ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Cyber-Security and Combatting Cyber-Attacks: A Study

Journal: Journal of excellence in Computer Science and Engineering (Vol.3, No. 2)

Publication Date:

Authors : ;

Page : 1-16

Keywords : Cyber-security; Cyber-attacks; Governmental organizations; Counter measures; Preventive techniques.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cyber-security has turned into a national objective and an administrative need. Expanded cyber-security will help ensure purchasers and organizations, guarantee the accessibility of basic frameworks on which our economy depends, and reinforce national security. In any case, cybersecurity endeavours must be precisely custom fitted, keeping in mind the end goal to protect security, freedom, advancement and the open way of the internet which emphasizes on the need for cybersecurity. To outline a successful and adjusted cyber-security technique, each piece of the nation‘s basic framework must be considered independently. Arrangements that might be proper for the control framework or budgetary systems may not be reasonable for securing people in general segments of the internet that constitute the very engineering with the expectation of complimentary discourse basic to our government. Arrangements toward government frameworks can be substantially more prescriptive than arrangement towards private frameworks. The attributes that have made the internet occupy a considerable space- its openness, its decentralized and client controlled nature, and its support for advancement and free expression – might pose considerable hazards if awkward approaches are established that apply consistently to all foundations. This study entails the various perspectives of cyber-security and suggestions for better protection against attacks and techniques which are to be followed by the governmental organizations as counter measures when it comes to cyber-security and cyber-attacks.

Last modified: 2018-02-16 14:48:23