Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

被引:5
|
作者
Awan, Jawad Hussain [1 ]
Memon, Shahzad [1 ]
Memon, Sheeraz [2 ]
Pathan, Kamran Taj [1 ]
Arijo, Niaz Hussain [1 ]
机构
[1] Univ Sindh, Inst Informat & Commun Technol, Jamshoro, Pakistan
[2] Mehran Univ Engn & Technol, Dept Comp Syst Engn, Jamshoro, Pakistan
关键词
Cyber Security; Cyber Crime; Internet; Threats;
D O I
10.22581/muet1982.1802.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, avast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [21] Detection of Cyber Attacks to Mitigate Their Impacts on the Manipulated EV Charging Prices
    Akbarian, Amirhossein
    Bahrami, Mahdi
    Ahmadi, Mehdi
    Vakilian, Mehdi
    Lehtonen, Matti
    IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, 2024, 10 (04): : 8881 - 8892
  • [22] Correction to: Potential cyber threats of adversarial attacks on autonomous driving models
    Eldar Boltachev
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 315 - 315
  • [23] An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities
    Demertzi, Vasiliki
    Demertzis, Stavros
    Demertzis, Konstantinos
    APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [24] Aviation cyber security: legal aspects of cyber threats
    Michal Klenka
    Journal of Transportation Security, 2021, 14 : 177 - 195
  • [25] A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats
    Shin, Yongjoo
    Kwon, Hyukjin
    Jeong, Jaeyeong
    Shin, Dongkyoo
    ELECTRONICS, 2024, 13 (19)
  • [26] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [27] Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)
    Watters, Paul A.
    McCombie, Stephen
    Layton, Robert
    Pieprzyk, Josef
    JOURNAL OF MONEY LAUNDERING CONTROL, 2012, 15 (04): : 430 - +
  • [28] Physical threats vs Cyber threats
    Setola, Roberto
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 47
  • [29] Cyber Social Disruption due to Cyber Attacks
    Barbosa, Jorge
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 817 - 826
  • [30] Survey of different IDS using honeytoken based techniques to mitigate cyber threats
    Jogdand, Priyanka
    Padiya, Puja
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 802 - 807