Cyber Risks and Security-A Case Study on Analysis of Malware

被引:1
|
作者
Agrawal, Moulik [1 ]
Mann, Karan Deep Singh [1 ]
Johari, Rahul [1 ]
Vidyarthi, Deo Prakash [2 ]
机构
[1] Guru Gobind Singh Indraprastha Univ, Univ Sch Informat Commun & Technol USICT, SWINGER Secur Wireless IoT Network Grp Engn & Res, Sect-16C, Delhi, India
[2] JNU, Sch Comp & Syst Sci, Parallel & Distributed Syst Lab, Delhi, India
关键词
Phishing; Malware; Keylogger; Adware; Risks; Security;
D O I
10.1007/978-981-19-3679-1_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The automation of business enterprises, the bulk computer storage to store sensitive information, various distributed applications being accessed via the Internet, all these have become critical for the government, financial institutions, and millions of users. Cyber security plays an important role to identify different types of risks and to overcome the challenges of securing the information thereby preventing financial and reputational damage to the organization and its customers. This work introduces some known threats to Cyber Security-Keylogger and Adware, and how they are spoofed and sent to a victim, with which an attacker can surreptitiously break into a network system. This study shows how anyone on the Internet can fall prey to such malware attacks, and how a user needs to protect himself/herself with such increasing number of Internet users. Approaches to prevent these malware programs are also discussed in this paper.
引用
收藏
页码:339 / 349
页数:11
相关论文
共 50 条
  • [31] Cyber Security Challenges in Organisations: A Case Study in Malaysia
    Teoh, Chooi Shi
    Mahmood, Ahmad Kamil
    Dzazali, Suhazimah
    2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2018,
  • [32] A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security
    Yan, Senming
    Ren, Jing
    Wang, Wei
    Sun, Limin
    Zhang, Wei
    Yu, Quan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 467 - 496
  • [33] Emerging technologies in civil security-A scenario-based analysis
    Bierwisch, Antje
    Kayser, Victoria
    Shala, Erduana
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2015, 101 : 226 - 237
  • [34] Simulation-supported aviation cyber-security risk analysis: a case study
    Schmitt A.R.
    Edinger C.
    Mayer T.
    Niederl J.
    Kiesling T.
    CEAS Aeronautical Journal, 2019, 10 (02) : 517 - 530
  • [35] Applications and Security Risks of Artificial Intelligence for Cyber Security in Digital Environment
    Aurucci, Paola
    INTELLIGENT ENVIRONMENTS 2018, 2018, 23 : 308 - 317
  • [36] An analysis of safety and security risks in container shipping operations: A case study of Taiwan
    Chang, Chia-Hsun
    Xu, Jingjing
    Song, Dong-Ping
    SAFETY SCIENCE, 2014, 63 : 168 - 178
  • [37] The United Kingdom's Cyber Security Degree Certification Program A Cyber Security Body of Knowledge Case Study
    Nautiyal, Lata
    Rashid, Awais
    Hallett, Joseph
    Shreeve, Ben
    Michael, K.
    Chris, E.
    Catherine, H.
    IEEE SECURITY & PRIVACY, 2022, 20 (01) : 87 - 95
  • [38] Cyber Security Risks for Minors: A Taxonomy and a Software Architecture
    Tsirtsis, Andreas
    Tsapatsoulis, Nicolas
    Stamatelatos, Makis
    Papadamou, Kwstantinos
    Sirivianos, Michael
    2016 11TH INTERNATIONAL WORKSHOP ON SEMANTIC AND SOCIAL MEDIA ADAPTATION AND PERSONALIZATION (SMAP), 2016, : 93 - 99
  • [39] Cyber Security Risks of Technical Components in Industry 4.0
    Matsuda, Wataru
    Fujimoto, Mariko
    Hashimoto, Yoshihiro
    Mitsunaga, Takuho
    2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 192 - 198
  • [40] CYBER-SECURITY RISKS ASSESSMENT BY EXTERNAL AUDITORS
    Tran Nguen Bao Ngo
    Tick, Andrea
    INTERDISCIPLINARY DESCRIPTION OF COMPLEX SYSTEMS, 2021, 19 (03) : 375 - 390