Date of Publication :14th February 2018
Abstract: Cyber security has been utilized equally for data security, where later considers the work of the human in the security procedure while previous think about this as an extra measurement and furthermore, center individual has a potential objective. Be that as it may, such talk on cyber security has significant difficulties as it centres on the moral part of the general public. To address the issue of cybersecurity, different systems and models have been created. It likewise presents the ideas of cyber security as far as its system, workforces and data identified with ensuring individual data in the PC.Cyber security estimated to provide the integration of information, security, stockpiling and move of information through electronic or different modesthere are different meanings of the idea of cyber security with fluctuated angles, for example, verified sharing, classified and access to data. This paper audits these models alongside their confinements and audit the past procedures used to relieve these dangers. Besides, the report likewise gives proposals to future research.
Reference :
-
- M. Sonntag, ‘Cyber security’, in IDIMT 2016 - Information Technology, Society and Economy Strategic Cross-Influences - 24th Interdisciplinary Information Management Talks, 2016.
- W. Chmielarz, Information technology project management. 2015.
- U. Franke and J. Brynielsson, ‘Cyber situational awareness - A systematic review of the literature’, Computers and Security. 2014.
- G. B. White, ‘A grassroots cyber security program to protect the nation’, in Proceedings of the Annual Hawaii International Conference on System Sciences, 2012.
- S. Parkinson, P. Ward, K. Wilson, and J. Miller, ‘Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges’, IEEE Trans. Intell. Transp. Syst., 2017.
- A. Sardeshmukh, S. Reddy, B. P. Gautham, and A. Joshi, ‘Bayesian networks for inverse inference in manufacturing Bayesian networks’, in Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017, 2017, vol. 2017-December, pp. 626–631.
- X. Zhang, Y. Li, R. Kotagiri, L. Wu, Z. Tari, and M. Cheriet, ‘KRNN: k Rare-class Nearest Neighbour classification’, Pattern Recognit., 2017.
- O. Sutton, ‘Introduction to k Nearest Neighbour Classification and Condensed Nearest Neighbour Data Reduction’, Introd. to k Nearest Neighb. Classif., 2012.
- C. W. Probst, J. Hunker, D. Gollmann, and M. Bishop, ‘Insider threats in cyber security’, Adv. Inf. Secur., 2010.
- A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, ‘Ensuring safety, security, and sustainability of mission-critical cyber-physical systems’, Proc. IEEE, 2012.
- Y. Zhou and X. Jiang, ‘Dissecting Android malware: Characterization and evolution’, in Proceedings - IEEE Symposium on Security and Privacy, 2012.
- S Balamurugan, RP Shermy, Gokul Kruba Shanker, VS Kumar, VM Prabhakaran, “An Object Oriented Perspective of Context–Aware Monitoring Strategies for Cloud based Healthcare Systems”,Asian Journal of Research in Social Sciences and Humanities, Volume : 6, Issue : 8, 2016
- S Balamurugan, P Anushree, S Adhiyaman, Gokul Kruba Shanker, VS Kumar, “RAIN Computing: Reliable and Adaptable Iot Network (RAIN) Computing”, Asian Journal of Research in Social Sciences and Humanities, Volume : 6, Issue : 8, 2016
- V.M. Prabhakaran, Prof S.Balamurgan ,A.Brindha ,S.Gayathri ,Dr.GokulKrubaShanker,Duruvakkumar V.S, “NGCC: Certain Investigations on Next Generation 2020 Cloud ComputingIssues, Challenges and Open Problems,” Australian Journal of Basic and Applied Sciences (2015)
- Usha Yadav, Gagandeep Singh Narula, Neelam Duhan, Vishal Jain, “Ontology Engineering and Development Aspects: A Survey”, International Journal of Education and Management Engineering (IJEME), Hongkong, Vol. 6, No. 3, May 2016, page no. 9 – 19 having ISSN No. 2305-3623.
- Vishal Assija, Anupam Baliyan and Vishal Jain, “Effective & Efficient Digital Advertisement Algorithms”, CSI-2015; 50th Golden Jubilee Annual Convention on “Digital Life”, held on 02nd to 05th December, 2015 at New Delhi, published by the Springer under ICT Based Innovations, Advances in Intelligent Systems and Computing having ISBN 978-981-10-6602-3 from page no. 83 to 91.
- Vishal Jain and Dr. S. V. A. V. Prasad, “Analysis of RDBMS and Semantic Web Search in University System”, International Journal of Engineering Sciences & Emerging Technologies (IJESET), Volume 7, Issue 2, October 2014, page no. 604-621 having ISSN No. 2231-6604.