Open Access Open Access  Restricted Access Subscription Access

Technical Security Known as Cyber Security: A Review

Yash Kumar Bansal, Udit Mamodiya

Abstract


The action of protecting our personal details and information system like networks, personal computers, and applications etc., with proper procedure and technological security measures is known as Cyber Security. Firewalls and antivirus software are essential for safeguarding personal details but not sufficient for the security. As our nation is continuously increasing its cyber infrastructure, we must educate our population about it. It is very important for the nation to introduce and establish the issue of cyber ethics, cyber safety and cyber security in educational system at very early age. An Intrusion Detection System (IDS) is a program used to find what happens or has happened during an execution and tries to find whether the computer has been misused or not. The advancement of information technology and internet services depends heavily on cyber security. Whenever we hear about “cybercrimes” the only word that strikes our mind is cyber security. Many crimes such as website phishing are also the result of illegal use of cyber knowledge by the users. In website phishing, a replica of trustful website is created to deceive user and their credentials. This study focuses on cyber security adopting new technologies such as cloud computing, mobile computing etc.


Keywords


Cyber security, domain, software, digital, security, risks, infrastructure, virus, root kit, encryption

Full Text:

PDF

References


Amoroso E. Cyber Security. New Jersey: Silicon Press; 2006.

Baldwin DA. The Concept of Security. Rev Int Stud. 1997; 23(1): 5–26.

Barabási AL, Albert R. Emergence of Scaling in Random Networks. Science. 1999; 286(5439): 509–512.

Buzan B, Wæver O, De Wilde J. Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner Publishers; 1998.

Canongia C, Mandarino R. Cybersecurity: The New Challenge of the Information Society. In Crisis Management: Concepts, Methodologies, Tools and Applications. Hershey, PA: IGI Global; 2014; 60–80.

Cavelty MD. Cyber-Security. In: Burgess JP, editor. The Routledge Handbook of New Security Studies. London: Routledge; 2010; 154–162.

Chang FR. Guest Editor’s Column. The Next Wave. 2012; 19(4): 1–2.

CNSS. National Information Assurance Glossary. Committee on National Security Systems (CNSS) Instruction No. 4009: 2010.

Singer PW, Friedman A. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press; 2013.

Public Safety Canada. Terminology Bulletin 281: Emergency Management Vocabulary. Ottawa: Translation Bureau, Government of Canada; 2014.

Friedman AA, West DM. Privacy and Security in Cloud Computing. Issues in Technology Innovation. 2010; 3: 1–13.

Goodall JR, Lutters WG, Komlodi A. Developing Expertise for Network Intrusion Detection. Inf Technol People. 2009; 22(2): 92–108.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Computer Technology & Applications