ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

LEVERAGING COMPUTER SCIENCE FOR ENHANCED CYBERSECURITY

Journal: International Journal of Advanced Research (Vol.11, No. 07)

Publication Date:

Authors : ;

Page : 1179-1182

Keywords : Information Technology Cyber-Attacks Cyber Security Emerging Trends Key Management;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Currently, the majority of international economic, commercial, cultural, social, and governmental contacts and activities—including those of people, non-governmental organizations, governments, and governmental institutions—are conducted online. Recently, cyberattacks and the risk of wireless communication technology have become issues for many commercial businesses and governmental institutions throughout the world. The modern society is heavily reliant on electronic technology, thus safeguarding this data from cyber-attacks is a difficult problem. The goal of cyberattacks is to financially hurt businesses. Cyberattacks may also serve military or political objectives in other circumstances. PC infections, knowledge gaps, data distribution services (DDS), and other attack vectors are a few examples of these harms. In order to protect harm from cyberattacks, numerous organizations employ a variety of measures. Researchers from all around the world have up till now offered a variety of techniques to stop cyberattacks or lessen the harm they inflict. Some of the approaches are now being used, while others are still being studied. The purpose of this study is to examine and thoroughly analyze the standard advancements made in the area of cyber security as well as to look into the difficulties, advantages, and disadvantages of the suggested approaches. The several new descendant assaults are discussed in depth. The history of early-generation cyber-security techniques are explored together with standard security frameworks. Additionally, new advancements in cyber security, security concerns, and dangers are discussed. It is anticipated that the thorough review study offered to researchers in IT and cyber security will be useful.

Last modified: 2023-09-06 21:20:53