Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

Abstract

Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.

Authors and Affiliations

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo

Keywords

Related Articles

Blind's Eye: Employing Google Directions API for Outdoor Navigation of Visually Impaired Pedestrians

Vision plays a paramount role in our everyday life and assists human in almost every walk of life. The people lacking vision sense require assistance to move freely. The inability of unassisted navigation and orientation...

Investigation of Internet of Things Handover Process for Information Centric Networking and Proxy Mobile Internet Protocol

IoT (Internet of Things) technically connects billions of entities to the Internet. The IoT is divided between the technology and the service itself. As a result, great efforts are needed to join data from many contexts...

Effect of Organizational Structures and Types of Construction on Perceptions of Factors Contributing to Project Failure in Pakistan

The construction industry is viewed as the regulator of national economy globally. Its importance in Pakistan has increased greatly because of the involvement of international funding agencies in infrastructure projects....

Effect of Steel Fibers on Heat of Hydration and Mechanical Properties of Concrete Containing Fly Ash

This study investigated the effects of steel fibers on the fresh and hardened properties, and heat of hydration of concrete containing FA (Fly Ash). A total of 192 samples were cast comprising cubes, cylinders, and prism...

Optimizing WiMAX: Mitigating Co-Channel Interference for Maximum Spectral Efficiency

The efficient use of radio spectrum is one of the most important issues in wireless networks because spectrum is generally limited and wireless environment is constrained to channel interference. To cope up and for incre...

Download PDF file
  • EP ID EP269378
  • DOI 10.22581/muet1982.1802.12
  • Views 89
  • Downloads 0

How To Cite

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo (2018). Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities. Mehran University Research Journal of Engineering and Technology, 37(2), 359-366. https://europub.co.uk/articles/-A-269378