Cyber Security: Terms, Laws, Threats and Protection

被引:1
|
作者
Jha, Manasi [1 ]
Anand, C. S. [1 ]
Mahawar, Yogesh [1 ]
Kalyan, Uday [1 ]
Verma, Vikas [1 ]
机构
[1] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara, Punjab, India
关键词
Cyber Crime; cyber security; cyber frauds; cyber space; cyber criminals; phishing; cyber stalking; protection; cyber law;
D O I
10.1109/ICCS54944.2021.00037
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Looking at the current scenario of 21st century, people have revolutionized their daily life and activities with the help of internet and digitalization. As the digital era is advancing and getting more digitalized, the cyber space is often targeted to attacks in an unethical way for illegal benefits. The sudden spike in cyber-attacks has led to creation of cyber rules and regulations. The cunningness and effective attack by attackers make it nearly impossible to trace back the attacker. In this paper, a rigorous review has been conducted on cyber-crime, fundamental terminologies used in cyber, related laws and guidelines to be more secure on cyber space.
引用
收藏
页码:148 / 151
页数:4
相关论文
共 50 条
  • [1] Cyber security threats in industrial control systems and protection
    Marali, Mounesh
    Sudarsan, Sithu D.
    Gogioneni, Ashok
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATION ENGINEERING (ICACCE-2019), 2019,
  • [2] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    [J]. LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [3] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [4] Aviation and Cyber security threats
    Lehto, Martti
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [5] Cyber Crimes: Threats and Protection
    Mathew, Alex Roney
    Al Hajj, Aayad
    Al Ruqeishi, Khalil
    [J]. 2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 16 - 18
  • [6] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [7] Information security economics: cyber security threats
    Hojda, Mihaela Hortensia
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 584 - 592
  • [8] Aviation cyber security: legal aspects of cyber threats
    Klenka, Michal
    [J]. JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 177 - 195
  • [9] Aviation cyber security: legal aspects of cyber threats
    Michal Klenka
    [J]. Journal of Transportation Security, 2021, 14 : 177 - 195
  • [10] Categorising Cyber Security Threats for Standardisation
    Khan, Zubeida Casmod
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 189 - 196