Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities
Journal: Mehran University Research Journal of Engineering and Technology (Vol.37, No. 2)Publication Date: 2018-04-01
Authors : Jawad Hussain Awan Shazad Memon Sheeraz Memon Kamran Taj Pathan Niaz Hussain Arijo;
Page : 359-366
Keywords : Cyber Security; Cyber Crime; Internet; Threats;
Abstract
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
Other Latest Articles
- Effect of Nano-Ceria on Physiognomies of Aluminum-5% Zinc Sacrificial Anode
- Assurance due to the Usage of Two ERP Methods: Microsoft Dynamics AX and SAP
- Kinetic Study of Cotton Stalk and Rice Husk Samples under an Inert and Oxy Combustion Atmospheres
- QUALITY OF CYLINDRICAL SURFACES AT PROCESSING IN DRIVER MACHINE-TOOL ADAPTATIONS
- The (2n+1)^2-Point Scheme Based on Bivariate Quartic Polynomial
Last modified: 2018-03-25 17:08:54