Analysis of techniques and attacking pattern in cyber security approach

A survey

https://doi.org/10.53730/ijhs.v6nS2.8625

Authors

  • Aman Sharma Department of Computer Science and Information Technology, KIET Group of Institutions, Delhi-NCR, Muradnagar, India
  • Anushka Tyagi Department of Computer Science and Information Technology, KIET Group of Institutions, Delhi-NCR, Muradnagar, India
  • Manish Bhardwaj Department of Computer Science and Engineering, KIET Group of Institutions, Delhi-NCR, Muradnagar, India

Keywords:

cyber security, cyber attacks, cybercrimes, cyber solutions

Abstract

IT or Cybersecurity. It's the protection of computer systems and networks against data leakage, theft or damage to their hardware and software as well as service interruption or misdirection. Increasing reliance on computer systems, such as smart phones, televisions and the micro devices that make up the Internet of Things, has made this field increasingly vital. Data security has risen to the top of the to-do list in today's globe. Cybercrime is being tackled in a variety of ways by governments and corporations around the world. There is still a lot of anxiety about cyber security, despite several efforts. This Paper provides an Intensive survey of various cyber-attacks in India and their Countermeasures.

Downloads

Download data is not yet available.

References

Statista:https://www.statista.com/statistics/249562/number-of-worldwide-internet-users-by-region/#:~:text=In%202021%2C%20East%20Asia%20accounted,Southern%20Asia%20with%20951.11%20million

https://www.statista.com/statistics/309435/india-cyber-crime-it-act/

Pintu Shah (SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, India): https://www.emerald.com/insight/content/doi/10.1108/ICS-04-2019-0041/full/html

Suman Acharya, Sujata Joshi: Impact of Cyber-Attacks On Banking Institutions In India: A Study Of Safety Mechanisms And Preventive Measures --Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17(6). ISSN 1567-214x

The HINDU: https://www.thehindu.com/business/cyberattacks-hit-26000-indian-sites-in-10-months/article37796297.ece

News 18: https://www.news18.com/news/india/83-organisations-in-india-reported-rise-in-phishing-attacks-during-covid-report-4224860.html

Delhi Cyber Cell : http://www.cybercelldelhi.in/cheatingscams.html

The Mint : https://www.livemint.com/news/india/83-organizations-in-india-saw-rise-in-phishing-attacks-during-pandemic-11632119876206.html

Sam Cook: https://www.comparitech.com/blog/informati on-security/ddos-statistics-facts/#:~:text=Research%20shows%20that%20the%20average,2021%20metric%20of%209.15%20Gbps.

Portswigger: https://portswigger.net/web-security/sql-injection

FIREEYES: https://www.fireeye.com/current-threats/what-is-a-zero-day-exploit.html

purplesec: https://purplesec.us/prevent-cyber-attacks

A Sophos Article 04.12v1.dNA, eight trends changing network security by James Lyne.

Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole

Computer Security Practices in Non-Profit Organisations – A NetAction Report by Audrie Krause.

A Look back on Cyber Security 2012 by Luis corrons – Panda Labs.

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 Page nos.68 – 71 ISSN 2229-5518, “Study of Cloud Computing in HealthCare Industry “ by G.Nikhita Reddy, G.J.Ugander Reddy

IEEE Security and Privacy Magazine – IEEECS “Safety Critical Systems – Next Generation “July/ Aug 2013.

CIO Asia, September 3rd , H1 2013: Cyber security in Malaysia by Avanthi Kumar.

https://encyclopedia.kaspersky.com/knowledge/vulner abilities-examples/

Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy, Paolo Prinetto and Gianluca Roascio, CEUR-WS.org/Vol-2597/paper16.pdf

2https://economictimes.indiatimes.com/definition/denial-of-service-attack

https://www.cloudflare.com/en-in/learning/ddos/whatis-a-ddos-attack/

Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, 24-31. doi:10.1016/S2212-5671(15)01077-

Cabaj, K., Kotulski, Z., Księżopolski, B., & Mazurczak, W. (2018). Cybersecurity: trends, issues, and challenges. EURASIP Journal on Information Security. doi:10.1186/s13635- 018-0080-0 127 Unauthentifiziert | Heruntergeladen 01.09.19 21:18 UTC HOLISTICA Vol 10, Issue 2, 2019

Dervojeda, K., Verzijl, D., Nagtegaal, Lengton, M., & Rouwmaat, E. (2014). Innovative Business Models: Supply chain finance. Netherlands: Business Innovation Observatory; European Union.

Gade, N. R., & Reddy, U. G. (2014). A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies. Retrieved from https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Ch allenges_And_Its_Emerging_Trends_On_Latest_Technologies

Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49–58. doi:10.1093/cybsec/tyw018

Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), pp. 175-186.

Kumar, S., & Somani, V. (2018). Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques. International Journal of Advance Research in Computer Science and Management, 4(4), pp. 125-129.

Panchanatham, D. N. (2015). A case study on Cyber Security in E-Governance. International Research Journal of Engineering and Technology.

Samuel, K. O., & Osman, W. R. (2014). Cyber Terrorism Attack of The Contemporary Information Technology Age: Issues, Consequences and Panacea. International Journal of Computer Science and Mobile Computing, 3(5), pp. 1082-1090.

Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its challenges to Society. International Journal of Scientific & Engineering Research, 3(6).

Sreenu, M., & Krishna, D. V. (2017). A General Study on Cyber-Attacks on Social Networks. IOSR Journal of Computer Engineering (IOSR-JCE), 19(5), pp. 01-04. [12] Sutton, D. (2017).

Cyber Security : A Practitioner’s Guide. Swindon, UK: BCS, the Chartered Institute for IT

[1]. Daniel, Schatz,; Julie, Wall, (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12

ISSN 1558-7215. Archived from the original on 28 December 2017. [2]. Rouse, Margaret. "Social engineering definition". Tech Target. Archived from the original on 5 January 2018. Retrieved 6 September 2015.

Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215.

"Reliance spells end of road for ICT amateurs", 7 May 2013, The Australian

Stevens, Tim. "Global Cyber security: New Directions in Theory and Methods". Politics and Governance. 6 (2). doi:10.17645 /pag.v6i2.1569.

"Computer Security and Mobile Security Challenges". researchgate.net. Archived from the original on 12 October 2016. Retrieved 4 August 2016.

"Distributed Denial of Service Attack". csa.gov.sg. Archived from the original on 6 August 2016. Retrieved 12 November 2014.

Wireless mouse leave billions at risk of computer hack: cyber security firm Archived 3 April 2016 at the Way back Machine.

"Multi-Vector Attacks Demand Multi-Vector Protection". MSSP Alert. July 24, 2018.

Millman, Renee (December 15, 2017). "New polymorphic malware evades three quarters of AV scanners". SC Magazine UK.

Turner, Rik (May 22, 2018). "Thinking about cyber-attacks in generations can help focus enterprise security plans". Informa PLC. Ovum.

"Identifying Phishing Attempts". Case. Archived from the original on 13 September 2015.

Arcos Sergio. "Social Engineering" (PDF). Archived (PDF) from the original on 3 December 2013.

Scannell, Kara (24 February 2016). "CEO email scam costs companies $2bn". Financial Times (25 Feb 2016). Archived from the original on 23 June 2016. Retrieved 7 May 2016.

"Bucks leak tax info of players, employees as result of email scam". Associated Press. 20 May 2016. Archived from the original on 20 May 2016. Retrieved 20 May 2016

Published

08-06-2022

How to Cite

Sharma, A., Tyagi, A., & Bhardwaj, M. (2022). Analysis of techniques and attacking pattern in cyber security approach: A survey. International Journal of Health Sciences, 6(S2), 13779–13798. https://doi.org/10.53730/ijhs.v6nS2.8625

Issue

Section

Peer Review Articles