Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

被引:5
|
作者
Awan, Jawad Hussain [1 ]
Memon, Shahzad [1 ]
Memon, Sheeraz [2 ]
Pathan, Kamran Taj [1 ]
Arijo, Niaz Hussain [1 ]
机构
[1] Univ Sindh, Inst Informat & Commun Technol, Jamshoro, Pakistan
[2] Mehran Univ Engn & Technol, Dept Comp Syst Engn, Jamshoro, Pakistan
关键词
Cyber Security; Cyber Crime; Internet; Threats;
D O I
10.22581/muet1982.1802.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, avast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [41] Cyber Attacks for Sale
    Meland, Per Hakon
    Sindre, Guttorm
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 54 - 59
  • [42] Beware cyber attacks
    Davis, B
    PROFESSIONAL ENGINEERING, 2002, 15 (03) : 55 - 56
  • [43] SILENCE CYBER ATTACKS
    不详
    FORTUNE, 2016, 173 (06) : 66 - 74
  • [44] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    Neural Computing and Applications, 2021, 33 (16) : 10211 - 10226
  • [45] Model for Identifying Cyber Threats to Internet Information Resources
    I. V. Luskatov
    S. V. Pilkevich
    Automatic Control and Computer Sciences, 2019, 53 : 987 - 994
  • [46] Modeling cyber attacks
    Hansen, E
    Hansen, J
    Rubin, SH
    Richardson, C
    CCCT 2003, VOL6, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: III, 2003, : 57 - 62
  • [47] Countering cyber attacks
    Wagner, Cynthia G.
    FUTURIST, 2007, 41 (03) : 16 - 16
  • [48] The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement
    Trim, Peter R. J.
    Lee, Yang-Im
    BIG DATA AND COGNITIVE COMPUTING, 2021, 5 (03)
  • [49] Attributing Cyber Attacks
    Rid, Thomas
    Buchanan, Ben
    JOURNAL OF STRATEGIC STUDIES, 2015, 38 (1-2) : 4 - 37
  • [50] Possibilities of modelling the impact of cyber threats in cyber risk insurance
    Pavlik, Lukas
    22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018), 2018, 210