Analysis of techniques and attacking pattern in cyber security approach
A survey
Keywords:
cyber security, cyber attacks, cybercrimes, cyber solutionsAbstract
IT or Cybersecurity. It's the protection of computer systems and networks against data leakage, theft or damage to their hardware and software as well as service interruption or misdirection. Increasing reliance on computer systems, such as smart phones, televisions and the micro devices that make up the Internet of Things, has made this field increasingly vital. Data security has risen to the top of the to-do list in today's globe. Cybercrime is being tackled in a variety of ways by governments and corporations around the world. There is still a lot of anxiety about cyber security, despite several efforts. This Paper provides an Intensive survey of various cyber-attacks in India and their Countermeasures.
Downloads
References
https://www.statista.com/statistics/309435/india-cyber-crime-it-act/
Pintu Shah (SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India): https://www.emerald.com/insight/content/doi/10.1108/ICS-04-2019-0041/full/html
Suman Acharya, Sujata Joshi: Impact of Cyber-Attacks On Banking Institutions In India: A Study Of Safety Mechanisms And Preventive Measures --Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17(6). ISSN 1567-214x
Delhi Cyber Cell : http://www.cybercelldelhi.in/cheatingscams.html
Sam Cook: https://www.comparitech.com/blog/informati on-security/ddos-statistics-facts/#:~:text=Research%20shows%20that%20the%20average,2021%20metric%20of%209.15%20Gbps.
Portswigger: https://portswigger.net/web-security/sql-injection
FIREEYES: https://www.fireeye.com/current-threats/what-is-a-zero-day-exploit.html
purplesec: https://purplesec.us/prevent-cyber-attacks
A Sophos Article 04.12v1.dNA, eight trends changing network security by James Lyne.
Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole
Computer Security Practices in Non-Profit Organisations – A NetAction Report by Audrie Krause.
A Look back on Cyber Security 2012 by Luis corrons – Panda Labs.
International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 Page nos.68 – 71 ISSN 2229-5518, “Study of Cloud Computing in HealthCare Industry “ by G.Nikhita Reddy, G.J.Ugander Reddy
IEEE Security and Privacy Magazine – IEEECS “Safety Critical Systems – Next Generation “July/ Aug 2013.
CIO Asia, September 3rd , H1 2013: Cyber security in Malaysia by Avanthi Kumar.
https://encyclopedia.kaspersky.com/knowledge/vulner abilities-examples/
Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy, Paolo Prinetto and Gianluca Roascio, CEUR-WS.org/Vol-2597/paper16.pdf
2https://economictimes.indiatimes.com/definition/denial-of-service-attack
https://www.cloudflare.com/en-in/learning/ddos/whatis-a-ddos-attack/
Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, 24-31. doi:10.1016/S2212-5671(15)01077-
Cabaj, K., Kotulski, Z., Księżopolski, B., & Mazurczak, W. (2018). Cybersecurity: trends, issues, and challenges. EURASIP Journal on Information Security. doi:10.1186/s13635- 018-0080-0 127 Unauthentifiziert | Heruntergeladen 01.09.19 21:18 UTC HOLISTICA Vol 10, Issue 2, 2019
Dervojeda, K., Verzijl, D., Nagtegaal, Lengton, M., & Rouwmaat, E. (2014). Innovative Business Models: Supply chain finance. Netherlands: Business Innovation Observatory; European Union.
Gade, N. R., & Reddy, U. G. (2014). A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies. Retrieved from https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Ch allenges_And_Its_Emerging_Trends_On_Latest_Technologies
Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49–58. doi:10.1093/cybsec/tyw018
Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), pp. 175-186.
Kumar, S., & Somani, V. (2018). Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques. International Journal of Advance Research in Computer Science and Management, 4(4), pp. 125-129.
Panchanatham, D. N. (2015). A case study on Cyber Security in E-Governance. International Research Journal of Engineering and Technology.
Samuel, K. O., & Osman, W. R. (2014). Cyber Terrorism Attack of The Contemporary Information Technology Age: Issues, Consequences and Panacea. International Journal of Computer Science and Mobile Computing, 3(5), pp. 1082-1090.
Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its challenges to Society. International Journal of Scientific & Engineering Research, 3(6).
Sreenu, M., & Krishna, D. V. (2017). A General Study on Cyber-Attacks on Social Networks. IOSR Journal of Computer Engineering (IOSR-JCE), 19(5), pp. 01-04. [12] Sutton, D. (2017).
Cyber Security : A Practitioner’s Guide. Swindon, UK: BCS, the Chartered Institute for IT
[1]. Daniel, Schatz,; Julie, Wall, (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12
ISSN 1558-7215. Archived from the original on 28 December 2017. [2]. Rouse, Margaret. "Social engineering definition". Tech Target. Archived from the original on 5 January 2018. Retrieved 6 September 2015.
Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215.
"Reliance spells end of road for ICT amateurs", 7 May 2013, The Australian
Stevens, Tim. "Global Cyber security: New Directions in Theory and Methods". Politics and Governance. 6 (2). doi:10.17645 /pag.v6i2.1569.
"Computer Security and Mobile Security Challenges". researchgate.net. Archived from the original on 12 October 2016. Retrieved 4 August 2016.
"Distributed Denial of Service Attack". csa.gov.sg. Archived from the original on 6 August 2016. Retrieved 12 November 2014.
Wireless mouse leave billions at risk of computer hack: cyber security firm Archived 3 April 2016 at the Way back Machine.
"Multi-Vector Attacks Demand Multi-Vector Protection". MSSP Alert. July 24, 2018.
Millman, Renee (December 15, 2017). "New polymorphic malware evades three quarters of AV scanners". SC Magazine UK.
Turner, Rik (May 22, 2018). "Thinking about cyber-attacks in generations can help focus enterprise security plans". Informa PLC. Ovum.
"Identifying Phishing Attempts". Case. Archived from the original on 13 September 2015.
Arcos Sergio. "Social Engineering" (PDF). Archived (PDF) from the original on 3 December 2013.
Scannell, Kara (24 February 2016). "CEO email scam costs companies $2bn". Financial Times (25 Feb 2016). Archived from the original on 23 June 2016. Retrieved 7 May 2016.
"Bucks leak tax info of players, employees as result of email scam". Associated Press. 20 May 2016. Archived from the original on 20 May 2016. Retrieved 20 May 2016
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences
![Creative Commons License](http://i.creativecommons.org/l/by-nc-nd/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.