Professional Documents
Culture Documents
https://doi.org/10.22214/ijraset.2021.38022
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 9 Issue IX Sep 2021- Available at www.ijraset.com
Abstract: Cyber security are techniques generally set forth in published materials that attempt to safeguard the cyber environment
of a user or organization. It manages the set of techniques used to save the integrity of networks, programs and data from
unauthorized access. It refers to the body of technologies, processes, and it may also be referred to as information technology
security. The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions
and the various tiny devices that constitute the Internet of Things.
Keywords: IT security, Internet of things (IOT)
I. INTRODUCTION
The internet has made the world smaller in many ways but it has also opened us up to influences that have never before been so
varied and so challenging. As fast as security grew, the hacking world grew faster. There are two ways of looking at the issue of
cyber security. One is that the companies that provide cloud computing do that and only that so these companies will be extremely
well secured with the latest in cutting edge encryption technology.
1) Cyber Terrorism: It is the innovative use of information technology by terrorist groups to further their political agenda. It took
the form of attacks on networks, computer systems and telecommunication infrastructures.
2) Cyber Warfare: It involves nation-states using information technology to go through something another nation’s networks to
cause damage. In the U.S. and many other people live in a society, cyber warfare has been acknowledged as the fifth domain of
warfare. Cyber warfare attacks are primarily executed by hackers who are well-trained in use of benefit the quality of details
computer networks, and operate under the favorable and support of nation-states. Rather than closing a target’s key networks, a
cyber-warfare attack may forced to put into a situation into networks to compromise valuable data, degrade communications,
impair such infrastructural services as transportation and medical services, or interrupt commerce.
3) Cyber Spionage: It is the practice of using information technology to obtain secret information without permission from its
owners or holders. It is the most often used to gain strategic, economic, military advantage, and is conducted using cracking
techniques and malware.
c) Social engineering is an attack that relies on human interaction to trick users into breaking security procedures in order to gain
sensitive information that is typically protected.
d) Phishing is a form of fraud where fraudulent emails are sent that resemble emails from reputable sources; however, the intention
of these emails is to steal sensitive data, such as credit card or login information.
VII. CONCLUSION
Depending on their (potential) severity, however, disruptive incidents in the future will continue to fuel the military discourse, and
with it fears of strategic cyber-war. Certainly, thinking about (and planning for) worst-case scenarios is a legitimate task of the
national security apparatus. However, for the favour of more plausible and more likely problems they should not to get more
attention Therefore, there is no way to study the „actual‟ level of cyber-risk in any sound way because it only exists in and through
the representations of various actors in the political domain.
REFERENCES
[1] Daniel, Schatz,; Julie, Wall, (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2).
ISSN 1558-7215. Archived from the original on 28 December 2017.
[2] Rouse, Margaret. "Social engineering definition". Tech Target. Archived from the original on 5 January 2018. Retrieved 6 September 2015.
[3] Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and
Law. 12 (2). ISSN 1558-7215.
[4] "Reliance spells end of road for ICT amateurs", 7 May 2013, The Australian
[5] Stevens, Tim. "Global Cyber security: New Directions in Theory and Methods". Politics and Governance. 6 (2). doi:10.17645 /pag.v6i2.1569.
[6] "Computer Security and Mobile Security Challenges". researchgate.net. Archived from the original on 12 October 2016. Retrieved 4 August 2016.
[7] "Distributed Denial of Service Attack". csa.gov.sg. Archived from the original on 6 August 2016. Retrieved 12 November 2014.
[8] Wireless mouse leave billions at risk of computer hack: cyber security firm Archived 3 April 2016 at the Way back Machine.
[9] "Multi-Vector Attacks Demand Multi-Vector Protection". MSSP Alert. July 24, 2018.
[10] Millman, Renee (December 15, 2017). "New polymorphic malware evades three quarters of AV scanners". SC Magazine UK.
[11] Turner, Rik (May 22, 2018). "Thinking about cyber attacks in generations can help focus enterprise security plans". Informa PLC. Ovum.
[12] "Identifying Phishing Attempts". Case. Archived from the original on 13 September 2015.
[13] Arcos Sergio. "Social Engineering" (PDF). Archived (PDF) from the original on 3 December 2013.
[14] Scannell, Kara (24 February 2016). "CEO email scam costs companies $2bn". Financial Times (25 Feb 2016). Archived from the original on 23 June 2016.
Retrieved 7 May 2016.
[15] "Bucks leak tax info of players, employees as result of email scam". Associated Press. 20 May 2016. Archived from the original on 20 May 2016. Retrieved 20
May 2016.
[16] "What is Spoofing? – Definition from Techopedia". Archived from the original on 30 June 2016. [17]. "spoofing". Oxford Reference. Retrieved 8 October 2017.
[17] Marcel, Sébastien; Nixon, Mark; Li, Stan, eds. (2014). Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks (PDF).
London: Springer. doi:10.1007/978-1-4471-6524-8. ISBN 978-1-4471-6524-8. ISSN 2191-6594. LCCN 2014942635.Retrieved 8 October 2017 – via Penn State
University Libraries.