Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

被引:5
|
作者
Awan, Jawad Hussain [1 ]
Memon, Shahzad [1 ]
Memon, Sheeraz [2 ]
Pathan, Kamran Taj [1 ]
Arijo, Niaz Hussain [1 ]
机构
[1] Univ Sindh, Inst Informat & Commun Technol, Jamshoro, Pakistan
[2] Mehran Univ Engn & Technol, Dept Comp Syst Engn, Jamshoro, Pakistan
关键词
Cyber Security; Cyber Crime; Internet; Threats;
D O I
10.22581/muet1982.1802.12
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, avast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [31] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Adam M. Bossler
    American Journal of Criminal Justice, 2021, 46 : 911 - 934
  • [32] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Bossler, Adam M.
    AMERICAN JOURNAL OF CRIMINAL JUSTICE, 2021, 46 (06) : 911 - 934
  • [33] A stochastic model of cyber attacks with imperfect detection
    Fang, Rui
    Li, Xiaohu
    COMMUNICATIONS IN STATISTICS-THEORY AND METHODS, 2020, 49 (09) : 2158 - 2175
  • [34] The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?
    Fabian Teichmann
    Sonia R. Boticiu
    Bruno S. Sergi
    International Cybersecurity Law Review, 2023, 4 (3): : 259 - 280
  • [35] A Model to Facilitate Discussions About Cyber Attacks
    Happa, Jassim
    Fairclough, Graham
    ETHICS AND POLICIES FOR CYBER OPERATIONS: A NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE INITIATIVE, 2017, 124 : 169 - 185
  • [36] Foiling Cyber Attacks
    Guitton, Clement
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [37] HEALTHCARE CYBER ATTACKS
    不详
    JOURNAL OF VASCULAR NURSING, 2019, 37 (04) : 225 - 225
  • [38] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Rasim Alguliyev
    Yadigar Imamverdiyev
    Lyudmila Sukhostat
    Neural Computing and Applications, 2021, 33 : 10211 - 10226
  • [39] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (16): : 10211 - 10226
  • [40] Model for Identifying Cyber Threats to Internet Information Resources
    Luskatov, I. V.
    Pilkevich, S. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 987 - 994