Cyber-Security and Combatting Cyber-Attacks: A Study
Journal: Journal of excellence in Computer Science and Engineering (Vol.3, No. 2)Publication Date: 2017-05-24
Authors : C Berin Jones;
Page : 1-16
Keywords : Cyber-security; Cyber-attacks; Governmental organizations; Counter measures; Preventive techniques.;
Abstract
Cyber-security has turned into a national objective and an administrative need. Expanded cyber-security will help ensure purchasers and organizations, guarantee the accessibility of basic frameworks on which our economy depends, and reinforce national security. In any case, cybersecurity endeavours must be precisely custom fitted, keeping in mind the end goal to protect security, freedom, advancement and the open way of the internet which emphasizes on the need for cybersecurity. To outline a successful and adjusted cyber-security technique, each piece of the nation‘s basic framework must be considered independently. Arrangements that might be proper for the control framework or budgetary systems may not be reasonable for securing people in general segments of the internet that constitute the very engineering with the expectation of complimentary discourse basic to our government. Arrangements toward government frameworks can be substantially more prescriptive than arrangement towards private frameworks. The attributes that have made the internet occupy a considerable space- its openness, its decentralized and client controlled nature, and its support for advancement and free expression – might pose considerable hazards if awkward approaches are established that apply consistently to all foundations. This study entails the various perspectives of cyber-security and suggestions for better protection against attacks and techniques which are to be followed by the governmental organizations as counter measures when it comes to cyber-security and cyber-attacks.
Other Latest Articles
- A Framework to accelerate Visibility Restoration of Degraded Videos through Guided Interpolated Filter
- Quality of Service Aware Code Dissemination in Wireless Sensor Networks
- Multi-Parameter Cardiac Remote Monitoring System based on Android
- A Review of Face Recognition Techniques
- Foreground Segmentation for Live Videos by Texture Features
Last modified: 2018-02-16 14:48:23