Full Paper View

 

Cyber Security Methodologies and Attack Management

Sachin Kumar Tomar, Pawan Singh,
Review Paper | Journal Paper
Volume 1 , Issue 1 , PP 1-8

Abstract

Cyber Security refers to the processes of protecting data and systems from cyber-attacks. Any firm without security policies and systematic security systems is at large risk and the important data related to that firm are not safe without security policies like. Payment Card Industry and Data Security Standard framework used to protect payment security credit card, debit card, etc. In maintaining access, the hacker inside the target system used to exploit vulnerabilities and password cracking. In today’s era, day by day cybercrimes rises so it raised the requirement of system Security or even the entire network. As more business exercises are being mechanized and an expanding number of PCs are being utilized to store important data, the requirement for secure PC frameworks turns out to be more evident. As a result, network safety issues have become public safety issues.

Key-Words / Index Term

Cyber Security, Terminologies, Attacks, Forensics, Steganography, Cryptography

References

[1] H. Suryotrisongko and Y. Musashi, "Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective," 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA), Kaohsiung, Taiwan, 2019, pp. 162-167, doi: 10.1109/SOCA.2019.00031.
[2] Y. Liu, H. Qin, Z. Chen, C. Shi, R. Zhang and W. Chen, "Research on Cyber Security Defense Technology of Power Generation Acquisition Terminal in New Energy Plant," 2019 IEEE International Conference on Energy Internet (ICEI), Nanjing, China, 2019, pp. 25-30, doi: 10.1109/ICEI.2019.00011
[3] F. Alkhudhayr, S. Alfarraj, B. Aljameeli and S. Elkhdiri, "Information Security:A Review of Information Security Issues and Techniques," 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 2019, pp. 1-6, doi: 10.1109/CAIS.2019.8769504.
[4] C. Ten, G. Manimaran and C. Liu, "Cybersecurity for Critical Infrastructures: Attack and Defense Modeling," in IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol. 40, no. 4, pp. 853-865, July 2010, doi: 10.1109/TSMCA.2010.2048028.
[5] K. Thakur, M. Qiu, K. Gai and M. L. Ali, "An Investigation on Cyber Security Threats and Security Models," 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY, 2015, pp. 307-311, doi: 10.1109/CSCloud.2015.71.
[6] . J. Akram and L. Ping, "How to build a vulnerability benchmark to overcome cybersecurity attacks," in IET Information Security, vol. 14, no. 1, pp. 60-71, 1 2020, doi: 10.1049/iet-ifs.2018.5647.
[7] R. Dong, X. Li, Q. Zhang and H. Yuan, "Network intrusion detection model based on multivariate correlation analysis – long short-time memory network," in IET Information Security, vol. 14, no. 2, pp. 166-174, 3 2020, doi: 10.1049/iet-ifs.2019.0294.
[8] F. Yan, Y. Jian-Wen and C. Lin, "Computer Network Security and Technology Research," 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation, Nanchang, 2015, pp. 293-296, doi: 10.1109/ICMTMA.2015.77.
[9] Q. Meng, D. Li and Y. Ma, "Research and Application Based on Network Security Monitoring Platform and Device," 2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia), Chengdu, China, 2019, pp. 716-719, doi: 10.1109/ISGT-Asia.2019.8881520.
[10] T. Ohta and T. Chikaraishi, "Network security model," Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93, Singapore, 1993, pp. 507-511 vol.2, doi: 10.1109/SICON.1993.515640.
[11] E. Morioka and M. S. Sharbaf, "Digital forensics research on cloud computing: An investigation of cloud forensics solutions," 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 2016, pp. 1-6, doi: 10.1109/THS.2016.7568909.