Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

Abstract

Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.

Authors and Affiliations

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo

Keywords

Related Articles

Detection and Classification of Rice Diseases: An Automated Approach Using Textural Features

Image processing techniques are widely used for the detection and classification of diseases for various plants. The structure of the plant and appearance of the disease on the plant pose a challenge for image processing...

Ontology-Based Verification of UML Class/OCL Model

Software models describe structures, relationships and features of the software. Modern software development methodologies such as MDE (Model Driven Engineering) use models as core elements. In MDE, the code is automatic...

Optimization of Sono-Electrocoagulation Process for the Removal of Dye Using Central Composite Design

Sono-electrocaogulation process was successfully applied for the removal of RR120 (Reactive Red 120) in the presence of activated carbon. For this purpose, the process variables were optimized using CCD (Central Composit...

Scalable and Flexible SLA Management Approach for Cloud

Cloud Computing is a cutting edge technology in market now a days. In Cloud Computing environment the customer should pay bills to use computing resources. Resource allocation is a primary task in a cloud environment. Si...

Comparative Study of White Layer Characteristics for Static and Rotating Workpiece during Electric Discharge Machining

EDMed (Electric Discharge Machined) surfaces are unique in their appearance and metallurgical characteristics, which depend on different parameter such as electric parameters, flushing method, and dielectric type. Conven...

Download PDF file
  • EP ID EP269378
  • DOI 10.22581/muet1982.1802.12
  • Views 85
  • Downloads 0

How To Cite

Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo (2018). Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities. Mehran University Research Journal of Engineering and Technology, 37(2), 359-366. https://europub.co.uk/articles/-A-269378