SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
Cyber Security
Signaler
Partager
IRJET Journal
Fast Track Publications
Suivre
•
0 j'aime
•
63 vues
Ingénierie
https://irjet.net/archives/V4/i6/IRJET-V4I648.pdf
Lire la suite
Cyber Security
•
0 j'aime
•
63 vues
IRJET Journal
Fast Track Publications
Suivre
Signaler
Partager
Ingénierie
https://irjet.net/archives/V4/i6/IRJET-V4I648.pdf
Lire la suite
Cyber Security
1 sur 4
Télécharger maintenant
Recommandé
A network security policy group project unit 4 (1) july 2015 par
A network security policy group project unit 4 (1) july 2015
Jeffery Brown
687 vues
•
14 diapositives
The new era of Cyber Security IEC62443 par
The new era of Cyber Security IEC62443
WoMaster
116 vues
•
15 diapositives
Information Security : Is it an Art or a Science par
Information Security : Is it an Art or a Science
Pankaj Rane
5.5K vues
•
28 diapositives
Information security.pptx par
Information security.pptx
Govt. P.G. College Sendhwa, Barwani (M.P.)
1.6K vues
•
47 diapositives
Chapter2 the need to security par
Chapter2 the need to security
Dhani Ahmad
7.1K vues
•
53 diapositives
102 Information security standards and specifications par
102 Information security standards and specifications
SsendiSamuel
589 vues
•
29 diapositives
Contenu connexe
Tendances
Introduction to information security par
Introduction to information security
Dhani Ahmad
1.1K vues
•
53 diapositives
Analytical survey of active intrusion detection techniques in mobile ad hoc n... par
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
eSAT Publishing House
593 vues
•
7 diapositives
Introduction to security par
Introduction to security
Mukesh Chinta
3.8K vues
•
37 diapositives
Information security par
Information security
avinashbalakrishnan2
2K vues
•
59 diapositives
IRJET- A Review of Information Systems Security: Types, Security Issues, and ... par
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET Journal
9 vues
•
3 diapositives
Security Incidents par
Security Incidents
belsis
768 vues
•
12 diapositives
Tendances
(20)
Introduction to information security par Dhani Ahmad
Introduction to information security
Dhani Ahmad
•
1.1K vues
Analytical survey of active intrusion detection techniques in mobile ad hoc n... par eSAT Publishing House
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
eSAT Publishing House
•
593 vues
Introduction to security par Mukesh Chinta
Introduction to security
Mukesh Chinta
•
3.8K vues
Information security par avinashbalakrishnan2
Information security
avinashbalakrishnan2
•
2K vues
IRJET- A Review of Information Systems Security: Types, Security Issues, and ... par IRJET Journal
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET Journal
•
9 vues
Security Incidents par belsis
Security Incidents
belsis
•
768 vues
Information Technology Security A Brief Overview 2001 par Donald E. Hester
Information Technology Security A Brief Overview 2001
Donald E. Hester
•
1.1K vues
A STUDY ON INTRUSION DETECTION par IAEME Publication
A STUDY ON INTRUSION DETECTION
IAEME Publication
•
111 vues
Information security in todays world par Sibghatullah Khattak
Information security in todays world
Sibghatullah Khattak
•
895 vues
IT Position of Trust Designation par Murray Security Services
IT Position of Trust Designation
Murray Security Services
•
12K vues
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr... par ijtsrd
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd
•
35 vues
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security... par IOSR Journals
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
IOSR Journals
•
480 vues
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security... par Ahmad Sharifi
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
Ahmad Sharifi
•
549 vues
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity par David Sweigert
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
David Sweigert
•
437 vues
Intelligent Network Surveillance Technology for APT Attack Detections par AM Publications,India
Intelligent Network Surveillance Technology for APT Attack Detections
AM Publications,India
•
251 vues
SC Magazine & ForeScout Survey Results par ForeScout Technologies
SC Magazine & ForeScout Survey Results
ForeScout Technologies
•
657 vues
IRJET- A Review on Intrusion Detection System par IRJET Journal
IRJET- A Review on Intrusion Detection System
IRJET Journal
•
28 vues
Intrusion detection and anomaly detection system using sequential pattern mining par eSAT Journals
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
•
529 vues
Computer Security Policy D par guest34b014
Computer Security Policy D
guest34b014
•
700 vues
Khas bank isms 3 s par Khaltar Togtuun
Khas bank isms 3 s
Khaltar Togtuun
•
391 vues
Similaire à Cyber Security
Cyber Security Intelligence par
Cyber Security Intelligence
ijtsrd
55 vues
•
5 diapositives
Cyber Security.pptx par
Cyber Security.pptx
AnushkaThakur11
6 vues
•
17 diapositives
Network Security of Data Protection par
Network Security of Data Protection
UthsoNandy
98 vues
•
20 diapositives
Fundamental Areas of Cyber Security on Latest Technology par
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
85 vues
•
3 diapositives
CYBERSECURITY.pptx par
CYBERSECURITY.pptx
ItzRoswell1
4 vues
•
10 diapositives
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis par
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
3 vues
•
5 diapositives
Similaire à Cyber Security
(20)
Cyber Security Intelligence par ijtsrd
Cyber Security Intelligence
ijtsrd
•
55 vues
Cyber Security.pptx par AnushkaThakur11
Cyber Security.pptx
AnushkaThakur11
•
6 vues
Network Security of Data Protection par UthsoNandy
Network Security of Data Protection
UthsoNandy
•
98 vues
Fundamental Areas of Cyber Security on Latest Technology par ijtsrd
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
•
85 vues
CYBERSECURITY.pptx par ItzRoswell1
CYBERSECURITY.pptx
ItzRoswell1
•
4 vues
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis par IRJET Journal
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
•
3 vues
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto... par IRJET Journal
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal
•
21 vues
Computer Network Security par Sachithra Gayan
Computer Network Security
Sachithra Gayan
•
1.5K vues
CYBER SECURITY.pptx par Malu704065
CYBER SECURITY.pptx
Malu704065
•
162 vues
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks par IRJET Journal
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
IRJET Journal
•
8 vues
MIS chap # 9..... par Syed Muhammad Zeejah Hashmi
MIS chap # 9.....
Syed Muhammad Zeejah Hashmi
•
1.2K vues
network security.pdf par JeganathanJayaran
network security.pdf
JeganathanJayaran
•
27 vues
Concept Of Cyber Security.pdf par FahadZaman38
Concept Of Cyber Security.pdf
FahadZaman38
•
196 vues
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System par IRJET Journal
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal
•
5 vues
IRJET- Security from Threats of Computer System par IRJET Journal
IRJET- Security from Threats of Computer System
IRJET Journal
•
52 vues
Network Security and Privacy in Medium Scale Businesses in Nigeria par INFOGAIN PUBLICATION
Network Security and Privacy in Medium Scale Businesses in Nigeria
INFOGAIN PUBLICATION
•
35 vues
Data Storage Issues in Cloud Computing par ijtsrd
Data Storage Issues in Cloud Computing
ijtsrd
•
87 vues
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf par sulu98
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
sulu98
•
86 vues
Computer Security Policy par everestsky66
Computer Security Policy
everestsky66
•
1.1K vues
4b - Security Management - Cyber Security Mgt (1).pptx par romawoodz
4b - Security Management - Cyber Security Mgt (1).pptx
romawoodz
•
1 vue
Plus de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL par
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
22 vues
•
7 diapositives
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vues
•
7 diapositives
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 vues
•
5 diapositives
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vues
•
11 diapositives
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vues
•
6 diapositives
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vues
•
5 diapositives
Plus de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL par IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
22 vues
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vues
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 vues
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vues
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vues
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vues
Heart Failure Prediction using Different Machine Learning Techniques par IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vues
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel par IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vues
Metro Development and Pedestrian Concerns par IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vues
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... par IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vues
Data Analytics and Artificial Intelligence in Healthcare Industry par IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vues
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... par IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
52 vues
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... par IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
11 vues
Development of Effective Tomato Package for Post-Harvest Preservation par IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vues
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” par IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vues
Understanding the Nature of Consciousness with AI par IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vues
Augmented Reality App for Location based Exploration at JNTUK Kakinada par IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vues
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... par IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vues
Enhancing Real Time Communication and Efficiency With Websocket par IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 vues
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... par IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vues
Dernier
Pull down shoulder press final report docx (1).pdf par
Pull down shoulder press final report docx (1).pdf
Comsat Universal Islamabad Wah Campus
17 vues
•
25 diapositives
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
33 vues
•
16 diapositives
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth par
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra
6 vues
•
4 diapositives
Generative AI Models & Their Applications par
Generative AI Models & Their Applications
SN
8 vues
•
1 diapositive
SUMIT SQL PROJECT SUPERSTORE 1.pptx par
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
15 vues
•
26 diapositives
Searching in Data Structure par
Searching in Data Structure
raghavbirla63
7 vues
•
8 diapositives
Dernier
(20)
Pull down shoulder press final report docx (1).pdf par Comsat Universal Islamabad Wah Campus
Pull down shoulder press final report docx (1).pdf
Comsat Universal Islamabad Wah Campus
•
17 vues
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
•
33 vues
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth par Innomantra
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra
•
6 vues
Generative AI Models & Their Applications par SN
Generative AI Models & Their Applications
SN
•
8 vues
SUMIT SQL PROJECT SUPERSTORE 1.pptx par Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
•
15 vues
Searching in Data Structure par raghavbirla63
Searching in Data Structure
raghavbirla63
•
7 vues
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... par AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli
•
12 vues
DESIGN OF SPRINGS-UNIT4.pptx par gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
19 vues
Final Year Presentation par Comsat Universal Islamabad Wah Campus
Final Year Presentation
Comsat Universal Islamabad Wah Campus
•
9 vues
Renewal Projects in Seismic Construction par Engineering & Seismic Construction
Renewal Projects in Seismic Construction
Engineering & Seismic Construction
•
5 vues
Codes and Conventions.pptx par IsabellaGraceAnkers
Codes and Conventions.pptx
IsabellaGraceAnkers
•
9 vues
_MAKRIADI-FOTEINI_diploma thesis.pptx par fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi
•
8 vues
GDSC Mikroskil Members Onboarding 2023.pdf par gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil
•
53 vues
Design_Discover_Develop_Campaign.pptx par ShivanshSeth6
Design_Discover_Develop_Campaign.pptx
ShivanshSeth6
•
32 vues
SPICE PARK DEC2023 (6,625 SPICE Models) par Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome
•
28 vues
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx par lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
83 vues
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... par csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
•
5 vues
MK__Cert.pdf par Hassan Khan
MK__Cert.pdf
Hassan Khan
•
11 vues
MSA Website Slideshow (16).pdf par msaucla
MSA Website Slideshow (16).pdf
msaucla
•
76 vues
802.11 Computer Networks par TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
10 vues
Cyber Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 277 Cyber Security Ms.Minal Anant Apandkar Lecturer at VPM’s Polytechnic, Thane ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cyber security is the form of skills, procedures andperformsintendedtodefendnetworks, computers, programs and data from attack, damage or illegal access. Cyber security involves governing physical access to the hardware and also protecting against impairment that cause due to network access, data and code injection and also due to maladministrationbyoperator.Withincreaseincyber- attacks day by day puts nation at higher risk which needs higher degree of cyber security. Cyber-crimes spoils people or nation’s security and financial health. Hacking, child pornography, child grooming,copyright infringement are frightful issues which makes cyber security at higher priority. Key Words: Security, Theft, Risks, Network attack, Information Technology Act. 1. INTRODUCTION Cyber Security is the process of detecting and preventing any illegal use of laptop/computer. It comprises the process of protection against snoopers from using your private or workplace based computer resources with nasty intent or for their own gains or even for gaining any access to them accidentally.Major regions encircled in cyber security are: 1.1 Application Security Application security incorporates measures taken to improve the security of an application. Different skills used to attain this are design, development, deployment, upgrade or maintenance. To achieve higher degree of application security actions can be taken such as use of application firewall which limits the execution of files or handling of data by specific installed programs and also use of router is also advantageous which prevent the IP address of an individual computer from being directly visible on internet. Also use of conventional firewalls, anti-virus programs, and spyware detection can be used to achieve application security. 1.2 Information Security Information security protects information from illegal admittance to avoid identity theft and to defend discretion. Major practices used to cover this are: a) Identification, validation & approval of user, b) Cryptography. 1.3 Disaster Recovery After natural disaster (flood, earthquakeetc.)orcyber- attack therearechancesoflosingimportantdatawhich is not desirable for official or personal use of computer/laptop. To avoid this disaster recovery plan is must. It is set of policies and procedures to enable the recovery. 1.4 Network Security Network security comprises actions to safeguard the usability, reliability, integrity and security of the network. Effective network security aims a variety of threats and stops them from arriving or spreading on the network. Network security components contain: a) Anti-virus andanti-spyware, b) Firewall,to block unconstitutional access to your network, c) Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks, and d) Virtual Private Networks (VPNs), to provide secure remote access. 2. COMPUTER SECURITY RISKS This is an occasion or action that could cause damage to or loss of computer hardware, software data information, or processing ability.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 278 Fig 1:-Types of Computer Security Risks 2.1 Internet and Network Attack Information transmitted over network having higher security risk than information kept on office premises. Fig -2: Internet and network attack 2.1 .1 Malware Malware are program that act without operator’s awareness and deliberately change the operation. 2.1 .2 Botnets It’s a collection of compromised computers associated to a network such as internet that are used as part of network that attacks other networks, usually for nefarious purposes. 2.1 .3 Back Doors A program or set of commands in a program that allows users to sidestep security controls when retrieving a program, computer or network. 2.1 .4 Spoofing It is a deceitful or nasty exercise in which communication is sent from an unfamiliar causes disguised as a sourceknowntothereceiver.Spoofingis most dominant in communication mechanisms that lack a high level of safety. 2.2 Unauthorized Access and Use Unauthorized access is a use of computer or network without approval. Unauthorized use is the use of computer or its data for unapproved or possibly unlawful activities. 2.3 Hardware Theft Hardware theft is the act of stealing computer equipment. 2.4 Software Theft Software theft occurs when someone steal software media or intentionally erases/copies program or illegally registers and/or activates a program Fig -3: Software Theft 2.5 Information Theft It happens when someone steals personal or confidential information.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 279 2.6 System Failure System failure is the persistent malfunction of the computer. A variation of aspects can prime system failure, comprising aging hardware, natural disaster, electrical power problems, noise, undervoltages and over voltages errors in computer programs. 3. DIFFERENT ELEMENTS IN COMPUTER SECURITY Different elements in computer security are confidentiality, integrity and availability. 3.1 Confidentiality Confidentiality is the disguise of information or possessions. Also, there is a necessity to retain information undisclosed from other third parties that need to have admittance to it, so just the right people can access it. 3.2 Integrity Integrity is defined as the trustworthiness of data in the systems or resources by the point of view of avoiding unauthorized and inappropriate changes. 3.3 Availability Availability discusses to the ability to access data of a resource when it is preferred, as such the information has importance only if the authorized people can access at right time. Disagreeing access to data now a days has become a common attack. 4. APPLICATION SECURITY Application security comprises measures taken to develop the safekeeping of an application often by finding, fixing and preventing security disclosures. Different methods used are design, development, deployment, upgrade, or maintenance. An always developing but largely reliable set of common security flaws are seen across different applications. 5. CYBER SECURITY POLICY The cyber security policy is an emerging task that offers to the all-inclusive field of Information and Communication Technology (ICT) users and benefactors. It comprises − Home operators Small, medium, and large Enterprises Government and non-government entities It works as a specialist agenda that describes and escorts the events connected with the security of cyberspace. It sanctions all sectors and establishments in scheming appropriate cybersecurity procedures to encounter their necessities. The policy provides an outline to effectively protect information, information systems and networks. It gives a thoughtful into the Government’s approach and approach forsecurityofcyberspaceinthecountry. It also plans some pointers to agree cooperative working across the public and private sectors to safeguard information and information systems. Therefore, the aim of this procedure is to create a cybersecurity framework, which leads to comprehensive actions and programs to increase the security carriage of cyberspace. 5.1 Information Technology Act The Government of India endorsed The Information Technology Act with some chief purpose as to provide authorized acknowledgment for communications through electronic data interchange (EDI) and other means of electronic communication commonly referred to as electronic commerce or E-Commerce. 5.2 National Cyber Security Policy 2013 In India Government revealed a National Security Policy 2013 on 2 July 2013 for providing economic benefit to business for implementation of standard safety practices andmethods and to empowersecurity of information while in process handling so as to
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 280 maintain privacy of resident’s data and reducing financial losses with strategies as follows- Safeguarding E-Governance services. Forming cyber security consciousness. Producing an assurance framework. Creating a safeguarded framework. Developing operative public private partnership. Decreasing supply chain risks. 6. TIPS TO PREVENT CYBER-CRIMES Keep reading the latest ways hackers create phishing scams to gain access to your personal information. Install a firewall on computer/laptop to keep unwanted threats and attacks to a minimum. Be careful while opening emails and clicking links. Be careful while downloading content from unsupported causes. 7. CONCLUSIONS Cybercrime are the one of biggest concern which our nation is facing in 21st century. With day by day progress in technology criminals making misuse of technology, they don’t rob bank or house or they even don’t stole ornaments, they use mouse cursor and passwords as weapons for hacking personal or official important information which is more dangerous than any other weapon. This leads our nation as well as their resident to suffer from financial losses. To overcome these kind of issues and better use of advanced technology one has to be careful while using technology and also person or organization should have disaster or back up plan to be ready in advance if such scenario happens with them to avoid future losses. People can be make alert with crimes whichare happening surroundingsothattheycantakenecessary precautions while using advanced technology such as net banking, e-services etc. REFERENCES “Handbook of Applied Cryptography” by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. “Cryptography and Network Security: Principles and Practice” by William Stallings Computer and Information Security Handbook, 2nd Edition by john R.Vacca
Télécharger maintenant