Cyber Security

IRJET Journal
IRJET JournalFast Track Publications

https://irjet.net/archives/V4/i6/IRJET-V4I648.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 277
Cyber Security
Ms.Minal Anant Apandkar
Lecturer at VPM’s Polytechnic, Thane
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Cyber security is the form of skills,
procedures andperformsintendedtodefendnetworks,
computers, programs and data from attack, damage or
illegal access. Cyber security involves governing
physical access to the hardware and also protecting
against impairment that cause due to network access,
data and code injection and also due to
maladministrationbyoperator.Withincreaseincyber-
attacks day by day puts nation at higher risk which
needs higher degree of cyber security. Cyber-crimes
spoils people or nation’s security and financial health.
Hacking, child pornography, child grooming,copyright
infringement are frightful issues which makes cyber
security at higher priority.
Key Words: Security, Theft, Risks, Network attack,
Information Technology Act.
1. INTRODUCTION
Cyber Security is the process of detecting and
preventing any illegal use of laptop/computer. It
comprises the process of protection against snoopers
from using your private or workplace based computer
resources with nasty intent or for their own gains or
even for gaining any access to them accidentally.Major
regions encircled in cyber security are:
1.1 Application Security
Application security incorporates measures taken to
improve the security of an application. Different skills
used to attain this are design, development,
deployment, upgrade or maintenance. To achieve
higher degree of application security actions can be
taken such as use of application firewall which limits
the execution of files or handling of data by specific
installed programs and also use of router is also
advantageous which prevent the IP address of an
individual computer from being directly visible on
internet. Also use of conventional firewalls, anti-virus
programs, and spyware detection can be used to
achieve application security.
1.2 Information Security
Information security protects information from illegal
admittance to avoid identity theft and to defend
discretion. Major practices used to cover this
are: a) Identification, validation & approval of
user, b) Cryptography.
1.3 Disaster Recovery
After natural disaster (flood, earthquakeetc.)orcyber-
attack therearechancesoflosingimportantdatawhich
is not desirable for official or personal use of
computer/laptop. To avoid this disaster recovery plan
is must. It is set of policies and procedures to enable
the recovery.
1.4 Network Security
Network security comprises actions to safeguard the
usability, reliability, integrity and security of the
network. Effective network security aims a variety of
threats and stops them from arriving or spreading on
the network. Network security components
contain: a) Anti-virus andanti-spyware, b) Firewall,to
block unconstitutional access to your
network, c) Intrusion prevention systems (IPS), to
identify fast-spreading threats, such as zero-day or
zero-hour attacks, and d) Virtual Private Networks
(VPNs), to provide secure remote access.
2. COMPUTER SECURITY RISKS
This is an occasion or action that could cause damage
to or loss of computer hardware, software data
information, or processing ability.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 278
Fig 1:-Types of Computer Security Risks
2.1 Internet and Network Attack
Information transmitted over network having higher
security risk than information kept on office premises.
Fig -2: Internet and network attack
2.1 .1 Malware
Malware are program that act without operator’s
awareness and deliberately change the operation.
2.1 .2 Botnets
It’s a collection of compromised computers associated
to a network such as internet that are used as part of
network that attacks other networks, usually for
nefarious purposes.
2.1 .3 Back Doors
A program or set of commands in a program that
allows users to sidestep security controls when
retrieving a program, computer or network.
2.1 .4 Spoofing
It is a deceitful or nasty exercise in which
communication is sent from an unfamiliar causes
disguised as a sourceknowntothereceiver.Spoofingis
most dominant in communication mechanisms that
lack a high level of safety.
2.2 Unauthorized Access and Use
Unauthorized access is a use of computer or network
without approval. Unauthorized use is the use of
computer or its data for unapproved or possibly
unlawful activities.
2.3 Hardware Theft
Hardware theft is the act of stealing computer
equipment.
2.4 Software Theft
Software theft occurs when someone steal software
media or intentionally erases/copies program or
illegally registers and/or activates a program
Fig -3: Software Theft
2.5 Information Theft
It happens when someone steals personal or
confidential information.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 279
2.6 System Failure
System failure is the persistent malfunction of the
computer. A variation of aspects can prime system
failure, comprising aging hardware, natural disaster,
electrical power problems, noise, undervoltages and
over voltages errors in computer programs.
3. DIFFERENT ELEMENTS IN COMPUTER SECURITY
Different elements in computer security are
confidentiality, integrity and availability.
3.1 Confidentiality
Confidentiality is the disguise of information or
possessions. Also, there is a necessity to retain
information undisclosed from other third parties that
need to have admittance to it, so just the right people
can access it.
3.2 Integrity
Integrity is defined as the trustworthiness of data in
the systems or resources by the point of view of
avoiding unauthorized and inappropriate changes.
3.3 Availability
Availability discusses to the ability to access data of a
resource when it is preferred, as such the information
has importance only if the authorized people can
access at right time. Disagreeing access to data now a
days has become a common attack.
4. APPLICATION SECURITY
Application security comprises measures taken to
develop the safekeeping of an application often by
finding, fixing and preventing security disclosures.
Different methods used are
design, development, deployment, upgrade,
or maintenance. An always developing but largely
reliable set of common security flaws are seen across
different applications.
5. CYBER SECURITY POLICY
The cyber security policy is an emerging task that
offers to the all-inclusive field of Information and
Communication Technology (ICT) users and
benefactors. It comprises −
Home operators
Small, medium, and large Enterprises
Government and non-government entities
It works as a specialist agenda that describes and
escorts the events connected with the security of
cyberspace. It sanctions all sectors and establishments
in scheming appropriate cybersecurity procedures to
encounter their necessities. The policy provides an
outline to effectively protect information, information
systems and networks.
It gives a thoughtful into the Government’s approach
and approach forsecurityofcyberspaceinthecountry.
It also plans some pointers to agree cooperative
working across the public and private sectors to
safeguard information and information systems.
Therefore, the aim of this procedure is to create a
cybersecurity framework, which leads to
comprehensive actions and programs to increase the
security carriage of cyberspace.
5.1 Information Technology Act
The Government of India endorsed The Information
Technology Act with some chief purpose as to provide
authorized acknowledgment for communications
through electronic data interchange (EDI) and other
means of electronic communication commonly
referred to as electronic commerce or E-Commerce.
5.2 National Cyber Security Policy 2013
In India Government revealed a National Security
Policy 2013 on 2 July 2013 for providing economic
benefit to business for implementation of standard
safety practices andmethods and to empowersecurity
of information while in process handling so as to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 280
maintain privacy of resident’s data and reducing
financial losses with strategies as follows-
Safeguarding E-Governance services.
Forming cyber security consciousness.
Producing an assurance framework.
Creating a safeguarded framework.
Developing operative public private partnership.
Decreasing supply chain risks.
6. TIPS TO PREVENT CYBER-CRIMES
Keep reading the latest ways hackers create phishing
scams to gain access to your personal information.
Install a firewall on computer/laptop to keep
unwanted threats and attacks to a minimum.
Be careful while opening emails and clicking links. Be
careful while downloading content from unsupported
causes.
7. CONCLUSIONS
Cybercrime are the one of biggest concern which our
nation is facing in 21st century. With day by day
progress in technology criminals making misuse of
technology, they don’t rob bank or house or they even
don’t stole ornaments, they use mouse cursor and
passwords as weapons for hacking personal or official
important information which is more dangerous than
any other weapon. This leads our nation as well as
their resident to suffer from financial losses. To
overcome these kind of issues and better use of
advanced technology one has to be careful while using
technology and also person or organization should
have disaster or back up plan to be ready in advance if
such scenario happens with them to avoid future
losses. People can be make alert with crimes whichare
happening surroundingsothattheycantakenecessary
precautions while using advanced technology such as
net banking, e-services etc.
REFERENCES
“Handbook of Applied Cryptography” by Alfred J.
Menezes, Paul C. van Oorschot and Scott A. Vanstone.
“Cryptography and Network Security: Principles and
Practice” by William Stallings
Computer and Information Security Handbook, 2nd
Edition by john R.Vacca

Recommandé

A network security policy group project unit 4 (1) july 2015 par
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
687 vues14 diapositives
The new era of Cyber Security IEC62443 par
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
116 vues15 diapositives
Information Security : Is it an Art or a Science par
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
5.5K vues28 diapositives
Information security.pptx par
Information security.pptxInformation security.pptx
Information security.pptxGovt. P.G. College Sendhwa, Barwani (M.P.)
1.6K vues47 diapositives
Chapter2 the need to security par
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
7.1K vues53 diapositives
102 Information security standards and specifications par
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specificationsSsendiSamuel
589 vues29 diapositives

Contenu connexe

Tendances

Introduction to information security par
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
1.1K vues53 diapositives
Analytical survey of active intrusion detection techniques in mobile ad hoc n... par
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...eSAT Publishing House
593 vues7 diapositives
Introduction to security par
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
3.8K vues37 diapositives
Information security par
Information securityInformation security
Information securityavinashbalakrishnan2
2K vues59 diapositives
IRJET- A Review of Information Systems Security: Types, Security Issues, and ... par
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
9 vues3 diapositives
Security Incidents par
Security IncidentsSecurity Incidents
Security Incidentsbelsis
768 vues12 diapositives

Tendances(20)

Introduction to information security par Dhani Ahmad
Introduction to information securityIntroduction to information security
Introduction to information security
Dhani Ahmad1.1K vues
Analytical survey of active intrusion detection techniques in mobile ad hoc n... par eSAT Publishing House
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ... par IRJET Journal
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET Journal9 vues
Security Incidents par belsis
Security IncidentsSecurity Incidents
Security Incidents
belsis768 vues
Information Technology Security A Brief Overview 2001 par Donald E. Hester
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
Donald E. Hester1.1K vues
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr... par ijtsrd
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd35 vues
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security... par IOSR Journals
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
IOSR Journals480 vues
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security... par Ahmad Sharifi
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
Ahmad Sharifi549 vues
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity par David Sweigert
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
David Sweigert437 vues
Intelligent Network Surveillance Technology for APT Attack Detections par AM Publications,India
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
IRJET- A Review on Intrusion Detection System par IRJET Journal
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
IRJET Journal28 vues
Intrusion detection and anomaly detection system using sequential pattern mining par eSAT Journals
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals529 vues
Computer Security Policy D par guest34b014
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
guest34b014700 vues

Similaire à Cyber Security

Cyber Security Intelligence par
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
55 vues5 diapositives
Cyber Security.pptx par
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxAnushkaThakur11
6 vues17 diapositives
Network Security of Data Protection par
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
98 vues20 diapositives
Fundamental Areas of Cyber Security on Latest Technology par
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
85 vues3 diapositives
CYBERSECURITY.pptx par
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
4 vues10 diapositives
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis par
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
3 vues5 diapositives

Similaire à Cyber Security(20)

Cyber Security Intelligence par ijtsrd
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd55 vues
Network Security of Data Protection par UthsoNandy
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy98 vues
Fundamental Areas of Cyber Security on Latest Technology par ijtsrd
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd85 vues
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis par IRJET Journal
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal3 vues
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto... par IRJET Journal
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal21 vues
CYBER SECURITY.pptx par Malu704065
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
Malu704065162 vues
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks par IRJET Journal
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
IRJET Journal8 vues
Concept Of Cyber Security.pdf par FahadZaman38
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
FahadZaman38196 vues
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System par IRJET Journal
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal5 vues
IRJET- Security from Threats of Computer System par IRJET Journal
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal52 vues
Network Security and Privacy in Medium Scale Businesses in Nigeria par INFOGAIN PUBLICATION
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
Data Storage Issues in Cloud Computing par ijtsrd
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd87 vues
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf par sulu98
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
sulu9886 vues
Computer Security Policy par everestsky66
Computer Security PolicyComputer Security Policy
Computer Security Policy
everestsky661.1K vues
4b - Security Management - Cyber Security Mgt (1).pptx par romawoodz
4b - Security Management - Cyber Security Mgt (1).pptx4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx
romawoodz1 vue

Plus de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL par
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
22 vues7 diapositives
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 vues7 diapositives
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 vues5 diapositives
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 vues11 diapositives
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 vues6 diapositives
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 vues5 diapositives

Plus de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL par IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal22 vues
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... par IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 vues
Identification, Discrimination and Classification of Cotton Crop by Using Mul... par IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 vues
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... par IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 vues
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... par IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 vues
Performance Analysis of Aerodynamic Design for Wind Turbine Blade par IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 vues
Heart Failure Prediction using Different Machine Learning Techniques par IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 vues
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel par IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 vues
Metro Development and Pedestrian Concerns par IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 vues
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... par IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 vues
Data Analytics and Artificial Intelligence in Healthcare Industry par IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 vues
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... par IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal52 vues
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... par IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal11 vues
Development of Effective Tomato Package for Post-Harvest Preservation par IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 vues
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” par IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 vues
Understanding the Nature of Consciousness with AI par IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 vues
Augmented Reality App for Location based Exploration at JNTUK Kakinada par IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 vues
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... par IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 vues
Enhancing Real Time Communication and Efficiency With Websocket par IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 vues
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... par IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 vues

Dernier

Pull down shoulder press final report docx (1).pdf par
Pull down shoulder press final report docx (1).pdfPull down shoulder press final report docx (1).pdf
Pull down shoulder press final report docx (1).pdfComsat Universal Islamabad Wah Campus
17 vues25 diapositives
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Tsuyoshi Horigome
33 vues16 diapositives
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth par
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for GrowthInnomantra
6 vues4 diapositives
Generative AI Models & Their Applications par
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their ApplicationsSN
8 vues1 diapositive
SUMIT SQL PROJECT SUPERSTORE 1.pptx par
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptxSumit Jadhav
15 vues26 diapositives
Searching in Data Structure par
Searching in Data StructureSearching in Data Structure
Searching in Data Structureraghavbirla63
7 vues8 diapositives

Dernier(20)

Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth par Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 6 vues
Generative AI Models & Their Applications par SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN8 vues
SUMIT SQL PROJECT SUPERSTORE 1.pptx par Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 15 vues
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... par AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli12 vues
GDSC Mikroskil Members Onboarding 2023.pdf par gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil53 vues
Design_Discover_Develop_Campaign.pptx par ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth632 vues
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx par lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7883 vues
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... par csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn5 vues
MSA Website Slideshow (16).pdf par msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla76 vues

Cyber Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 277 Cyber Security Ms.Minal Anant Apandkar Lecturer at VPM’s Polytechnic, Thane ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Cyber security is the form of skills, procedures andperformsintendedtodefendnetworks, computers, programs and data from attack, damage or illegal access. Cyber security involves governing physical access to the hardware and also protecting against impairment that cause due to network access, data and code injection and also due to maladministrationbyoperator.Withincreaseincyber- attacks day by day puts nation at higher risk which needs higher degree of cyber security. Cyber-crimes spoils people or nation’s security and financial health. Hacking, child pornography, child grooming,copyright infringement are frightful issues which makes cyber security at higher priority. Key Words: Security, Theft, Risks, Network attack, Information Technology Act. 1. INTRODUCTION Cyber Security is the process of detecting and preventing any illegal use of laptop/computer. It comprises the process of protection against snoopers from using your private or workplace based computer resources with nasty intent or for their own gains or even for gaining any access to them accidentally.Major regions encircled in cyber security are: 1.1 Application Security Application security incorporates measures taken to improve the security of an application. Different skills used to attain this are design, development, deployment, upgrade or maintenance. To achieve higher degree of application security actions can be taken such as use of application firewall which limits the execution of files or handling of data by specific installed programs and also use of router is also advantageous which prevent the IP address of an individual computer from being directly visible on internet. Also use of conventional firewalls, anti-virus programs, and spyware detection can be used to achieve application security. 1.2 Information Security Information security protects information from illegal admittance to avoid identity theft and to defend discretion. Major practices used to cover this are: a) Identification, validation & approval of user, b) Cryptography. 1.3 Disaster Recovery After natural disaster (flood, earthquakeetc.)orcyber- attack therearechancesoflosingimportantdatawhich is not desirable for official or personal use of computer/laptop. To avoid this disaster recovery plan is must. It is set of policies and procedures to enable the recovery. 1.4 Network Security Network security comprises actions to safeguard the usability, reliability, integrity and security of the network. Effective network security aims a variety of threats and stops them from arriving or spreading on the network. Network security components contain: a) Anti-virus andanti-spyware, b) Firewall,to block unconstitutional access to your network, c) Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks, and d) Virtual Private Networks (VPNs), to provide secure remote access. 2. COMPUTER SECURITY RISKS This is an occasion or action that could cause damage to or loss of computer hardware, software data information, or processing ability.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 278 Fig 1:-Types of Computer Security Risks 2.1 Internet and Network Attack Information transmitted over network having higher security risk than information kept on office premises. Fig -2: Internet and network attack 2.1 .1 Malware Malware are program that act without operator’s awareness and deliberately change the operation. 2.1 .2 Botnets It’s a collection of compromised computers associated to a network such as internet that are used as part of network that attacks other networks, usually for nefarious purposes. 2.1 .3 Back Doors A program or set of commands in a program that allows users to sidestep security controls when retrieving a program, computer or network. 2.1 .4 Spoofing It is a deceitful or nasty exercise in which communication is sent from an unfamiliar causes disguised as a sourceknowntothereceiver.Spoofingis most dominant in communication mechanisms that lack a high level of safety. 2.2 Unauthorized Access and Use Unauthorized access is a use of computer or network without approval. Unauthorized use is the use of computer or its data for unapproved or possibly unlawful activities. 2.3 Hardware Theft Hardware theft is the act of stealing computer equipment. 2.4 Software Theft Software theft occurs when someone steal software media or intentionally erases/copies program or illegally registers and/or activates a program Fig -3: Software Theft 2.5 Information Theft It happens when someone steals personal or confidential information.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 279 2.6 System Failure System failure is the persistent malfunction of the computer. A variation of aspects can prime system failure, comprising aging hardware, natural disaster, electrical power problems, noise, undervoltages and over voltages errors in computer programs. 3. DIFFERENT ELEMENTS IN COMPUTER SECURITY Different elements in computer security are confidentiality, integrity and availability. 3.1 Confidentiality Confidentiality is the disguise of information or possessions. Also, there is a necessity to retain information undisclosed from other third parties that need to have admittance to it, so just the right people can access it. 3.2 Integrity Integrity is defined as the trustworthiness of data in the systems or resources by the point of view of avoiding unauthorized and inappropriate changes. 3.3 Availability Availability discusses to the ability to access data of a resource when it is preferred, as such the information has importance only if the authorized people can access at right time. Disagreeing access to data now a days has become a common attack. 4. APPLICATION SECURITY Application security comprises measures taken to develop the safekeeping of an application often by finding, fixing and preventing security disclosures. Different methods used are design, development, deployment, upgrade, or maintenance. An always developing but largely reliable set of common security flaws are seen across different applications. 5. CYBER SECURITY POLICY The cyber security policy is an emerging task that offers to the all-inclusive field of Information and Communication Technology (ICT) users and benefactors. It comprises − Home operators Small, medium, and large Enterprises Government and non-government entities It works as a specialist agenda that describes and escorts the events connected with the security of cyberspace. It sanctions all sectors and establishments in scheming appropriate cybersecurity procedures to encounter their necessities. The policy provides an outline to effectively protect information, information systems and networks. It gives a thoughtful into the Government’s approach and approach forsecurityofcyberspaceinthecountry. It also plans some pointers to agree cooperative working across the public and private sectors to safeguard information and information systems. Therefore, the aim of this procedure is to create a cybersecurity framework, which leads to comprehensive actions and programs to increase the security carriage of cyberspace. 5.1 Information Technology Act The Government of India endorsed The Information Technology Act with some chief purpose as to provide authorized acknowledgment for communications through electronic data interchange (EDI) and other means of electronic communication commonly referred to as electronic commerce or E-Commerce. 5.2 National Cyber Security Policy 2013 In India Government revealed a National Security Policy 2013 on 2 July 2013 for providing economic benefit to business for implementation of standard safety practices andmethods and to empowersecurity of information while in process handling so as to
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 280 maintain privacy of resident’s data and reducing financial losses with strategies as follows- Safeguarding E-Governance services. Forming cyber security consciousness. Producing an assurance framework. Creating a safeguarded framework. Developing operative public private partnership. Decreasing supply chain risks. 6. TIPS TO PREVENT CYBER-CRIMES Keep reading the latest ways hackers create phishing scams to gain access to your personal information. Install a firewall on computer/laptop to keep unwanted threats and attacks to a minimum. Be careful while opening emails and clicking links. Be careful while downloading content from unsupported causes. 7. CONCLUSIONS Cybercrime are the one of biggest concern which our nation is facing in 21st century. With day by day progress in technology criminals making misuse of technology, they don’t rob bank or house or they even don’t stole ornaments, they use mouse cursor and passwords as weapons for hacking personal or official important information which is more dangerous than any other weapon. This leads our nation as well as their resident to suffer from financial losses. To overcome these kind of issues and better use of advanced technology one has to be careful while using technology and also person or organization should have disaster or back up plan to be ready in advance if such scenario happens with them to avoid future losses. People can be make alert with crimes whichare happening surroundingsothattheycantakenecessary precautions while using advanced technology such as net banking, e-services etc. REFERENCES “Handbook of Applied Cryptography” by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. “Cryptography and Network Security: Principles and Practice” by William Stallings Computer and Information Security Handbook, 2nd Edition by john R.Vacca