To see the other types of publications on this topic, follow the link: Cyber Security.

Journal articles on the topic 'Cyber Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

G, Anusha. "Cyber Security." International Journal of Research Publication and Reviews 4, no. 4 (April 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manoj Thakur Neha, Rajani. "Cyber Security." International Journal of Science and Research (IJSR) 13, no. 1 (January 5, 2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (August 1, 2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.

Full text
Abstract:
Abstract Cyber Security accepts a vigorous role in the area of information technology. Safeguarding the information has become an enormous problem in the current day. The cybersecurity the main thing that originates in mind is ‘cyber crimes’ which are aggregate colossally daily. Different governments and organizations are taking numerous measures to keep these cyber wrongdoings. Other than different measures cybersecurity is as yet a significant worry to many. This paper mostly emphases on cyber security and cyber terrorism. The significant trends of cybersecurity and the consequence of cybersecurity discuss in it. The cyber-terrorism could make associations lose billions of dollars in the region of organizations. The paper also explains the components of cyber terrorism and motivation of it. Two case studies related to cybersecurity also provide in this paper. Some solution about cyber security and cyber terrorism also explain in it.
APA, Harvard, Vancouver, ISO, and other styles
4

Kenzhebayeva, Z. E., G. Zh Isabayeva, and Zh K. Zhunusova. "CYBER SECURITY." REPORTS 6, no. 322 (December 15, 2018): 21–24. http://dx.doi.org/10.32014/2018.2518-1483.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yue, On-Ching. "Cyber security." Technology in Society 25, no. 4 (November 2003): 565–69. http://dx.doi.org/10.1016/j.techsoc.2003.09.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Subba, Dhirodatta. "Cyber Security." SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES 4, no. 1 (May 1, 2013): 60–71. http://dx.doi.org/10.51818/sjhss.04.2013.60-71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moses-Òkè, Roseline Obada. "Cyber Capacity without Cyber Security." Journal of Philosophy, Science & Law 12, no. 1 (2012): 1–14. http://dx.doi.org/10.5840/jpsl20121211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

O'Connell, M. E. "Cyber Security without Cyber War." Journal of Conflict and Security Law 17, no. 2 (July 1, 2012): 187–209. http://dx.doi.org/10.1093/jcsl/krs017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Full text
Abstract:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security refers to the use of artificial intelligence and machine learning technologies to enhance the protection of computer systems and networks from cyber threats such as hacking, malware, phishing, and other forms of cyberattacks. AI-powered security solutions are designed to automate the process of detecting, analyzing, and responding to security incidents in real-time, thereby improving the efficiency and effectiveness of cyber defense. These solutions can analyze large amounts of data, identify patterns and anomalies, and make decisions faster and more accurately than humans alone, enabling organizations to stay ahead of evolving cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Rademaker, Michel. "Assessing Cyber Security 2015." Information & Security: An International Journal 34 (2016): 93–104. http://dx.doi.org/10.11610/isij.3407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bhatia, Deepshikha. "A Comprehensive Review on the Cyber Security Methods in Indian Organisation." International Journal of Advances in Soft Computing and its Applications 14, no. 1 (March 28, 2022): 103–24. http://dx.doi.org/10.15849/ijasca.220328.08.

Full text
Abstract:
Abstract Cyber security, an application that protects and controls the systems, programs, networks, data and devices from cyber-attacks. This cyber security practice used by individuals and small or large organizations for protecting against unusual data access. A powerful cyber security system provides a great security against malware attacks, viruses, ransom ware, cloud attacks, IoT attacks etc. and it designed for accessing, destroying, deleting and altering these attacks and secure the retrieving data from the server and user’s systems. This paper discuss about the importance of cyber security in organizations of India. Surveys of Indian organization’s cyber security measures are taken for the evaluation of the methods and challenges of cyber security. This comprehensive review provides insights about securing the data by employing cyber security frame works, risk assessment models and educating cyber security knowledge among public with help of government public programs. With these information this paper helps for overcoming the cyber threats and attacks and created a pre cautionary thought and also made a pre vision for diminishing theft of data among employees and tracking hacker’s activities before attacking the organizations. Keywords: cyber security, Indian organization, cyber-attacks, cyber security methods, DDoS attack.
APA, Harvard, Vancouver, ISO, and other styles
12

Shukla, Mayur. "A Study on the Parameters that Affect Cyber Security." International Journal of Research in Engineering, Science and Management 3, no. 9 (September 13, 2020): 15–16. http://dx.doi.org/10.47607/ijresm.2020.276.

Full text
Abstract:
Cyber Security plays an important role in the field of computer science information technology. Securing the information from have become one of the biggest challenges in the present day. This study will use primary data collection tools (questionnaire) to collect information from respondents. This paper mainly focuses on challenges faced by cyber security. It also focuses on latest about the cyber security techniques and the trends changing the face of cyber security. cyber security is becoming very important topic to work on and covering various different type of cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
13

Bora, Rajani. "Challenges and Emerging Trends in Cyber Security." Shodh Sari-An International Multidisciplinary Journal 02, no. 03 (July 1, 2023): 26–41. http://dx.doi.org/10.59231/sari7590.

Full text
Abstract:
Cyber Security plays a very important role in the field of information technology. Securing the information has become one of the biggest challenges in the contemporary society. Whenever we think about the cyber security, the first thing that comes to our mind is ‘cyber crimes’ which are increasing tremendously day by day. Various government authorities and private organizations are taking many measures to prevent these cybercrimes. Besides various measures cyber security is still a very big concern to all of us. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on latest cyber security techniques, ethics and the trends changing the face of cyber security.
APA, Harvard, Vancouver, ISO, and other styles
14

Muhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (February 28, 2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.

Full text
Abstract:
In today's digital age, securing network infrastructure has become a critical concern for organizations of all sizes. With the increasing number of cyber threats, it is essential to implement effective measures to protect sensitive information and prevent unauthorized access to network infrastructure. This article explores the various methods that organizations can use to secure their network infrastructure and maintain the integrity of their sensitive information. This article provides valuable insights into the various methods that organizations can use to secure their network infrastructure and protect their sensitive information against cyber threats. By implementing these methods, organizations can reduce the risk of data breaches, protect their reputation, and ensure the ongoing security of their network infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
15

Sharma, Suman, Yogesh Verma, and Amit Nadda. "Information Security Cyber Security Challenges." International Journal of Scientific Research in Computer Science and Engineering 7, no. 1 (February 28, 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kanu, Ved Prakash Sah, Yusuf Ai Naiem, and Sudha Shanker Prasad. "A Research of Cybersecurity and Threats in Emerging Technologies." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2935–38. http://dx.doi.org/10.22214/ijraset.2022.41858.

Full text
Abstract:
Abstract: Cyber security is crucial in the information technology field in today's world. Because every piece of data is now housed online, securing data has become one of the most challenging responsibilities. The first thing that comes to mind when we think of cyber security is cyber criminals, namely hacking, which is on the rise. To tackle cybercrime, several governments and corporations are pursuing several measures. Aside from spectacular attempts, many people still have concerns about cyber security. This study focuses mostly on the issues that cyber security faces with emerging technology. It also concentrates on the most important aspects of data security, such as methods, ethics, and developments that are transforming the public's belief in cyber security. Keywords: Cyber security, cybercrime, firewall, social media, cloud computing, and hacking
APA, Harvard, Vancouver, ISO, and other styles
17

Mackay, Matthew. "Cyber Mission Assurance for Cyber Security." ITNOW 62, no. 1 (February 17, 2020): 32–33. http://dx.doi.org/10.1093/itnow/bwaa014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

SHARMA, Rishabh. "Cyber Security to Safeguard Cyber Attacks." International Journal of Information Security and Cybercrime 11, no. 2 (December 29, 2022): 50–63. http://dx.doi.org/10.19107/ijisc.2022.02.05.

Full text
Abstract:
A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world. It is defined as an offense committed using computers or internet-enabled devices. Currently, most of the economic, social, and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations, and government institutions, are carried out in cyberspace. Recently, many private companies and government organizations worldwide have been facing the problem of cyber-attacks. With the increasing volume and sophistication of cyberattacks on data at both the personal and organizational levels, there is a greater need to safeguard personal information and sensitive business data. This study aims to comprehensively review the standard advances presented in the cyber security field and investigate the challenges and preventive measures for the proposed methods. Different types of new descendant attacks are considered in detail. The paper will discuss how cyber-attacks steal millions of rupees or dollars from digital wallets and how an individual or organization can save them from such attacks.
APA, Harvard, Vancouver, ISO, and other styles
19

Singh, Ujjwal, and Pawan Singh. "Managing Cyber Security." Journal of Management and Service Science (JMSS) 2, no. 1 (February 25, 2022): 1–10. http://dx.doi.org/10.54060/jmss/002.01.002.

Full text
Abstract:
In the area of information technology, cyber security plays a critical role. In today's world, protecting information has become challenging tasks. When we think of cyber security, the first thing that comes to mind is "cyber-crimes," which are on the rise at an alarming rate. Various governments and organizations are taking a variety of steps to combat cybercrime. Despite many steps, cyber security remains a major issue for many people. This paper focuses on the issues that cyber security faces in the modern era. It also covers the most up-to-date information on cyber security tactics, ethics, and trends that are transforming the face of cyber security.
APA, Harvard, Vancouver, ISO, and other styles
20

Liaropoulos, Andrew N. "Reconceptualising Cyber Security." International Journal of Cyber Warfare and Terrorism 6, no. 2 (April 2016): 32–40. http://dx.doi.org/10.4018/ijcwt.2016040103.

Full text
Abstract:
The cyber security discourse is dominated by states and corporations that focus on the protection of critical information infrastructure and databases. The priority is the security of information systems and networks, rather than the protection of connected users. The dominance of war metaphors in the cyber security debates has produced a security dilemma, which is not sufficiently addressing the needs of people. This article underlines this shortcoming and views cyber security through a human-centric perspective. Freedom of expression and the right to privacy are under attack in the era of cyber surveillance. From a human-centric perspective such rights should be understood as a critical part of cyber security. Human rights protections need to be effectively addressed in the digital sphere and gain their place in the cyber security agendas.
APA, Harvard, Vancouver, ISO, and other styles
21

Kurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (January 2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.

Full text
Abstract:
This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their representatives, and data subjects. This study relied on data gathered through key informant interviews and documentary search. The key informants were drawn from various institutions that deal with cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
22

Singh, Arunabh. "Cyber Security Frameworks." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.

Full text
Abstract:
Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.
APA, Harvard, Vancouver, ISO, and other styles
23

Saha, Goutam Kumar. "Cyber Security Issues." International Journal of Applied Research on Information Technology and Computing 11, no. 3 (2020): 115–19. http://dx.doi.org/10.5958/0975-8089.2020.00012.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Krutz, Daniel E., and Thomas Richards. "Cyber security education." ACM Inroads 8, no. 4 (October 27, 2017): 5. http://dx.doi.org/10.1145/3132217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Streater, K. "Cyber Security Challenge." ITNOW 52, no. 6 (November 1, 2010): 28. http://dx.doi.org/10.1093/itnow/bwq218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Bennett, L. "Cyber Security Strategy." ITNOW 54, no. 1 (February 16, 2012): 10–11. http://dx.doi.org/10.1093/itnow/bws003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Linnhoff-Popien, Claudia. "2. Cyber security." Digitale Welt 2, no. 1 (December 21, 2017): 54. http://dx.doi.org/10.1007/s42354-018-0028-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Harlander, Michaela. "Cyber Security – Weckruf." Digitale Welt 2, no. 2 (March 7, 2018): 7–8. http://dx.doi.org/10.1007/s42354-018-0062-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Linnhoff-Popien, Claudia. "1. CYBER SECURITY." Digitale Welt 3, no. 2 (March 4, 2019): 54–55. http://dx.doi.org/10.1007/s42354-019-0172-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Linnhoff-Popien, Claudia. "2. Cyber Security." Digitale Welt 4, no. 2 (March 11, 2020): 50–51. http://dx.doi.org/10.1007/s42354-020-0261-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Linnhoff-Popien, Claudia. "1. Cyber Security." Digitale Welt 5, no. 1 (December 4, 2020): 16–17. http://dx.doi.org/10.1007/s42354-020-0315-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Subba, Dhirodatta. "Cyber Security Management." SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES 5, no. 2 (December 1, 2014): 101–8. http://dx.doi.org/10.51818/sjhss.05.2014.101-108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Full text
Abstract:
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
APA, Harvard, Vancouver, ISO, and other styles
34

Bekchonova, Shoira B. "PEDAGOGICAL FOUNDATIONS OF CYBER SECURITY." European International Journal of Multidisciplinary Research and Management Studies 02, no. 04 (April 1, 2022): 65–72. http://dx.doi.org/10.55640/eijmrms-02-04-14.

Full text
Abstract:
This article discusses the current topic of cybersecurity in the modern process of globalization, the need to study and teach the correct use of digital technologies used in pedagogy, in what areas it is used, the dangers posed by viruses, and measures to eliminate them. outlined.
APA, Harvard, Vancouver, ISO, and other styles
35

Charan, Gopalam Venkata Sai. "An Overview of Cyber Security." International Journal of Research Publication and Reviews 5, no. 4 (April 28, 2024): 9293–96. http://dx.doi.org/10.55248/gengpi.5.0424.1127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Galinec, Darko. "Cyber Security and Cyber Defense: Challenges and Building of Cyber Resilience Conceptual Model." International Journal of Applied Sciences & Development 1 (March 1, 2023): 83–88. http://dx.doi.org/10.37394/232029.2022.1.10.

Full text
Abstract:
Cyber security encompasses a broad range of practices, tools and concepts related closely to those of information and operational technology security. Cyber security is distinctive in its inclusion of the offensive use of information technology to attack adversaries. Use of the term cyber security as a key challenge and a synonym for information security or IT security misleads customers and security practitioners and obscures critical differences between these disciplines. Recommendation for security leaders is that they should use the term cyber security to designate only security practices related to the defensive actions involving or relying upon information technology and/or operational technology environments and systems. Cyber defense is a computer network defense mechanism which includes response to actions and critical infrastructure protection and information assurance for organizations, government entities and other possible networks [3]. In this paper, we investigate how cyber security and cyber defense may lead to cyber resilience with the novel model of cyber resilience designed and presented. Furthermore, within the same model authors investigate actions for cyber security and cyber defense in conditions of increasing challenge of cyber-attacks and the limited capabilities to respond to this threat describing the process of creation, performance and future of EU Cyber Rapid Response Teams (abbr. CRRT) and Mutual Assistance in Cyber Security, introducing novel approach to cyber security and cyber defense at the EU level.
APA, Harvard, Vancouver, ISO, and other styles
37

Kovács, László. "National Cyber Security as the Cornerstone of National Security." Land Forces Academy Review 23, no. 2 (June 1, 2018): 113–20. http://dx.doi.org/10.2478/raft-2018-0013.

Full text
Abstract:
Abstract The more advanced digital economy and society a country has the more exposed it is to cyber threats. Consequently, countries with advanced digital economy and digital infrastructure naturally need to pay more attention to protecting cyber space. Today it is a national security issue and it can no longer be argued that cyber security is its indispensable part. Accordingly, a national cyber security strategy has to be built on national security strategy. That is the main reason for using the word “cornerstone” in the title of this study. The relation between national security and national cyber security means a specific context, which is one of the subjects of our examination in this study. Today, most countries have a cyber security strategy. However, these strategies are mostly static documents that do not or only partially can handle the dynamism that characterizes cyberspace. This paper focuses on the key issues that are needed for developing a usable cyber security strategy.
APA, Harvard, Vancouver, ISO, and other styles
38

Lehto, Martti. "The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies." International Journal of Cyber Warfare and Terrorism 3, no. 3 (July 2013): 1–18. http://dx.doi.org/10.4018/ijcwt.2013070101.

Full text
Abstract:
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.
APA, Harvard, Vancouver, ISO, and other styles
39

Rahman, S. R. "A Fussy Based Neural Genetic Algorithm for Securing Data in Cyber Security." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 2 (June 30, 2022): 79–85. http://dx.doi.org/10.17762/ijfrcsce.v8i2.2081.

Full text
Abstract:
Businesses are using cyber security technologies more and more to upgrade their operations. These businesses are prone to hazards and cyber security breaches because to the very specialized characteristics of such settings, including their sensitive exchange of cyber security data and the weak design of connected devices. Our main goal is to develop a cyber security system that can take into account all potential forms of assaults while staying within the allocated budget. To achieve this, a financial strategy based on portfolio management is utilized by enabling the selection of a portfolio of security controls that maximizes security level control while minimizing direct expenses. To solve this problem we proposed Fussy Based Neural Genetic Algorithm for authenticity, reliability and confidentiality of cyber security data and it decreases the danger of cyber security data integrity. Using a complex key, the plaintext is first transformed into a complex cipher text. The key is created using logical operators and is randomly chosen from the cyber security data. By applying principles of proposed algorithm, the cipher text acquired in the first step is rendered even more unreadable in the second phase. Feature Extraction of cyber security data is done by Principle Component Analysis (PCA).The data is encrypted by using Data Encryption Standard (DES). The data is decrypted using the proposed Fussy Based Neural Genetic Algorithm with Particle Swarm Optimization (FNGA-PSO).The suggested model's metrics are examined and compared to various traditional algorithms. This model solves the lack of difference in the authenticity of cyber security information, as well as it will give real and effective information to the organizational companies.
APA, Harvard, Vancouver, ISO, and other styles
40

Rahul Kumar Jha, Sumina Neupane, and Roshan Raj Bhatt. "A Comprehensive Approach to Securing Power Converters: Cyber-Physical Integration." December 2023 2, no. 2 (December 2023): 256–87. http://dx.doi.org/10.36548/rrrj.2023.2.003.

Full text
Abstract:
This paper presents a novel approach for integrating cyber-physical security measures into power converters. As the demand for renewable energy sources continues to grow, the importance of securing the power grid against cyber-attacks becomes increasingly critical. Power converters are a key component of the grid, and their vulnerability to cyber-attacks presents a significant risk to the security and reliability of the system. In this study, a solution that combines traditional physical security measures with advanced cyber-security techniques to provide a comprehensive approach to protecting power converters is proposed. Our approach includes the use of secure communication protocols, intrusion detection systems, and advanced encryption algorithms to safeguard against cyber-attacks. The use of physical security measures, such as tamper-evident seals and monitoring systems, to protect against physical attacks is also explored. The results demonstrate the effectiveness of the approach in mitigating both cyber and physical security threats to power converters, and highlight the importance of integrating cyber-physical security measures into critical infrastructure systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Kohli, Arushi, and Akshay Raina. "Cyber Security Issues and Recommendations." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 1, no. 3 (March 31, 2014): 12–20. http://dx.doi.org/10.53555/nncse.v1i3.522.

Full text
Abstract:
Cyber Security is of real concern in today's period of figuring to secure information, system assets, and other discriminating data of an association. This paper presents prologue to digital security and the different dangers to the digital security and how these dangers can be determined. This paper additionally portrays the different difficulties of cyber security in India and Internet wrongdoing developing arou nd the globe. Cyber security is currently not limited just to utilization of Internet on a Desktop PC yet securing data on Tablets, PDAs as they got to be paramount correspondence medium due to innovative progressions adult quickly in recent years. To determination issues identified with digital security the group of security scientists including the educated community, the private segment and government area must cooperate to comprehend the rising dangers to the figuring scene.
APA, Harvard, Vancouver, ISO, and other styles
42

Akhtar, Noureen. "Emerging Cyber Security Challenges: Implications for Iranian National Security." BTTN Journal 2, no. 2 (December 30, 2023): 82–103. http://dx.doi.org/10.61732/bj.v2i2.58.

Full text
Abstract:
In the third decade of 21st century, cyber security has become a completely developed national security paradigm like other prominent security paradigms such as physical security, economic security, and food security. Unmatched pace of technological advancements in the fields of Information Technology, Artificial Intelligence, automation, and communication services have transformed key processes of governance, commerce, and trade from physical to cyber space. As human dependence on cyber technologies increased new questions about the prevailing security models has come to the fore during the same time. Concepts like network security, data security or infrastructure security are no longer isolated domains but have transformed as securitization of cyber domain has become an ongoing global phenomenon. This paper focuses on how this transformation of geopolitical conflicts, from physical to cyber arena, is taking place where traditional concepts of conventional war are changing. It also examines how cyber security threat matrix is diametrically different from all prevailing military doctrinal construct? These questions certainly demand a new theoretical framework that can put this rapidly emerging new security paradigm. This study attempts to address this important question as well while taking the international and regional developments with special focus on the emerging cyber security domain in Iran.
APA, Harvard, Vancouver, ISO, and other styles
43

von Solms, Rossouw, and Johan van Niekerk. "From information security to cyber security." Computers & Security 38 (October 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Priya, Mrs A. Lakshmi, and S. Letitia. "Dual Watermarking in Cyber Security." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (March 4, 2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.

Full text
Abstract:
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
APA, Harvard, Vancouver, ISO, and other styles
45

Dol, Ganraj Rajendra. "A Research on Cyber Security And Cyber Coercion." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 2110–12. http://dx.doi.org/10.22214/ijraset.2021.35455.

Full text
Abstract:
Cyber Security accepts an active role within the space of data technology. Safeguarding the knowledge has become a vast downside within the current day. The cyber security the most issue that originates in mind is 'cyber crimes' that are combination colossally daily. completely different governments and organizations are taking various measures to stay these cyber wrongdoings. aside from completely different measures cyber security is until now a major worry to several. This paper principally emphases on cyber security and cyber coercion. the numerous trends of cyber security and also the consequence of cyber security discuss in it. The act of terrorism might build associations lose billions of bucks within the region of organizations. The paper conjointly explains the parts of cyber coercion and motivation of it. 2 case studies associated with cyber security conjointly offer during this paper. Some answer concerning cyber security and cyber coercion conjointly justify in it.
APA, Harvard, Vancouver, ISO, and other styles
46

Park, Soo-Youl, Wook-Jin Choi, Bo-Heung Chung, Jeong-Nyeo Kim, and Joo-Man Kim. "The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks." IEMEK Journal of Embedded Systems and Applications 7, no. 5 (October 31, 2012): 255–65. http://dx.doi.org/10.14372/iemek.2012.7.5.255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

BURKADZE, Khatuna. "Cyber Security and International Law." Journal of Technical Science and Technologies 4, no. 2 (May 20, 2016): 5–10. http://dx.doi.org/10.31578/jtst.v4i2.75.

Full text
Abstract:
In terms of carrying out cyber attacks and cyber warfare, cyber threats represent one of the main challenges for the international and national securities. Nowadays, it is necessary to examine international legal aspects of cyber security. Therefore, the main goal of the paper is to explore issues related to international regulations of cyber operations in order to ensure security of cyber space and avoid cyber threats. Besides, the article elaborates the definition of the term “cyber-attacks” as well as the types of attacks in cyber space. However, it should be mentioned that the use of force is strictly limited in the international law according to the Charter of the United Nations. This Charter was adopted in 1945 when the creation of cyber space was the matter of future rather than considerations of those times. Consequently, the central question of the paper is the following: Could cyber attack be equated to armed attack according to the international law? Answer to this question can provide insights for defining rules of cyber operations in case of cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
48

van der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (December 7, 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.

Full text
Abstract:
Cyber aggression is an increasing threat to international security and stability. While national policies intended to deter cyber aggression may offer some solution in the short term, their effects in the long term are doubtful. National cyber-deterrence policies entail the risk of an on-going cyber arms race and a cycle of escalation between potential cyber opponents. Diplomacy may offer fewer results in the short term, but it is more promising in the long term. Confidence-building measures and international norms and values may not be easy to reach, but in the end they could be more effective (and cheaper) than a single focus on national cyber-deterrence strategies. In the long term, cooperation between states to establish confidence and commonly accepted norms of behaviour in cyber space are the most promising ways available to achieve enduring cyber security and stability. Enhancing interstate co-operation, transparency and predictability of behaviour in cyberspace will reduce the risks of misperception, escalation and conflict.
APA, Harvard, Vancouver, ISO, and other styles
49

Qureshi, Kaif, Aditya Choudhary, Aakash Sharma, Anant Singh, and Kinjal Singh. "Investigating Dynamic Behavioral Analysis For Instantaneous Identification and Reduction of Changing Security Risks on the World Wide Web." International Journal of All Research Education and Scientific Methods 12, no. 05 (2024): 01–14. http://dx.doi.org/10.56025/ijaresm.2023.1205242072.

Full text
Abstract:
Cyber Security plays an important role in the field of information technology. As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. Securing the information have become one of the biggest challenges in the present day. Whenever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber-crimes. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies. It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber. Threats to the integrity, security and dependability of the World Wide Web (WWW) are ever-evolving. Conventional security solutions sometimes find it difficult to keep up with the ever-evolving strategies used by hackers. By combining adaptive security mechanisms designed especially for protecting the WWW with dynamic threat analysis approaches, our research offers a unique way to handle this difficulty.
APA, Harvard, Vancouver, ISO, and other styles
50

Farid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.

Full text
Abstract:
<p>In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security. Cyber actions in the virtual world are developing along with the rapid technology development. Moreover, the state policy on cyber issues is considered as a new threat to individual security. The development of that state security issue is being debated among the theoreticians of international security studies. The concept of securitization explains the phenomenon of cyber issues and receives the attention of many states. Securitization carried out by the United States on Cybercrime issues becomes the initial trigger in viewing cyber actions as a new threat to state security. The object of this paper is more focused on State policy in dealing with cyber threats. Afterward, state policy in facing the cyber threat is seen from the perspective of human security from UNDP. Therefore, there is a debate about the desired security object. State actions to reach state security are then considered as individual privacy security. So, international security now does not only focus on state objects but also on individual, environment, economy, and identity. Thus, every action taken in securing an object does not pose a threat to other security objects.</p><div><p class="Els-keywords">Keywords: Cybercrime, State Security, Human Security, Securitization</p></div>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography