Cyber Risks and Security-A Case Study on Analysis of Malware

被引:1
|
作者
Agrawal, Moulik [1 ]
Mann, Karan Deep Singh [1 ]
Johari, Rahul [1 ]
Vidyarthi, Deo Prakash [2 ]
机构
[1] Guru Gobind Singh Indraprastha Univ, Univ Sch Informat Commun & Technol USICT, SWINGER Secur Wireless IoT Network Grp Engn & Res, Sect-16C, Delhi, India
[2] JNU, Sch Comp & Syst Sci, Parallel & Distributed Syst Lab, Delhi, India
关键词
Phishing; Malware; Keylogger; Adware; Risks; Security;
D O I
10.1007/978-981-19-3679-1_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The automation of business enterprises, the bulk computer storage to store sensitive information, various distributed applications being accessed via the Internet, all these have become critical for the government, financial institutions, and millions of users. Cyber security plays an important role to identify different types of risks and to overcome the challenges of securing the information thereby preventing financial and reputational damage to the organization and its customers. This work introduces some known threats to Cyber Security-Keylogger and Adware, and how they are spoofed and sent to a victim, with which an attacker can surreptitiously break into a network system. This study shows how anyone on the Internet can fall prey to such malware attacks, and how a user needs to protect himself/herself with such increasing number of Internet users. Approaches to prevent these malware programs are also discussed in this paper.
引用
收藏
页码:339 / 349
页数:11
相关论文
共 50 条
  • [21] Security risks in cyber physical systems-A systematic mapping study
    Zahid, Maryam
    Inayat, Irum
    Daneva, Maya
    Mehmood, Zahid
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2021, 33 (09)
  • [22] An Analysis of Estonia's Cyber Security Strategy, Policy and Capabilities (Case Study)
    Kouremetis, Michael
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 404 - 412
  • [23] Analysis and Impact of Cyber Security Threats in India using Mazarbot Case Study
    Mallika
    Deep, Vikas
    Sharma, Purushottam
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 499 - 503
  • [24] Mesopelagic Species and Their Potential Contribution to Food and Feed Security-A Case Study from Norway
    Alvheim, Anita R.
    Kjellevold, Marian
    Strand, Espen
    Sanden, Monica
    Wiech, Martin
    FOODS, 2020, 9 (03)
  • [25] Measuring Indigenous food security-A case for Indigenous designed tools
    Deen, Caroline
    Sherriff, Simone
    Shelling, Madeline
    Gall, Alana
    Cubillo, Beau
    Te Morenga, Lisa
    Brimblecombe, Julie
    Matthews, Veronica
    HEALTH PROMOTION JOURNAL OF AUSTRALIA, 2025, 36 (01)
  • [26] Cyber Risks and Blockchain Security for Digital Forensics
    Gudlur, Venkata Venugopal Rao
    Thangiah, Murugan
    2024 IEEE 14TH SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS, ISCAIE 2024, 2024, : 1 - 4
  • [27] When to Treat Security Risks with Cyber Insurance
    Meland, Per Hakon
    Seehusen, Fredrik
    2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [28] Cyber Security Risks of Net Zero Technologies
    Yuan, Haiyue
    Li, Shujun
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [29] Cyber Security Risks in Emerging South African Smart Cities: Towards a Cyber Security Framework
    Cornelius, Francois Paul
    Rensburg, Shandre Kim Jansen van
    Kader, Sarika
    PERSPECTIVES ON GLOBAL DEVELOPMENT AND TECHNOLOGY, 2023, 22 (1-2) : 107 - 141
  • [30] A Case-Study on American Perspectives on Cyber and Security
    Jantunen, Saara
    Huhtinen, Aki-Mauri
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 163 - 171