• E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2021

    5.610

    Impact Factor 2022

    6.247

  • E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2021

    5.610

    Impact Factor 2022

    6.247

  • E-ISSN:

    2454-9584

    P-ISSN

    2454-8111

    Impact Factor 2021

    5.610

    Impact Factor 2022

    6.247

INTERNATIONAL JOURNAL OF INVENTIONS IN ENGINEERING & SCIENCE TECHNOLOGY

International Peer Reviewed (Refereed), Open Access Research Journal
(By Aryavart International University, India)

Paper Details

IT Security – Threats, Measures and Way Forward

Arham Rahat

44 - 47 Vol. 6, Jan-Dec, 2020
Receiving Date: 2020-10-20;    Acceptance Date: 2020-11-12;    Publication Date: 2020-11-18
Download PDF

Abstract

The dependency on cyberspace by an entity becomes an area of corporate protection increasingly relevant in today's information era. As businesses and various organizations rely more on the cyber world for their day-to-day transactions, the benefits also come with certain IT security risks. In fact, the vulnerability to national security has risen significantly, provided that various organizations' networks are tied together in cyberspace. Cyber protection is constantly endangered. The confidentiality of data is a big concern for cloud consumers. Individual consumers on social network platforms are becoming highly knowledgeable and vulnerable to private details. The top three obstacles in executing effective cloud strategy differ dramatically as per the new International Information Community study among IT and business line firm. With IT, protection issues are (66%), and 42% of the cloud-based ventures have been sent home with security concerns (65%) (Kumar & More 2014). Cheap Swiss omega fake watches UK with best movements are suited for men and women.
2023 UK perfect replica cartier watches with high quality on sale.
1:1 best replica watches UK in discount from online store. Fast shipping. Money back guaranty.
Any company has a duty to secure private or certificate knowledge or data from abroad. Safety initiatives provide security of passwords, app fixes, firewalls, intrusion protection, verification, authorization, auditing, and risk evaluation. During the literature analysis, several organizations have noticed that data protection standards are not being practiced. The result is that analysis is necessary to identify a systematic solution to securing classified information, irrespective of the business sector, and to take effective action.

    References

  1. Kumar, Dr. Ajay & More, Rajesh Mohan (2014), 'A Study of Current Scenario of Cyber Security Practices and Measures,' International Journal of Engineering Research and General Science 2(5)
  2. Akaninyene Walter Udoeyop, ―Cyber Profiling for Insider Threat Detection‖, 8-2010.
  3. Dorothy E. Denning, ―An Intrusion-Detection Model‖, IEEE transactions on software engineering, Vol. SE-13, No. 2, February 1987, 222-232
  4. Douglas Jacobson, ―Security Literacy - Tackling modern threats requires educating the general public about cybersecurity. Information Security Magazine, Volume 13-No.9, 10-2011, 23-24.
  5. George V. Hulme ―SCADA Insecurity-Stuxnet put the Spotlight on critical infrastructure protection but will efforts to improve it come too late? Information Security Magazine, Volume 13-No.1, 2-2011, 38-44.
  6. Amitava Dutta and Kevin McCrohan, ―Management's Role in Information Security in a Cyber Economy‖, California Management Review, Volume 45, No. 1, 2002.
  7. Steffani A. Burd, The Impact ofInformation Security in Academic Institutions on Public Safety and Security: Assessing the Impact and Developing Solutionsfor Policy and Practice, October 2006.
  8. ChiChao et al., ―Cybercrime & Cybercriminals: An Overview of the Taiwan Experience‖, Journal of Computers, Vol. 1, No. 6, September 2006
  9. Keller et al, ―Information security threats and best practices in small business‖, Information Systems Management, Spring 2005, 22, 2, ABI/INFORM Global
  10. Geer, D., Soo Hoo, K., J., Jaquith, A., ―Information Security: Why the Future Belongs to Quants‖, IEEE Security and Privacy, 2003, pp. 32-40.
  11. Michael Naf and David Basin, ―Two Approaches to an Information Security Laboratory‖, Communication Of The ACM, Volume 51, No. 12, 12/2008.
  12. Shumba Rose, ―Home Computer Security Awareness‖, Computer Science Department, Indiana University of Pennsylvania
  13. Paul Marsh, ―Controlling Threats‖, IET Computing & Control Engineering, April/May 2006, 12-17.
Back