Open Access Open Access  Restricted Access Subscription Access

A Comparative Study About Cyberattacks and Cybersecurity in Real World

Dhaval Chudasama, Ruchika Dungarani

Abstract


In the current scenario, many private companies and government organizations are facing cyberattacks and dangerous wireless communication technologies. Currently, all things depend on electric technology and needs to get protected against cyberattacks issue. The cyberattacks are harming all types of company and government data. Few attacks affected the military and politics like PC viruses, DDOS, malware, etc. Cybersecurity researchers follow various methods to protect data in real-time. This researcher wishes to protect real-world IT data. In this study, researchers investigate the challenges, weaknesses, and strengths; they do at compressive studies and surveys. The research design and framework were discussed in relation to previous history and early generation cybersecurity methods. This study is very useful for companies, governments, end users, and researchers studying cyber insurance and management.


Keywords


Cybersecurity, cyberattack, intelligent agriculture, artificial intelligence (AI), precision agriculture

Full Text:

PDF

References


Aghajani G, Ghadimi N. Multi-objective energy management in a micro-grid. Energy Rep. 2018; 4: 218–225.

Ahmed Jamal A et al. A review on security analysis of cyber physical systems using machine learning. Mater Today: Proc. 2021.

Akhavan-Hejazi H, Mohsenian-Rad H. Power systems big data analytics: An assessment of paradigm shift barriers and prospects. Energy Rep. 2018; 4: 91–100.

Al-Ghamdi MI. Effects of knowledge of cyber security on prevention of attacks. Mater Today: Proc. 2021.

Al Shaer D, et al. Hydroxamate siderophores: Natural occurrence, chemical synthesis, iron binding affinity and use as Trojan horses against pathogens. Eur J Med Chem. 2020; 208: 112791.

Alghamdi MI. Determining the impact of cyber security awareness on employee behaviour: A case of Saudi Arabia. Mater Today: Proc. 2021.

Alghamdie MI. A novel study of preventing the cyber security threats. Mater Today: Proc. 2021.

Alhayani B et al. Best ways computation intelligent of face cyber attacks. Mater Today: Proc. 2021.

Alibasic A et al. Cybersecurity for smart cities: A brief review. In: international Workshop on Data Analytics for Renewable Energy Integration; Springer. 2016.

Alkatheiri MS, Chauhdary SH, Alqarni MA. Seamless security apprise method for improving the reliability of sustainable energy-based smart home applications. Sustain Energy Technol Assess. 2021; 45(1): 101219.

Alzubaidi A. Cybercrime awareness among Saudi nationals: Dataset. Data Brief. 2021; 36(1): 106965.

Amir M, Givargis T. Pareto optimal design space exploration of cyber–physical systems. Internet Things. 2020; 12: 100308.

Arend I et al. Passive- and not active-risk tendencies predict cyber security behavior. Comput Secur. 2020; 97(6221): 101964.

Ashraf J et al. IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustainable Cities Soc. 2021; 72: 103041.

Aziz AA, Amtul Z. Developing Trojan horses to induce, diagnose and suppress Alzheimer’s pathology. Pharmacol Res. 2019; 149: 104471.

Nihal Gulammahiyuddin Shaikh, Dhaval Chudasama. Research on cyber offenses under Information Technology Act, 2000. Recent Trends in Parallel Computing (RTPC). 2021; 8(1): 14–20.

Beechey M, Kyriakopoulos KG, Lambotharan S. Evidential classification and feature selection for cyber-threat hunting. Knowl Based Syst. 2021; 226(3): 107120.

Bullock JA, Haddow GD, Coppola DP. Cybersecurity and critical infrastructure protection. In: Introduction to Homeland Security. 2021.

Bullock JA, Haddow GD, Coppola DP. Introduction to Homeland Security: Principles of All-hazards Risk Management. Chapter 8. 6th Edn. Butterworth-Heinemann; 2020 Oct; 425–497

Cao Y et al. A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification. Comput Secur. 2019; 87: 101478.

Chen J-K et al. Cyber deviance among adolescents in Taiwan: Prevalence and correlates. Child Youth Serv Rev. 2021; 126: 106042.

Cheng S et al. A new hybrid solar photovoltaic/phosphoric acid fuel cell and energy storage system; Energy and exergy performance. Int J Hydrog Energy. 2021; 46(11): 8048–8066.

Damon E et al. Cyber security education: The merits of firewall exercises. In: Akhgar B, Arabnia HR, editors. Emerging Trends in ICT Security. Chapter 31. Boston: Morgan Kaufmann; 2014; 507–516.

Dash N, Chakravarty S, Satpathy S. An improved harmony search based extreme learning machine for intrusion detection system. Mater Today: Proc. 2021. 25. Dhaval Chudasama, Nikhil Rajput. Protecting ourselves from digital crimes. National Journal of Cyber Security Law (NJCSL). 2021; 4(1): 1–6.

Furnell S, Shah JN. Home working and cyber security – an outbreak of unpreparedness? Comput Fraud Secur. 2020; 2020(8): 6–12.

Furnell S et al. Understanding the full cost of cyber security breaches. Comput Fraud Secur. 2020; 2020(12): 6–12.

Gupta Bhol S, Mohanty JR, Kumar Pattnaik P. Taxonomy of cyber security metrics to measure strength of cyber security. Mater Today: Proc. 2021. 29. Dhaval Chudasama. Brief study of cybercrime on an internet. Journal of Communication Engineering & Systems (JoCES). 2021; 11(1): 1–6.

Iqbal Z, Anwar Z. SCERM—A novel framework for automated management of cyber threat response activities. Future Gener Comput Syst. 2020; 108: 687–708.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517