CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Importance of Cyber Security

by Rajesh Kumar Goutam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 7
Year of Publication: 2015
Authors: Rajesh Kumar Goutam
10.5120/19550-1250

Rajesh Kumar Goutam . Importance of Cyber Security. International Journal of Computer Applications. 111, 7 ( February 2015), 14-17. DOI=10.5120/19550-1250

@article{ 10.5120/19550-1250,
author = { Rajesh Kumar Goutam },
title = { Importance of Cyber Security },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 7 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number7/19550-1250/ },
doi = { 10.5120/19550-1250 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:14.526959+05:30
%A Rajesh Kumar Goutam
%T Importance of Cyber Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 7
%P 14-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Governments, military, organizations, financial institutions, universities and other businesses collect, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyber attacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information. We demonstrate that hacking is now common and harmful for global economy and security and presented the various methods of cyber attacks in India and worldwide.

References
  1. Lipson. Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Carnegie Mellon Software Engineering Institute, Pittsburgh, November 2002.
  2. A Report from United Nations offices on drugs and crime (UNODC), the use of the Internet for terrorist purposes, New York, USA, 2012.
  3. A Report available on http://searchsoa. techtarget. com/definition/cyberspace.
  4. A Report available on http://www. businessdictionary. com/definition/cyberspace. html.
  5. A Report form CISCO, Cybersecurity: Everyone's Responsibility, 2010.
  6. A Fifty Second Report. Cyber Crime, Cyber Security and Right to Privacy, Ministry of Communications and Information Technology, Department of Electronics and Information Technology, Govt. of India, February 2014.
  7. A Report, Digital India 2014, IAMAI 2013.
  8. Gisela Wurm, Stalking, A Report before Committee on Equality and Non-Discrimination, June 2013.
  9. A Report available at http://searchsecurity. techtarget. com/definition/mail-bomb.
  10. A Report available at http://www. businessdictionary. com/definition/e-mail-bomb. html
  11. A Report availale at http://www. sse. gov. on. ca/mcs/en/pages/identity_theft. aspx
  12. A Report available at http://www. rcmp-grc. gc. ca/scams-fraudes/id-theft-vol-eng. htm.
  13. A Report available at http://www. webopedia. com/DidYouKnow/Internet/virus. asp.
  14. A Fifty Second Report. Cyber Crime, Cyber Security and Right to Privacy, Ministry of Communications and Information Technology, Department of Electronics and Information Technology, Govt. of India, February 2014.
  15. A Report on Internet Security Threat Report 2014, Symantec Corporation, Volume 19, April 2014.
  16. A Report on, Crime in India 2013 compendium, National Crime records Bureau, Ministry of Home affairs, Govt. of India.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber security Cyberspace Cybercrime.