Cyber Security: Terms, Laws, Threats and Protection

被引:1
|
作者
Jha, Manasi [1 ]
Anand, C. S. [1 ]
Mahawar, Yogesh [1 ]
Kalyan, Uday [1 ]
Verma, Vikas [1 ]
机构
[1] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara, Punjab, India
关键词
Cyber Crime; cyber security; cyber frauds; cyber space; cyber criminals; phishing; cyber stalking; protection; cyber law;
D O I
10.1109/ICCS54944.2021.00037
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Looking at the current scenario of 21st century, people have revolutionized their daily life and activities with the help of internet and digitalization. As the digital era is advancing and getting more digitalized, the cyber space is often targeted to attacks in an unethical way for illegal benefits. The sudden spike in cyber-attacks has led to creation of cyber rules and regulations. The cunningness and effective attack by attackers make it nearly impossible to trace back the attacker. In this paper, a rigorous review has been conducted on cyber-crime, fundamental terminologies used in cyber, related laws and guidelines to be more secure on cyber space.
引用
收藏
页码:148 / 151
页数:4
相关论文
共 50 条
  • [31] Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
    Presekal, Alfan
    Jorjani, Mohsen
    Rajkumar, Vetrivel Subramaniam
    Goyel, Himanshu
    Cibin, Nicola
    Semertzis, Ioannis
    Stefanov, Alexandru
    Palensky, Peter
    [J]. IEEE Access, 2024, 12 : 165756 - 165773
  • [32] Information security: threats and protection mechanisms
    Howard, A
    Paridaens, O
    Gamm, A
    [J]. ALCATEL TELECOMMUNICATIONS REVIEW, 2001, (02): : 117 - 121
  • [33] Android Mobile Security - Threats and Protection
    Mu, Jiayi
    Cui, Ailing
    Rao, Jingyu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 683 - 686
  • [34] A Survey on Cyber Security Threats and Challenges in Modern Society
    Sajal, Sayeed Z.
    Jahan, Israt
    Nygard, Kendall E.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2019, : 525 - 528
  • [35] Cyber Security Threats Detection Using Ensemble Architecture
    Chou, Te-Shun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (02): : 17 - 31
  • [36] Threats on the horizon: understanding security threats in the era of cyber-physical systems
    Walker-Roberts, Steven
    Hammoudeh, Mohammad
    Aldabbas, Omar
    Aydin, Mehmet
    Dehghantanha, Ali
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (04): : 2643 - 2664
  • [37] NEW THREATS TO THE NATIONAL SECURITY OF STATES - CYBER THREAT
    Stefanescu, Daniel-Cornel
    Papoi, Alina
    [J]. SCIENTIFIC JOURNAL OF SILESIAN UNIVERSITY OF TECHNOLOGY-SERIES TRANSPORT, 2020, 107 : 177 - 182
  • [38] Collaborative Detection of Cyber Security Threats in Big Data
    Zhang, Jiange
    Guo, Yuanbo
    Chen, Yue
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (02) : 186 - 193
  • [39] Threats on the horizon: understanding security threats in the era of cyber-physical systems
    Steven Walker-Roberts
    Mohammad Hammoudeh
    Omar Aldabbas
    Mehmet Aydin
    Ali Dehghantanha
    [J]. The Journal of Supercomputing, 2020, 76 : 2643 - 2664
  • [40] Cyber-Physical Systems: Security Threats and Countermeasures
    Hammoudeh, Mohammad
    Epiphaniou, Gregory
    Pinto, Pedro
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)