Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

被引:5
|
作者
Awan, Jawad Hussain [1 ]
Memon, Shahzad [1 ]
Memon, Sheeraz [2 ]
Pathan, Kamran Taj [1 ]
Arijo, Niaz Hussain [1 ]
机构
[1] Univ Sindh, Inst Informat & Commun Technol, Jamshoro, Pakistan
[2] Mehran Univ Engn & Technol, Dept Comp Syst Engn, Jamshoro, Pakistan
关键词
Cyber Security; Cyber Crime; Internet; Threats;
D O I
10.22581/muet1982.1802.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, avast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [1] Turkish national cyber-firewall to mitigate countrywide cyber-attacks
    Sari, Arif
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 128 - 144
  • [2] Present Cyber Threat Management (Methodologies to mitigate evolving cyber-attacks)
    Mawudor, Bright Gameli
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 115 - 121
  • [3] Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats
    Sadhukhan, Koustav
    Mallari, Rao Arvind
    Yadav, Tarun
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 170 - 178
  • [4] Targeted cyber attacks: how to mitigate the increasing risk
    Bunker G.
    Network Security, 2020, 2020 (01): : 17 - 19
  • [5] Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
    Tsiknas, Konstantinos
    Taketzis, Dimitrios
    Demertzis, Konstantinos
    Skianis, Charalabos
    IOT, 2021, 2 (01): : 163 - 186
  • [6] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [7] Research on Cyber Attacks and Defensive Measures of Power Communication Network
    Wu, Yingjun
    Ru, Yingtao
    Lin, Zhiwei
    Liu, Chengjun
    Xue, Tao
    Zhao, Xiang
    Chen, Jinfan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7613 - 7635
  • [8] Controlling user access with scripting to mitigate cyber-attacks
    Nyarko-Boateng, Owusu
    Nti, Isaac Kofi
    Mensah, Anastasia Akyamaa
    Gyamfi, Emmanuel Kojo
    SCIENTIFIC AFRICAN, 2024, 26
  • [9] Fighting Cyber Attacks with Sanctions: Digital Threats, Economic Responses
    Rusinova, Vera
    Martynova, Ekaterina
    ISRAEL LAW REVIEW, 2024, 57 (01) : 135 - 174
  • [10] Trust Issues That Create Threats for Cyber Attacks in Cloud Computing
    Khorshed, Md Tanzim
    Ali, A. B. M. Shawkat
    Wasimi, Saleh A.
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 900 - 905