AN OVERVIEW ON CYBER ATTACKS AND ITS TYPES FOR ENHANCING DATA SECURITY IN BUSINESS WORLD
Journal Title: LAHORE GARRISON UNIVERSITY RESEARCH JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - Year 2017, Vol 1, Issue 4
Abstract
For sensitive data of organizations there is a compelling need of ensuring privacy in several aspects and to inculcate protective measures in systems especially in various high- tech firms. Cyber-attacks are a wide form of threat confronted globally on the web by several users on daily basis. These attacks are fundamentally used to challenge system security of others, there are likewise some moral programmers who get into other people frameworks to make them aware about their vulnerabilities and they also get paid in return for securing such systems. In any case, these assaults have caused a great deal of concern for businessmen. This research covers the major types of cyber-attacks that can affect the business world in an immense manner along with an overview that how these threats work and how they can be possibly prevented. As the hacking mechanisms are showing signs of increased danger in a step by step manner, our frameworks should also take preventive measures to remain safe from all sorts of latest attacks on our data that can possibly attack in various forms.
Authors and Affiliations
NOOR UL QAMAR, KAMRAN MUSTAFA, EISHA TUR REHMAN, SHAN E ZAHRA
LEARNING MANAGEMENT SYSTEM AND ITS IMPLEMENTATION
As the world is moving towards autonomous technology and every aspect of human lives is influenced by technology so does the academics and academic institutions, learning management systems work in academic institutes ac...
Algorithm and Technique for Animation
Fluids simulation particularly water courses such as rivers are an important element to achieve realistic simulations in real-time applications like video games. This work presents a new approach called SiViFlow that sim...
Analyzing and Resolving Issues in Software Project Risk Management
In last decade the main reason for projects failure is poor management of software. But now a day’s most of the organizations are focusing on software project management for making project successful. Software project ma...
Cognitive Experiments and Features for Computing Mental Stress
In this paper, mental stress is computed through cognitive experiments that induce stress. In a controlled laboratory environment, a group of students are involved in a series of mental challenges. While performing the c...
Algorithm for Coding Person’s Names in large Databases / Data Warehouses to Enhance Processing Speed, Efficiency and Reduce Storage Requirements
A technique to codify the names of people in Databases and Data warehouses to reduce the storage requirements and enhance processing speed is presented. It is estimated that the storage requirement can be reduced, which...