Advertisement

Cyber Security: A New Approach of Secure Data Through Attentiveness in Cyber Space

  • Kumar ParasuramanEmail author
  • A. Anbarasa Kumar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 33)

Abstract

Cyber Security assumes a critical job in the field of Information and Communication Technology [ICT]. Securing the information has become one of the greatest difficulties in the present day. When we consider cyber security, the main aspect that strikes in our mind is ‘cyber crimes’ which are expanding enormously day by day. Different Governments and organizations are taking numerous measures so as to keep these cyber crimes. Other than different measures cyber security is as yet a big concern to many. This paper for the most part centers around difficulties looked by cyber security on the most recent technologies. It also focuses around most recent about the cyber security methods, ethics and the trends changing the appearance of cyber security. Governments, military, associations, budgetary foundations, colleges and different organizations gather, process and store a great deal of private data on PCs and transmit that data over systems to various PCs. With the tenacious quick advancement of volume and enhancement of cyberattacks, incite attempts are required to anchor touchy business and individual data, and to anchor national security. The paper talk with respect to the idea of the internet and shows how the web is unbound to transmit the mystery and budgetary data. We demonstrate that hacking is as of now typical and dangerous for overall economy and security and exhibited the diverse techniques for Cyber attacks in India and around the globe.

Keywords

Cyber security Cybercrime Cyberspace Cyber attacks 

References

  1. 1.
    Aggarwal, P., Arora, P., Neha, Poonam: Review on cyber crime and security. IJREAS 02(01), 48–51 (2014)Google Scholar
  2. 2.
    Yassir, A., Nayak, S.: Cybercrime: a threat to network security. IJCSNS Int. J. Comput. Sci. Netw. Secur. 12(2), 84 (2012)Google Scholar
  3. 3.
    Tonge, A.M., Kasture, S.S., Chaudhari, S.R.: Cyber security: challenges for society-literature review. IOSR J. Comput. Eng. (IOSR-JCE) 12(2), 67–75 (2013)CrossRefGoogle Scholar
  4. 4.
    Catlett, C. (ed.): A scientific research and development approach to cyber security. Report submitted to the U.S. Department of Energy, December 2008Google Scholar
  5. 5.
    Rane, S.V., Choudhary, P.A.: Cyber crime and cyber law in India. Cyber Times Int. J. Technol. Manage. 5(2) (2012)Google Scholar
  6. 6.
    U.S. Department of Justice: Cyberstalking: a new challenge for law enforcement and ındustry — a report from the Attorney General to the Vice President. U.S. Department of Justice, Washington, D.C., pp. 2, 6, August 1999Google Scholar
  7. 7.
    Richards, J.: Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators, pp. 21–54. CRC Press, Boca Raton (1999)Google Scholar
  8. 8.
    Sharma, R.: Study of latest emerging trends on cyber security and its challenges to society. Int. J. Sci. Eng. Res. 3(6), 1 (2012). ISSN 2229-5518 IJSER © 2012Google Scholar
  9. 9.
    Saxena, P., Kotiyal, B., Goudar, R.H.: A cyber era approach for building awareness in cyber security for educational system in India. IACSIT Int. J. Inf. Educ. Technol. 2(2), 167 (2012)Google Scholar
  10. 10.
    Jaideep, G., Battula, B.P.: Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds. EURASIP J. Inf. Secur. 9 (2018).  https://doi.org/10.1186/s13635-018-0079-6
  11. 11.
    Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, pp. 5–19. Academic Press, London (2011)Google Scholar
  12. 12.
    Khonji, M., Iraqi, Y.: Phishing detection: a literature survey. IEEE Commun. Surv. Tutor. 15(4), 2091–2121 (2013)CrossRefGoogle Scholar
  13. 13.
    Dalla, Er.H.S., Geeta, Ms.: Cyber crime – a threat to persons, property, government and societies. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 997–1002 (2013)Google Scholar
  14. 14.
    Raiyn, J.: A survey of the cyber attack detection strategies. Int. J. Secur. Appl. 8(1), 247–256 (2014)Google Scholar
  15. 15.
    Kandpa, V., Singh, R.K.: Latest face of cyber crime and its prevention in India. Int. J. Basic Appl. Sci. 2(4), 150–156 (2013)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Centre for Information Technology and EngineeringManonmaniam Sundaranar UniversityTirunelveliIndia

Personalised recommendations