Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

被引:5
|
作者
Awan, Jawad Hussain [1 ]
Memon, Shahzad [1 ]
Memon, Sheeraz [2 ]
Pathan, Kamran Taj [1 ]
Arijo, Niaz Hussain [1 ]
机构
[1] Univ Sindh, Inst Informat & Commun Technol, Jamshoro, Pakistan
[2] Mehran Univ Engn & Technol, Dept Comp Syst Engn, Jamshoro, Pakistan
关键词
Cyber Security; Cyber Crime; Internet; Threats;
D O I
10.22581/muet1982.1802.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, avast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [1] Turkish national cyber-firewall to mitigate countrywide cyber-attacks
    Sari, Arif
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 128 - 144
  • [2] Present Cyber Threat Management (Methodologies to mitigate evolving cyber-attacks)
    Mawudor, Bright Gameli
    [J]. 2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 115 - 121
  • [3] Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats
    Sadhukhan, Koustav
    Mallari, Rao Arvind
    Yadav, Tarun
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 170 - 178
  • [4] Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
    Tsiknas, Konstantinos
    Taketzis, Dimitrios
    Demertzis, Konstantinos
    Skianis, Charalabos
    [J]. IOT, 2021, 2 (01): : 163 - 186
  • [5] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [6] Research on Cyber Attacks and Defensive Measures of Power Communication Network
    Wu, Yingjun
    Ru, Yingtao
    Lin, Zhiwei
    Liu, Chengjun
    Xue, Tao
    Zhao, Xiang
    Chen, Jinfan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09): : 7613 - 7635
  • [7] Fighting Cyber Attacks with Sanctions: Digital Threats, Economic Responses
    Rusinova, Vera
    Martynova, Ekaterina
    [J]. ISRAEL LAW REVIEW, 2024, 57 (01) : 135 - 174
  • [8] Trust Issues That Create Threats for Cyber Attacks in Cloud Computing
    Khorshed, Md Tanzim
    Ali, A. B. M. Shawkat
    Wasimi, Saleh A.
    [J]. 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 900 - 905
  • [9] Potential cyber threats of adversarial attacks on autonomous driving models
    Boltachev, Eldar
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023,
  • [10] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    [J]. ELECTRONICS, 2023, 12 (06)