Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Government Policies in Cyber Security

Author : Kiran Singh 1

Date of Publication :12th April 2018

Abstract: Cyber security alludes to the insurance of Internet-associated frameworks, for example, software, hardware just as information (data) from cyber-attacks. A cyber security guideline is required so as to ensure information technology alongside computer frameworks to constrain different associations just as organizations to ensure its information and systems from cyber attacks. A few cyber attacks are conceivable, for example, viruses, Trojan horses, DOS i.e. denial of services attacks, phishing, worms, illegal access (such as stealing confidential information or intellectual property) just as control system attacks. Right now, centreon significance of different models in the cyber defence, and the architecture of the cyber security system. It examine security threats, measures and attacks in cyber security. It at that point examine different standardization challenges in the cyber security. It additionally talk about cyber security national procedure to secure the cyberspace and furthermore different government policies in ensuring cyber security. At long last, it give a few proposals that are basic for cyber defence and cyber security.

Reference :

    1. HM Government, “National Cyber Security Strategy 2016-2021,” Natl. Cyber Secur. Strateg., 2016.
    2. J. Srinivas, A. K. Das, and N. Kumar, “Government regulations in cyber security: Framework, standards and recommendations,” Futur. Gener. Comput. Syst., 2019.
    3. H. Government, “2015 Information Security Breaches Survey,” Infosecurity, 2015.
    4. C. Leuprecht, D. B. Skillicorn, and V. E. Tait, “Beyond the Castle Model of cyber-risk and cyber-security,” Gov. Inf. Q., 2016.
    5. HM Government, “Cyber Security Breaches Survey 2018: Statistical Release,” Cyber Secur. Breaches Surv., 2018.
    6.  J. T. T. I. FORCE, “Security and privacy controls for federal information systems and organizations,” NIST Spec. Publ., 2013.
    7. M. E. O’connell, “Cyber security without Cyber war,” J. Confl. Secur. Law, 2012.
    8. B. Borgman, S. Mubarak, and K. K. R. Choo, “Cyber security readiness in the South Australian Government,” Computer Standards and Interfaces. 2015.

Recent Article