Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

Abstract

Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.

Authors and Affiliations

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo

Keywords

Related Articles

Securing Gateways within Clustered Power Centric Network of Nodes

Knowledge Networks are gaining momentum within cyber world. Knowledge leads to innovation and for this reason organizations focus on research and information gathering in order to gain and improve existing knowledge. Thi...

Energy and Exergy Analysis of 210 MW Jamshoro Thermal Power Plant

In this paper, thermodynamic analysis of 210 MW dual-fire, subcritical, reheat steam power plant, situated near Jamshoro, Pakistan has been performed. Firstly, the plant is modeled by EES (Engineering Equation Solver) so...

Knowledge Upload Service Using Semantic Based Categorization

AI (Artificial Intelligence) is one of the hot keywords in Computer Science research and development these days. Applications of AI are very diverse that include but not limited to image recognition, voice recognition, i...

Augmentation of Fatigue and Tensile Strength of AA-6061 Processed through Equal Channel Angular Pressing

ECAP (Equal Channel Angular Pressing) is a technique used to enhance the strength of material by grain refinement. In this research, an aerospace grade aluminum alloy-6061 is investigated. The specimens were pressed thro...

Role of Situational Agile Distributed Model to Support Modern Software Development Teams

ADSD (Agile Distributed Software Development) is a growing trend for software development organizations to develop quality software with limited cost and time. However, it gives rise to additional situational challenges....

Download PDF file
  • EP ID EP269378
  • DOI 10.22581/muet1982.1802.12
  • Views 77
  • Downloads 0

How To Cite

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo (2018). Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities. Mehran University Research Journal of Engineering and Technology, 37(2), 359-366. https://europub.co.uk/articles/-A-269378