CFP last date
20 January 2025
Reseach Article

Cyber Security Need of Digital Era: A Review

by V. L. Badadare, R. Y. Patil, V. B. Waghmare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 22
Year of Publication: 2018
Authors: V. L. Badadare, R. Y. Patil, V. B. Waghmare
10.5120/ijca2018918002

V. L. Badadare, R. Y. Patil, V. B. Waghmare . Cyber Security Need of Digital Era: A Review. International Journal of Computer Applications. 182, 22 ( Oct 2018), 9-12. DOI=10.5120/ijca2018918002

@article{ 10.5120/ijca2018918002,
author = { V. L. Badadare, R. Y. Patil, V. B. Waghmare },
title = { Cyber Security Need of Digital Era: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 182 },
number = { 22 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number22/30064-2018918002/ },
doi = { 10.5120/ijca2018918002 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:12:07.450119+05:30
%A V. L. Badadare
%A R. Y. Patil
%A V. B. Waghmare
%T Cyber Security Need of Digital Era: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 22
%P 9-12
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this Digital era, we are breathing inside the Cyberspace. Cyberspace is the “Virtual computer world” or one can say it as “Internet Connected System”. In India, we are approaching the modernization, globalization to turn into a smart city. To seek the stimulating ambiance in this smart city we have to depend upon Cyberspace where our private information is becoming more vulnerable, which face up to cyber attacks. The Smartphone era provoked the scene where hackers have more space to attack and destroy the cyber world. On the ground of social media network, people are allowed to share their thinking, emotions, status of life without any restriction which leads to a handshaking condition for hackers. If Cyber security policies are properly executed, it will immobilize cyber threats.

References
  1. V. A. Greiman, Professor, Boston University, USA “Cyber attacks: the fog of identity”, Electronic ISBN: 978-1-5090-5258-5,Print on Demand(PoD) ISBN: 978-1-5090-6172-3,INSPEC Accession Number: 16640583,Publisher: IEEE
  2. Rakesh Singh Kunwar,Priyanka Sharma,“Social media: A new vector for cyber attack”, Publisher: IEEE,Published in: 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring)
  3. Robert M. Clark, Simon Hakim editors,”Cyber Physical Security”,Protecting Critical Infrastructure at the State and Local Level,PP-22-25, ISBN 978-3-319-32822-5, ISBN 978-3-319-32824-9(eBook),© Springer International Publishing Switzerland 2017
  4. Dr.Shobha Bhardwaj, “Cyber securities and Cyber Terrorism”, Published on behalf of V.M. Open University, Kota,2015 ISBN-978-81-8496-580-3
  5. Jeff Melnick, “Top 10 Most Common Types of Cyber Attacks”, Published: May 15, 2018
  6. Jason Rivera, Forrest Hare, “The deployment of attribution agnostic cyber defense constructs and internally based cyberthreat countermeasures”, Publisher: IEEE, Published in: 2014 6th International Conference On Cyber Conflict (CyCon 2014),Tallinn, Estonia
  7. James Graham, Richard Howard, Ryan Olson, “CYBER SECURITY ESSENTIALS”, Auerbach Publications, ©Taylor and Francis Group
  8. G. Gonzalez-Granadillo, S. Dubus, A. Motzek, J. Garcia-Alfaro, E. Alvarez, M. Merialdo, S. Papillon, H. Debar,”Dynamic risk management response system to handle cyber threats”, ELSEVIER, Future Generation Computer Systems, Volume 83,2018,Pages 535-552,
  9. Krerk Piromsopa, Tomas Klima, Lukas Pavlik, “Designing Model for Calculating the Amount of Cyber Risk Insurance”, Publisher: IEEE, Published in: 2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI),Corfu, Greece.
  10. “Over 53,000 cyber security incidents observed in 2017”,PTI,New Dehli. https://www.thehindubusinessline.com/info-tech/over-53000-cyber-security-incidents-observed-in-2017/article22705876.ece
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Cyber Security Cyberspace Cyber attacks Risk Management.