Open Access Open Access  Restricted Access Subscription Access

Safeguarding Data and Networks from Cyberattacks with Advanced Technology and User Awareness

B. M. Rajesh, Santhiya G., Archana C.

Abstract


In the realm of information technology, the role of cybersecurity is of paramount importance due to the escalating concern surrounding information security in the contemporary era. Cybersecurity is pivotal in mitigating the pervasive threat of cybercrimes, which transpire on a large scale each day. Governments and organizations globally are actively implementing multifaceted strategies to thwart these cyber threats. Despite various preventive measures, apprehensions regarding cybersecurity persist. This essay predominantly delves into the domain of cyberterrorism and security, elucidating the substantial impact it can have, with organizations potentially incurring billion-dollar losses. The essay further expounds on the constituents and origins of cyberterrorism, offering insights into the multifaceted nature of the issue. Additionally, it provides an overview of various solutions geared towards addressing cyberterrorism and bolstering overall cybersecurity.


Keywords


Cyberspace security, cyberterrorism, information security, Data, Networks

Full Text:

PDF

References


Dervojeda K, Verzijl D, Nagtegaal F, Lengton M, Rouwmaat E. Innovative Business Models: Supply chain finance. Netherlands: Business Innovation Observatory. 2014.

Kumar S, Somani V. Social media security risks, cyber threats and risks prevention and mitigation techniques. Int J Adv Res Comput Sci Manag. 2018; 4(4): 125–9.

Gross ML, Canetti D, Vashdi DR. Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. J Cybersecur. 2017 Mar 1; 3(1): 49–58.

Kumar D, Panchanatham N. A case study on Cyber Security in E-Governance. Int Res J Eng Technol (IRJET). 2015; 2(8): 272–5.

Samuel KO, Osman WR, Al-Khasawneh Y, Duhaim S. Cyber terrorism attack of the contemporary information technology age: issues, consequences and Panacea. Int J Comput Sci Mob Computing. 2014; 3(5): 1082–90.

Bendovschi A. Cyber-attacks–trends, patterns and security countermeasures. Procedia Econ Financ. 2015 Jan 1; 28: 24–31.

Sreenu M, Krishna DV, Devender Nayak N. A General Study on Cyber-Attacks on Social Networks. IOSR J Comput Eng (IOSR-JCE). 2017; 19(5): 01–4.

Sutton D. Cyber Security: A practitioner's guide. BCS Publishing; 2017 Jul 10.

Reddy GN, Reddy GJ. A study of cyber security challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842. 2014 Feb 8.

Cabaj K, Kotulski Z, Księżopolski B, Mazurczyk W. Cybersecurity: trends, issues, and challenges. EURASIP J Inf Secur. 2018 Dec; (1): 1–3.

Sharma R. Study of latest emerging trends on cyber security and its challenges to society. Int J Sci Eng Res. 2012 Jun; 3(6): 1.

Hua J, Bapna S. The economic impact of cyber terrorism. J Strateg Inf Syst. 2013 Jun 1; 22(2): 175–86.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517