Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

Abstract

Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.

Authors and Affiliations

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo

Keywords

Related Articles

Identification of Determinants for Globalization of SMEs using Multi-Layer Perceptron Neural Networks

SMEs (Small and Medium Sized Enterprises) sector is facing problems relating to implementation of international quality standards. These SMEs need to identify factors affecting business success abroad for intelligent all...

Translating Activity Diagram from Duration Calculus for Modeling of Real-Time Systems and its Formal Verification using UPPAAL and DiVinE

The RTS (Real-Time Systems) are widely used in industry, home appliances, life saving systems, aircrafts, and automatic weapons. These systems need more accuracy, safety, and reliability. An accurate graphical modeling a...

Implementation of Cavity Perturbation Method for Determining Relative Permittivity of Non Magnetic Materials

Techniques for the cavity measurement of the electrical characteristics of the materials are well established using the approximate method due to its simplicity in material insertion and fabrication. However, the exact m...

RICCI and Matter Collineations of SOM-ROY Chaudhary Symmetric Space Time

This paper is devoted to explore the RICCI and MCs (Matter Collineations of the Som-Ray Chaudhary spacetime. The spacetime under consideration is one of the spatially homogeneous and rotating spacetimes. Collineations ar...

Multi-Touch Collaborative Gesture Recognition Based User Interfaces as Behavioral Interventions for Children with Autistic Spectrum Disorder: A Review

This paper addresses UI (User Interface) designing based on multi-touch collaborative gesture recognition meant for ASD (Autism Spectrum Disorder) - affected children. The present user interfaces (in the context of behav...

Download PDF file
  • EP ID EP269378
  • DOI 10.22581/muet1982.1802.12
  • Views 102
  • Downloads 0

How To Cite

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo (2018). Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities. Mehran University Research Journal of Engineering and Technology, 37(2), 359-366. https://europub.co.uk/articles/-A-269378