Cyber Risks and Security-A Case Study on Analysis of Malware

被引:1
|
作者
Agrawal, Moulik [1 ]
Mann, Karan Deep Singh [1 ]
Johari, Rahul [1 ]
Vidyarthi, Deo Prakash [2 ]
机构
[1] Guru Gobind Singh Indraprastha Univ, Univ Sch Informat Commun & Technol USICT, SWINGER Secur Wireless IoT Network Grp Engn & Res, Sect-16C, Delhi, India
[2] JNU, Sch Comp & Syst Sci, Parallel & Distributed Syst Lab, Delhi, India
关键词
Phishing; Malware; Keylogger; Adware; Risks; Security;
D O I
10.1007/978-981-19-3679-1_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The automation of business enterprises, the bulk computer storage to store sensitive information, various distributed applications being accessed via the Internet, all these have become critical for the government, financial institutions, and millions of users. Cyber security plays an important role to identify different types of risks and to overcome the challenges of securing the information thereby preventing financial and reputational damage to the organization and its customers. This work introduces some known threats to Cyber Security-Keylogger and Adware, and how they are spoofed and sent to a victim, with which an attacker can surreptitiously break into a network system. This study shows how anyone on the Internet can fall prey to such malware attacks, and how a user needs to protect himself/herself with such increasing number of Internet users. Approaches to prevent these malware programs are also discussed in this paper.
引用
收藏
页码:339 / 349
页数:11
相关论文
共 50 条
  • [41] Mitigating Cyber-Security Risks using MILS
    Liguori, Angelo
    Benedetto, Francesco
    Liguori, Marco
    2017 40TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2017, : 1 - 7
  • [42] Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure
    Rashid, Awais
    Gardiner, Joseph
    Green, Benjamin
    Craggs, Barnaby
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2019), 2020, 11777 : 3 - 17
  • [43] External Auditors' Assessments of Cyber-Security Risks
    Ngo, Tran Nguen Bao
    Tick, Andrea
    2021 IEEE 19TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2021), 2021, : 323 - 328
  • [44] A Probabilistic Analysis of Cyber Risks
    Pate-Cornell, M. -Elisabeth
    Kuypers, Marshall A.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (01) : 3 - 13
  • [45] Management of cyber risks in the library: analysis of information security awareness of Estonian library employees
    Kont, Kate-Riin
    LIBRARY MANAGEMENT, 2024, 45 (1/2) : 118 - 140
  • [46] Saudi Arabia's Response to Cyber Conflict: A case study of the Shamoon malware incident
    Dehlawi, Zakariya
    Abokhodair, Norah
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 73 - 75
  • [47] A Study of a Smart Multi-layered Modular System for Portal Sites Security-A case of TMIC in Taiwan
    Chen, Patrick S.
    Tzeng, Jang-Ruey
    Liu, Yung-Kuei
    WMSCI 2008: 12TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2008, : 1 - 6
  • [48] A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations
    Meschini, Marcello
    Di Tizio, Giorgio
    Balduzzi, Marco
    Massacci, Fabio
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9419 - 9432
  • [49] Managing Outsourced IT Projects' Security Risks: A Case Study
    Almutairi, Moneef
    Riddle, Stephen
    ICIME 2018: PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, 2018, : 21 - 26
  • [50] SMARTPHONE SECURITY EVALUATION The Malware Attack Case
    Mylonas, Alexios
    Dritsas, Stelios
    Tsoumas, Bill
    Gritzalis, Dimitris
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 25 - 36