. It
is against the law to insult others by calling them by
their names, lying about them, or sending them
humiliating images.
 As the world's largest repository of information on
practically any subject or field of study, the Internet
must be used in a legal and ethical manner.
 Try not to use passwords from other people's
accounts to access your own.
 Do not attempt to communicate malware to other
frameworks in order to cause them to fail.
 There is a good chance that someone else may take
advantage of your personal information, which
might land you in a sticky scenario.
 When you're online, never pretend to be someone
else or try to create a false identity for someoneelse
since it might get you both into trouble.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1849
 Maintain a strict adherence to protected data and
only download games or recordings if the cost is
reasonable.
The following are a few digital values that everybody must
adhere to when using the web. From the outset, we've held
ourselves to the same high standards that we do on the
internet.
7. CONCLUSION
As the world gets more interconnected and networks are
utilized to conduct everyday transactions, PC security has
grown to be a major problem. Each New Year brings new
avenues for cyber criminals, and as a result, so does the
protection of data. The most recent and problematic
developments, together with the new digital gadgets and
dangers that emerge evident every day, are trying
associations in terms of how they protect their foundation,
yet the manner in which they demand new stages and
expertise to do so is testing as such.. There is no one-size-
fits-all solution to digital violations, but we should do our
best to limit them in order to ensure a future free of possible
harm on the internet.
REFERENCES
1. A Sophos Article 04.12v1.dNA, eight trends changing
network security by James Lyne.
2. Cyber Security: Understanding Cyber Crimes- Sunit
Belapure Nina Godbole
3. Computer Security Practices in Non ProfitOrganisations –
A NetAction Report by Audrie Krause.
4. A Look back on Cyber Security 2012 by Luis corrons –
Panda Labs.
5. International Journal of Scientific & EngineeringResearch,
Volume 4, Issue 9, September-2013 Page nos.68 – 71 ISSN
2229-5518, “Study of Cloud Computing in HealthCare
Industry “ by G.Nikhita Reddy, G.J.Ugander Reddy.
6. IEEE Security and Privacy Magazine – IEEECS “Safety
Critical Systems – Next Generation “July/ Aug 2013.
7. CIO Asia, September 3rd , H1 2013: Cyber security in
malasia by Avanthi Kumar.

More Related Content

Similar to Cyber Security Challenges on Latest Technologies

Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020TestingXperts
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation PortalIRJET Journal
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 

Similar to Cyber Security Challenges on Latest Technologies (20)

Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation Portal
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Cyber Security Challenges on Latest Technologies

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1846 Cyber Security Challenges on Latest Technologies Anusha Patil1, Dr. Samita K2 1Student Dept. Of MCA, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India 2Associate Professor, Dept. Of MCA, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Data innovation relies heavily on information security, which plays a major role. Data security has become possibly the most challenging issue in the modern world. 'Digital wrongdoings,' which are growing exponentiallyona daily basis, always cometomindwhenpeoplethink ofdigital security. There are a variety of measures being taken by governments and organizations around the world to stop these online crime. Network security is still a major concern for many people, despite the implementation of many solutions. It is the focus of this study to examine the most current challenges to digital security. This article also discusses some of the most recent developments innetwork security, including new ethical standards and emerging patterns. Keywords: cyber security, cyber-crime, cyber ethics, social media, cloud computing, android apps. 1. INTRODUCTION Modern technology allows us to instantly transmit and receive virtually any type of data, including audio and video files. But, even if we can send and receive data via email, sound, and video files, all with the press of a button, have we ever considered how securely our data is transportedtoand from the other party? The response lies in digital protection. Today, the Internet isthefastest-growingstructureinour daily lives. It's becoming increasingly common to see new technological advancements reshaping the worldaround us. Digital wrongdoings are on the rise every day because of these new technologies, which make it impossible for us to protect our private information in an efficient manner. High levels of security are vital in today's environment, where more than 60% of all commercial transactionsareconducted online. Digital security has now become a major concern. More than only data in the IT business is covered by digital protection; it extends into other areas like the internet and so on[4]. Even the most recent technological improvements, such as cloud computing,flexible registration,E-commerce,online banking, and so on, necessitate anincreasedlevel ofsecurity. The security of these inventions has become a need due to the fact that they contain sensitive data about an individual. Every country's security and economic growth depend on enhancingdigital securityandprotectingkeydata foundations. Legislative and administrativegrowthdepends on making the Web more secure (as well as protecting Internet users). There has to be a more comprehensive and secure approach to combatingdigital misconduct.Inorderto prevent all misconduct, policing authorities must be able to investigate and punish digital crimes in the real world. Many countries and state-run institutions are imposing strict regulations on digital protectionsinordertopreventtheloss of crucial data. Each and every person must be prepared for this digital security and protect themselves from these increasing digital violations[4]. 2.CYBER CRIME The phrase "digital wrongdoing" refers to any criminal activity in which the use of a PC is a primary means of committing the crime or conducting a burglary. If a crime can be proven using a computer, it is considered digital wrongdoing by the US Division of Equity. It's becoming increasingly common for PCs tobeusedtoperpetratecrimes that were previously unimaginableduetohuman error,such as disruptions to businesses and the spread of computer viruses. However, PCs can also be used to perpetrate crimes that were previously illegal but have now taken on new dimensions due to the widespread use of PCs. "Digital wrongdoing" describes crimes performed with a computer and the internet to steal somebody's identity, sell stolen property, find victims or disrupt activities with noxious software as "digital wrongdoing." Every time a new technological advancement is made, it brings with it an increase in the importance of digital wrongdoing[2]. 2. NETWORK SECURITY Any association's main priority will alwaysbeprotecting and securing its membership' personal data. As a result, we're now living in a society where everything is stored electronically. Long-distance informal communication destinations allow consumers to cooperate with loved ones in a secure setting. Digital thieves would then proceed to target web-based entertainment venues in order to steal private information from customers at home. Individuals should accept all needed safety measures in person-to- person conversation as well as during bank exchanges[2].  98 percent of firms are maintaining or extending their network security assets, and half of those are doing so in order to better protect against cyber predators in the next year.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1847  The majority of companies are geared up to deal with cyber attacks when they occur rather than if they do.  33% of respondents are confident that their data is safe, but less confident about their colleagues' efforts to keep it that way. Despite the fact that there will be new approaches to Android-based products, it won'tbea hugeundertaking.The fact that tablets and PDAs share a similar functioning foundation suggests that the same virus may soon identify them as those phases of the device life cycle. Malware samples for Macs are increasing, although at a far slower rate than those for PCs. Microsoft's new operating system, Windows 8, makes it feasible for users to write programmes that operate on virtually any device running Windows 8 (PCs, tablets, and smart mobile phones). Digital security experts expect a number of developments in the nearfuture. 4. TRENDS CHENGING CYBER SECURITY: 4.1 Web servers Online applications are still vulnerabletoassaultsthataimto delete data or spread malicious software. Web servers that have been hacked by digital criminals are used to distribute their malicious code. There is also a risk of information- gathering attacks, the vast majority of which go undetected in the media. Our current focus is on protecting web servers and online applications, and we want it to be even more prominent. These digital lawbreakers make excellent use of web servers as a launching pad for their information heists. In order to avoid becoming a victim of these scams, it is necessary to use a more secure application at all times, especially during large transactions. 4.2 Cloud registering and its administrations Cloud-based services are progressively being used by all types of businesses, from small to big. As a whole, the globe is getting closer and closer to the mist. Traffic may easily bypass conventional pointsofevaluationinthismostcurrent pattern, making network securitya bigchallenge.Toprevent the loss of crucial data, webapplicationstrategycontrolsand cloud service controls must evolve as the number of cloud- based services grows. Security concerns remain despite the fact that cloud administrations are developing their own models. However, it is important to keep in mind that as the cloud expands, so does its security risk. 4.3 API's and designated assaults API (Advanced Persistent Threat) is a completely new type of digital criminality. Security measures like web filters and intrusion prevention systems (IPS) have long relied on their capacity to distinguish between predictable and unpredictable assaults (generally later the underlying split the difference). Network security should interact with other security administrations to spot attacks as they become bolder and use more questionable tactics. The only way to keep up with current dangers is to keep improving our security measures in the future. 4.4 Mobile Networks We can now connect with anyone in the globe with current technologies. Whatever the case may be, security is a huge issue for these portable businesses. These days, people are using a variety of gadgets includingtabletcomputers,mobile phones, and computers that require additional security measures that aren't included in the programmes they are using, making firewalls and other security measures more vulnerable. We should look about the security concerns that these mobile enterprises face on a daily basis. In addition, because mobile enterprises are so prone to these kinds of digital crimes, extreme caution should be exercised in the case of a security breach. 4.5 IPv6: New web convention New Internet protocol, IPv6, is replacing IPv4 (the previous version), which has been a backbone of our companies and Internet in general for many decades.IPv6securityisn'tonly a matter of bringing IPv4 capabilities over to IPv6. Although IPv6 is a cost-effective way to increase the number of IP addresses, there are a number of fundamental modifications to the standard that should be considered in a security policy. When practicable, it is best to use IPv6 whenever possible to reduce the danger of cyber attacks. 4.6 Encryption of the code A prevalent way to make communications (or data) impenetrable to public scrutiny or programmers is through the use of encryption. By utilizing an encryption computation, the message or data is divided into a code text. The message is encoded using an encryption key, which specifies how it will be decoded. The confidentiality and integrity of data are ensured by encryption from the earliest possible point of reference. Increased use of encryption, on the other hand, exacerbatestheproblemofnetwork security. To protect information while it travels, such as over networks (e.g. the Internet, e-commerce), cell phones (remote receivers, remoteradios),etc.,encryptionisutilized. As a result, by encoding the code, one is aware if any data spills. 5.JOBOFSOCIALMEDIAINNETWORKPROTECTION As people become more social in a more connected world, organizations should search for new ways to protect individual data. The role of social media in digital protection is enormous, and it will have a significant impact on individual digital risks. Risk of assault increases as the popularity of web-based entertainmentatwork grows.Since
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1848 so many individuals regularly access online entertainment and informal communication sites, it's become a great stage for digital fraudsters to access private data and steal crucial information. As we know it in the real world, we're fast to hand over our personal details, so companiesneedtoensure that they're just as quick to see risks, respond quickly, and avoid a breach of any kind. The programmers utilize these virtual entertainments as a trap to get the data and information they need since people are effectively attracted in by them. In order to avoid a lack of data, individuals need take adequate precautions, especially whenitcomestomanaging virtual entertainment. Virtual entertainment offers companies with a unique set of challenges since it requires individuals to be able to exchange data with a large group of people. Additionally, internet entertainment provides a comparable potential to distribute fake data, which may be just as damaging as industrially sensitive information might be. The transmission of misleading info through online entertainment is one of the new threats highlighted in the 2013 Global Risks report. No matter how it can be used to commit digital crimes, internet entertainment is a vital aspect of how an organization is revealed, thus these companies can stop using it. A mechanism that alerts them to a problem before any real harm is done should be in place, barring any unforeseen circumstances. It is critical for businesses to realise this and recognise the necessity of analyzing data, especially in amicable interactions, and to implement necessary measurestominimizerisks.Virtual entertainment should be approached in a certain way and with the proper technological improvements in mind. 6. CYBER SECURITY TECHNIQUES 6.1 Access control and secret phrase security Client names and secret phrases have been an important part of our approach to data security. This might be one of the early stages in the development of data security. 6.2 Authentication of information In order to ensure that the reports we get are accurate, they should be reviewed for modifications before they are received from a reputable and dependable source. The anti- infection software on the devices is usually able to verify these reports. Similarly, anti-infection software is required to protect against infection on the devices. 6.3 Malware scanners All files and archives on the system are examined for malicious code or destructive infections in the vast majority of cases. "Malware" refers to programmes like worms and Trojan horses that infect computers and areusuallyreferred to as. 6.4 Firewalls A firewall is software or hardware that prevents hackers, viruses, and worms from gaining access to your computer over the Internet. There is a firewall in place that examines each communication and blocks those that don't adhere to the specified security models before entering or leaving the web. As a consequence, firewalls are critical for detecting malicious code. 6.5 Anti-infection programming One of the most important functions of a computer's operating system is the ability to detect and eliminate malicious code, such as worms and viruses. Theauto-update feature in most antivirus packages allows the software to download updated infection profiles so that it can scan for new viruses as they are discovered. Each framework must have an anti-infection programme in order to work effectively. 7. CYBER ETHICS The web's code is all there is to digital morals. If we follow certain computer ethics, we can utilize the internet in a legitimate and secure way. A few instances are given below:  Use the Internet to stay in touch with friends and family. To stay in touch with loved ones, coworkers, and people all over the world by email or SMS is easier than ever before thanks to modern technology.  On the internet, try not to be a domineering jerk. It is against the law to insult others by calling them by their names, lying about them, or sending them humiliating images.  As the world's largest repository of information on practically any subject or field of study, the Internet must be used in a legal and ethical manner.  Try not to use passwords from other people's accounts to access your own.  Do not attempt to communicate malware to other frameworks in order to cause them to fail.  There is a good chance that someone else may take advantage of your personal information, which might land you in a sticky scenario.  When you're online, never pretend to be someone else or try to create a false identity for someoneelse since it might get you both into trouble.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1849  Maintain a strict adherence to protected data and only download games or recordings if the cost is reasonable. The following are a few digital values that everybody must adhere to when using the web. From the outset, we've held ourselves to the same high standards that we do on the internet. 7. CONCLUSION As the world gets more interconnected and networks are utilized to conduct everyday transactions, PC security has grown to be a major problem. Each New Year brings new avenues for cyber criminals, and as a result, so does the protection of data. The most recent and problematic developments, together with the new digital gadgets and dangers that emerge evident every day, are trying associations in terms of how they protect their foundation, yet the manner in which they demand new stages and expertise to do so is testing as such.. There is no one-size- fits-all solution to digital violations, but we should do our best to limit them in order to ensure a future free of possible harm on the internet. REFERENCES 1. A Sophos Article 04.12v1.dNA, eight trends changing network security by James Lyne. 2. Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole 3. Computer Security Practices in Non ProfitOrganisations – A NetAction Report by Audrie Krause. 4. A Look back on Cyber Security 2012 by Luis corrons – Panda Labs. 5. International Journal of Scientific & EngineeringResearch, Volume 4, Issue 9, September-2013 Page nos.68 – 71 ISSN 2229-5518, “Study of Cloud Computing in HealthCare Industry “ by G.Nikhita Reddy, G.J.Ugander Reddy. 6. IEEE Security and Privacy Magazine – IEEECS “Safety Critical Systems – Next Generation “July/ Aug 2013. 7. CIO Asia, September 3rd , H1 2013: Cyber security in malasia by Avanthi Kumar.