Identifying Various Risks in Cyber-Security and Providing a Mind-Map of Network Security Issues to Mitigate Cyber-Crimes

Author(s):  
Neelam Saleem Khan ◽  
Mohammad Ahsan Chishti ◽  
Mahreen Saleem

Cyber Security is the protection of unauthorized access of the information. Different threat and issues are present in the network which stole unpredictable amount of data every year. For the information technology and computer systems, a cyber security rule is required to compel different group as well as businesses to secure their systems and information from cyber-attacks. In the healthcare sector huge amount of data can be theft every year which is dangerous for both government and personal view. The technical advancements have increased the risk’s potential in the network in Cloud and Cyber. Security & privacy cracks are the vital issues which need to mitigate to maintain the dignity of the network. This paper conducted a review to secure the network from network security issues. There are various attacks which are vulnerable to the network like DoS, DDoS and Spoofing. These attacks have been described to identify the attacker’s capability. In order to facilitate this, networks such as cloud, ad-hoc, cyber has been described to determine the security, a paradigm. A literature from past studies has been conducted to identify the threats and their behavior. Different types of attacks and their behavior is also studied, and a tabular structure is also presented for better understanding.


Author(s):  
Ch. Mary Pushpa ◽  
K.V.M Udaya Lakshmi ◽  
S. Hepsibha

This paper will discuss the topic of ethical hacking, which is also called penetration testing. It starts by briefing about the ethical hacking introduction and its key protocols. It will further discuss the varied classifications of hacking and explain the causes for the swift rise in the cyber-crimes and their impact on socio-economic growth. The advantages and limitations of ethical hacking are also listed. It will further discuss the steps involved in ethical hacking, who is allowed to conduct ethical hacking, and its importance in order to reduce the effect of these attacks, penetration tests are highly required, to consider an acceptable solution for this task. Results from the case study shows that there are negative impacts where the society suffers from cybercrimes and why the computer or networking tools are targeted for the crimes. Ethical hacking education can provide the future professionals to combat the future cyber security issues.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2022 ◽  
Author(s):  
Nitul Dutta ◽  
Nilesh Jadav ◽  
Sudeep Tanwar ◽  
Hiren Kumar Deva Sarma ◽  
Emil Pricop

2015 ◽  
Vol 16 (3) ◽  
pp. 4-14 ◽  
Author(s):  
James Burns ◽  
Georgia Bullitt ◽  
Howard Kramer ◽  
Jack Habert ◽  
James Doench

Purpose – To explain the requirements of Regulation Systems Compliance and Integrity (“Regulation SCI”) and the new responsibilities of organizations defined as “SCI entities.” Design/methodology/approach – Explains the purpose of Regulation SCI, the responsibilities of SCI entities, systems covered by the rules (“SCI systems”), and specific obligations of SCI entities, including the establishment and periodic review of policies and procedures, compliance with the Exchange Act, designation of “responsible SCI personnel,” appropriate corrective action in response to “SCI events,” notification of systems changes, annual “SCI reviews,” business continuity and disaster recovery testing, and recordkeeping and filing. Discusses future implications for SCI Entities and other market participants. Findings – Regulation SCI launches a broad and extensive overlay of rules and guidance to address systems capacity and integrity issues that have increasingly affected the securities markets. The adoption of this regulation suggests that there will continue to be increased scrutiny by the SEC, FINRA and other regulators of the automated systems and related policies and procedures of all market participants. Practical implications – SCI entities will need to devote considerable attention and resources not just to prevent incidents where possible, but also to establish systems for ensuring thorough compliance and well-documented and reasonable follow-up actions where necessary. All market professionals – including broker-dealers, investment advisers, pension funds and investment companies – should study the new regulation and consider adopting appropriate policies and procedures to address operating as well as cyber security issues with respect to their own critical operating technology. Originality/value – Practical guidance from experienced financial services lawyers.


Sign in / Sign up

Export Citation Format

Share Document