Cyber Security in the Era of Networking: A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: Cyber security is an intricate issue, affecting many application domains and straddling many disciplines and fields. Securing the critical infrastructures entails protecting not only the physical systems but, just as important, the cyber portions of the systems on which they rely. Cyber attackers can disrupt critical infrastructures such as financial and air traffic control systems, creating effects that are similar to terrorist attacks in the physical space. They can also carry out individuality theft and financial fraud; steal commercial information such as intellectual property; recruit criminals and others to carry out carnal terrorist activities. What makes cyberspace even more attractive to criminals including non-state actors is that provenance in cyberspace is complex, especially given that cyberspace is borderless and cuts across authorities. Cyber Security Research is one context where the solution to deal with cyber criminals is germinating.
Authors and Affiliations
Ms. Manjiri N. Muley
Improved Energy Conscious Dynamic Source Routing (I-ECDSR) for Adhoc Networks
Abstract: Adhoc network is a collection of mobile devices that have a capability of organizing themselves into a temporary network. Efficient routing is one of the key challenges in Adhoc networks. In this paper, we prop...
A Novel Approach for Identification of Forest Fires using Land Surface Temperature Images
Abstract: Forest fire is those of the natural disasters that cause devastation to economy and environment. In order determine forest fire many of the detecting approaches have been applied. In this paper, we propos...
SQL Injection Prevention by Adaptive Algorithm
Abstract: An SQL Injection is one of the most dangerous security issues. SQL injections are dangerous becausethey are a door wide open to hackers to enter your system through your Web interface and to do whatever t...
Semantic Based Amalgamation of Pulverized Components Using Ontology
Abstract: The problem faced by both software developers and user in development environment and user environment is finding compatible and complementary components in large set of different applications. Different...
Churn Prediction Model Using Linear Discriminant Analysis (LDA)
Abstract: Customer churn refers to customers terminating the service contract with the company or turning to services provided by the other company. Churn analysis is the calculation of the rate of attrition in the custo...