Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Chetan Vijaykumar Dalave, Anushka Alok Lodh, Tushar Vijaykumar Dalave
DOI Link: https://doi.org/10.22214/ijraset.2022.47183
Certificate: View Certificate
Today, with modern lifestyles, people have become involved in the life and use of technology. More technology for financial transactions as well as shopping in their cyberspace.At the same time, the protection of knowledge has become increasingly difficult. In addition, the proliferation of social media has led to an increase in online crime or cybercrime. in the world data security plays an important role in information technology. Information with security become one of the major challenges of today. Whenever we think of cybersecurity, we come first think of the \'cybercrimes\' that are spreading every day. Different governments and Businesses take various steps to avoid this form of cybercrime. In addition to numerous cyber security measures, many people are also very worried about it. This paper focuses primarily on cybersecurity concerns related to new technology. It also focuses on the new. Cybersecurity, ethics, and technologies for development that affect cybersecurity.
I. INTRODUCTION
Nowadays people can able to send and receive any form of data can be email or audio or video. With the click of a button, but did he ever? Think about how securely its data ID is being transferred. Or sent to another person safely without anyone. Disclosure of information ??? The answer lies in this Cyber ??Security. Today the Internet is the fastest. Infrastructure is growing in everyday life. Today's technical environment is very up-to-date technology is changing the face of man. By the way, because of these emerging technologies, we are unable to protect our privacy. Very effective information and therefore Cybercrime is on the rise these days. More than 60% today Commercial transactions are done online, so this High-quality security is required for the field. Transparent and excellent transactions. So cyber security has become a recent issue. The scope of Cyber ??security is not limited to security. Information in the IT industry, even different other sectors like cyberspace, etc.
Even the new technologies like cloud computing, mobile computing, e-commerce, net Banking, etc also require a high level of security. Because these technologies are important information about a individual’s person safety has become a necessary thing. Promoting cyber Protection and security of important information Infrastructure is essential for every country. Security and economic well-being to create the Internet are secure (and protects Internet users). Must be for new development Services as well as government policy. The fight against cybercrime is needed. Comprehensive and secure method. Take it technical measures alone cannot stop anyone Crime is important to law enforcement. Agencies are allowed to investigate and take effective action against cybercrime. Many today Nations and governments are working hard. Lawson Cyber ??Securities to Prevent Loss of some important information. Everyone Individuals should also be trained in this cyber. Protect and protect yourself from the rising cybercrime.
II. GOALS OF CYBER SECURITY
The ultimate goal of cybersecurity protect stolen or collaborative data to achieve this we focus on 3 main goals of cyber ??Security.
These purposes practice privacy, Integrity, and availability (CIA) triad, the basis of the whole safety Agenda this CIA Triad model is a safety one model aimed at guiding strategies for data security within the premises of society or corporation. This model is mentioned in a similar place. AIC (Availability, Integrity, and Privacy) to try to sidestep errors Central Intelligence Agency. In introductory remarks, the triads reflect the three most important safety mechanisms. The CIA standards are the same. The greatest exercise of societies and businesses once they add a new application, one does. Record or guarantee access until information. To be completely safe from data, all these should result in safer areas. These are safety strategies that do their best together, and therefore monitoring it can be wrong a policy. The CIA Triad is the highest collective standard. Measurement, selection, and proper safety of tools risk reduction panels.
a. Confidentiality: Guarantee that your complex Statistics can reach recognized users and Safety No information is disclosed Unintentionally. In that case, your key is private and desired. The power adventures that can't be shared Ultimately prevent privacy.
Methods to safeguard Confidentiality:
b. Integrity: Make sure all your data is correct. Reliable and it should not be replaced with one in the show the other reality.
Integrity ensures methods:
c. Availability: Each time the operator has made a request there will be no resources for one part of the data notice of any dispute such as denial of service (DoS). Must be able to get complete proof. for example, if a website is in the hands of an attacker DoS interferes with this ability to get.
III. TRENDS CHANGING CYBER SECURITY
Below are some trends that are having a huge impact on cyber security.
IV. SPECIFIC CYBER SECURITY TECHNOLOGIES
Computer security is a broad topic more important in the world and is highly integrated with networks used to perform important transactions. Cybercrime continues with each passing year the paths that pass and so on protect information with the latest and disruptive technologies, with new one’s cyber tools and threats that everyone faces. Days, not just with organizations challenging how do they protect their infrastructure, but how? They need new platforms and intelligence doing so is not the best solution for cybercrime but we must do our best. Minimize them to keep them safe and secure future in cyberspace.
[1] Integrated Defense Staff, “National Informatics Center”, Ministry of Defense, India [2] VeenooUpadhyay, SuryakantYadav Study of Cyber Security Challenges Its Emerging Trends: Current Technologies International Journal of Engineering Research and Management (IJERM) ISSN: 2349- 2058, Volume-05, Issue-07, July 2018 [3] Yang, Miao, “ACM International Conference Proceeding Series”, vol. 113 [4] Unisys Corporation, “Unisys Descriptive Technology & Trends Points of White Paper Series- Cyber Security” USA, 2011 [5] https://cltc.berkeley.edu/scenario-back-matter/ [6] Cyber Security Strategy of United Kingdom, 2009 [7] ITU Cyber Security Work Program to Assist Development Countries, 2009 [8] Rev. Jonames Burg, TTU WTSA Resolution 50, 2008 [9] ITU Cyber Security Work Program to Assist Development Countries, 2008 [10] Kellermann, “Technology Risk Checklist, Cybercrime and Security”, IIB-2 [11] Luis Corrons, Technical Director, Panda Labs, Bangalore, 2012 [12] Lee, H.; Lee, Y.; Lee, K.; Yim, K. Security Assessment on the Mouse Data using Mouse Loggers. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications, Asan, Korea, 5–7 November 2016 [13] VeenooUpadhyay, SuryakantYadav Study of Cyber Security Challenges Its Emerging Trends: Current Technologies International Journal of Engineering Research and Management (IJERM) ISSN: 2349- 2058, Volume-05, Issue-07, July 2018 [14] https://www.getgds.com/resources/blog/cybersecurity/6-cybersecurity-threats-to-watch-out-for-in-2021 [15] ] Nikita TresaCyriacLipsaSadath Is Cyber Security Enough- A study on Big Data Security Breaches in Financial Institutions 2019 4th International Conference on Information Systems and Computer Networks (ISCON) GLA University, Mathura, UP, India. Nov 21-22, 2019 [16] MdLiakat Ali Kutub Thakur Beatrice Atobatele Challenges of Cyber Security and the Emerging Trends BSCI’19, July 8, 2019, Auckland, New Zealand [17] Kutub Thakur1, Meikang Qiu2?, Keke Gai3, MdLiakat Ali4 An Investigation on Cyber Security Threats and Security Models 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing 978-1-4673-9300-3/15 [18] J. Li. The research and application of multi-firewall technology in enterprise network security. Int’l J. of Security and Its Applications, 9(5):153–162, 2015 [19] Mohsin, M.; Anwar, Z.; Zaman, F.; Al-Shaer, E. IoTChecker: A data-driven framework for security analytics of Internet of Things configurations. Comput.Secur. 2017, 70, 199–223 [20] Ravi Sharma Study of Latest Emerging Trends on Cyber Security and its challenges to Society International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012 1ISSN 2229-5518.
Copyright © 2022 Chetan Vijaykumar Dalave, Anushka Alok Lodh, Tushar Vijaykumar Dalave. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET47183
Publish Date : 2022-10-26
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here