DOI QR코드

DOI QR Code

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra (Information Technology and Business Management, Symbiosis Centre for Information Technology) ;
  • Raghav Sandhane (Information Technology and Business Management, Symbiosis Centre for Information Technology)
  • 투고 : 2024.06.05
  • 발행 : 2024.06.30

초록

Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

키워드

참고문헌

  1. International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012 1 ISSN 2229-5518 Study of Latest Emerging Trends on Cyber Security and its challenges to Society by Ravi Sharma. 
  2. Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole 
  3. A Look back on Cyber Security 2012 by Luis corrons - Panda Labs. 
  4. (IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 04, 2016 | ISSN (online): 2321-0613)-cyber ethics 
  5. (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 7, Issue 4, April 2018, ISSN: 2278 - 1323) ANALYSIS ON CHALLENGES AND THREATS IN CYBER SECURITY) 
  6. (Integrating cost-benefit analysis into the NIST Cybersecurity Framework via the Gordon-Loeb Model) NIST framework 
  7. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 - 8958, Volume-9 Issue-1, October 2019-Alex. R. Mathew (Cyber security through block chain) 
  8. Iansiti, Marco, and Karim R. Lakhani. "The truth about block chain." Harvard Business Review 95.1 (2017): pp. 118-127. 
  9. Ashton, K. (2009). That 'Internet of Things' thing. RFID Journal,22, 97-114 
  10. Cyber ethics 4.0 serving humanity with values by Christoph Stuckelberger / Pavan Duggal (Eds.) 
  11. Barton, B.F., Barton, M.S.: User-friendly password methods for computer-mediated information systems. Computer. Secur. 3(3), 186-195 (1984)  https://doi.org/10.1016/0167-4048(84)90040-3
  12. Bishop, M., Klein, D.V.: Improving system security via proactive password checking. Computer. Secur. 14(3), 233-249 (1995)  https://doi.org/10.1016/0167-4048(95)00003-Q
  13. Preprint of the article published in the IET conference proceedings as: Radanliev, P., De Roure, C.D., Nurse, R.C., Nicolescu, R., Huth, M., Cannady, C., Montalvo, R.M., Cannady, S., 2018. Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-things in Industry 4.0, in: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET, London. 
  14. Top steps against cyber(https://www.dell.com/downloads/ca/support/top_10_steps_to_protect_against_cybercrime_dell_en.pdf) 
  15. Article Emerging threats by Norton (https://us.norton.com/internetsecurity-emerging-threats-how-do-zero-day-vulnerabilities-work-30sectech.html) 
  16. History about cyber security by Sentinel one blog (https://www.sentinelone.com/blog/history-of-cyber-security/)