Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Cyber Security Attacks and Countermeasures

Author : Chayanika Sharma 1

Date of Publication :20th November 2017

Abstract: Internet usage is increasing exponentially and apps are expanding in our everyday lives. Whether it is for household purposes or for use by governmental organizations, Internet is important regardless of what the individual is or what job he does. It is also essential to have protection in applications such as shopping, banking transactions, education, public services etc. Internet is also considered to have insecurity problem with wider use. This insecurity issue includes various cyber-attacks occurring these days, such as fraudulent banking transactions known as phishing, HTML injections, SQL Injections etc. Cyber security is a major concern because the complexity of the security threat is increasingly and constantly growing. Controlling access, encrypting a file, detecting intrusion, etc. will overcome these issues. It could be hacked to encrypt information and then its sensitive information can be removed, only making sure that it is updated before someone actually knows about it. Researchers have provided with a range of defensive systems to prevent such attacks. The techniques used by cyber-attackers for carrying out attacks are currently synonymous with manipulating humans.

Reference :

    1. M. Sonntag, “Cyber security,” in IDIMT 2016 - Information Technology, Society and Economy Strategic Cross-Influences - 24th Interdisciplinary Information Management Talks, 2016, doi: 10.2478/hjbpa-2019-0020.
    2. K. K. R. Choo, “The cyber threat landscape: Challenges and future research directions,” Comput. Secur., 2011, doi: 10.1016/j.cose.2011.08.004.
    3. N. Ben-Asher and C. Gonzalez, “Effects of cyber security knowledge on attack detection,” Comput. Human Behav., 2015, doi: 10.1016/j.chb.2015.01.039.
    4. W. Wang and Z. Lu, “Cyber security in the Smart Grid: Survey and challenges,” Computer Networks. 2013, doi: 10.1016/j.comnet.2012.12.017
    5. S. Gupta, S. Vashisht, and D. Singh, “A CANVASS on cyber security attacks and countermeasures,” in 2016 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016, 2016, doi: 10.1109/ICICCS.2016.7542335.
    6. L. Zhang, S. Yu, D. Wu, and P. Watters, “A survey on latest botnet attack and defense,” in Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, 2011, doi: 10.1109/TrustCom.2011.11.
    7. B. B. Gupta, A. Tewari, A. K. Jain, and D. P. Agrawal, “Fighting against phishing attacks: state of the art and future challenges,” Neural Computing and Applications. 2017, doi: 10.1007/s00521- 016-2275-y
    8. A. M. Shabut, K. T. Lwin, and M. A. Hossain, “Cyber attacks, countermeasures, and protection schemes - A state of the art survey,” in SKIMA 2016 - 2016 10th International Conference on Software, Knowledge, Information Management and Applications, 2017, doi: 10.1109/SKIMA.2016.7916194.
    9. S. Purkait, “Phishing counter measures and their effectiveness - Literature review,” Information Management and Computer Security. 2012, doi: 10.1108/09685221211286548.
    10. K. N. SeviÅŸ and E. Seker, “Cyber warfare: Terms, issues, laws and controversies,” in 2016 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2016, 2016, doi: 10.1109/CyberSecPODS.2016.7502348.
    11. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud" , International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
    12. P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, "Investigations on Evolution of Strategies to Preserve Privacy of Moving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014
    13. Bishwajeet Pandey, Vishal Jain, Rashmi Sharma, Mragang Yadav, D M Akbar Hussain, “Scaling of Supply Voltage in Design of Energy Saver FIR Filter on 28nm FPGA”, International Journal of Control and Automation (IJCA), having ISSN No. 2005- 4297, Vol. 10, No. 12, December, 2017, page no. 77 to 88.
    14. Gaurav Verma, Harsh Agarwal, Shreya Singh, Shaheem Nighat Khinam, Prateek Kumar Gupta and Vishal Jain, “ Design and Implementation of Router for NOC on FPGA”, International Journal of Future Generation Communication and Networking (IJFGCN), Vol. 9, No. 12, December 2016 page no. 263 – 272 having ISSNo. 2233- 7857

Recent Article