A Systematic Review of Cyber Security and Classification of Attacks in Networks

被引:0
|
作者
Kashif, Muhammad [1 ]
Malik, Sheraz Arshad [1 ]
Abdullah, Muhammad Tahir [1 ]
Umair, Muhammad [1 ]
Khan, Prince Waqas [2 ]
机构
[1] GC Univ, Dept Informat Technol, Faisalabad, Pakistan
[2] Univ Agr Faisalabad, Dept Comp Sci, Faisalabad, Pakistan
关键词
Cyber security; internet; intranet; network security; cybercrime and security alludes;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber security plays an important role to secure the people who use internet via different electronic devices in their daily life. Some causes occurred all over world that people face problems when they connect their devices and system via internet. There are some highly sensitive data like biotechnology and military assets which are highly threatened by the hackers; cyber security plays a vital role in securing such data. Misusing the internet becomes a current issue in different sectors of life especially in social media, universities and government organizations. Internet is very useful for students in study institutes and employees who work in different organizations. Internet source gives the facility to people to fetch some information via internet. However, they must be protected when use the internet and secure for any unauthorized access. In this paper we have covered the different aspect of cyber security and Network security in the modern era. We have also tried to cover the threats in Intranet of organizations.
引用
收藏
页码:201 / 207
页数:7
相关论文
共 50 条
  • [41] A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
    Pawlicki, Marek
    Kozik, Rafal
    Choras, Michal
    NEUROCOMPUTING, 2022, 500 : 1075 - 1087
  • [42] Web Services Attacks and Security- A Systematic Literature Review
    Mouli, Varsha R.
    Jevitha, K. P.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 870 - 877
  • [43] Cyber range cyberium for training security meisters to deal with cyber attacks
    Hara, Kazuhiro
    Fujitsu Scientific and Technical Journal, 2019, 55 (05): : 59 - 63
  • [44] Mindfulness in Cyber Security - Examining Responder Behaviors in Cyber-Attacks
    Tapanainen, Tommi
    AMCIS 2017 PROCEEDINGS, 2017,
  • [45] Application Stress Testing Achieving Cyber Security by Testing Cyber Attacks
    Underbrink, Al
    Potter, Andrew
    Jaenisch, Holger
    Reifer, Donald J.
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 556 - 561
  • [46] Cyber Range CYBERIUM for Training Security Meisters to Deal with Cyber Attacks
    Hara, Kazuhiro
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2019, 55 (05): : 59 - 63
  • [47] The "Triptych of Cyber Security": A Classification of Active Cyber Defence
    Dewar, Robert S.
    2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 2014, : 7 - 21
  • [48] Security Measurements of Cyber Networks
    Yan, Zheng
    Zhang, Yuqing
    Choo, Kim-Kwang Raymond
    Xiang, Yang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [49] Cyber Security in Healthcare Networks
    Dogaru, Delia Ioana
    Dumitrache, Ioan
    2017 IEEE INTERNATIONAL CONFERENCE ON E-HEALTH AND BIOENGINEERING CONFERENCE (EHB), 2017, : 414 - 417
  • [50] Detection of cyber-attacks on Wi-Fi networks by classification of spectral data
    Villain, Jonathan
    Deniau, Virginie
    Fleury, Anthony
    Gransart, Christophe
    Simon, Eric Pierre
    2020 XXXIIIRD GENERAL ASSEMBLY AND SCIENTIFIC SYMPOSIUM OF THE INTERNATIONAL UNION OF RADIO SCIENCE, 2020,