Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities
Journal Title: Mehran University Research Journal of Engineering and Technology - Year 2018, Vol 37, Issue 2
Abstract
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.
Authors and Affiliations
Jawad Hussain Awan, Shahzad Memon, Sheeraz Memon, Niaz Hussain Arijo
Wind Potential Assessment Analysis of Jhampir, District Thatta Sindh, Pakistan
Wind potential analysis is analyzing how much wind energy is available in particular region. It is most important step because the economics of project depends on the site wind resources. Wind plant depends on the variat...
Scalable and Flexible SLA Management Approach for Cloud
Cloud Computing is a cutting edge technology in market now a days. In Cloud Computing environment the customer should pay bills to use computing resources. Resource allocation is a primary task in a cloud environment. Si...
Selection of Best Fit Correlation for Compression Index of Soil from District Bannu
Geotechnical investigation is one of the major steps in the safe and economic design of foundation for any structure. This requires some soil parameters to be established. CI (Compression Index) is one of these parameter...
Development of Entrepreneurial and Marketing Capabilities in Engineering & Technology Based Firms
EM (Entrepreneurial Making) and MC (Marketing Capabilities) play a crucial role in the success of a firm. Many engineering and technology firms are run by people having an engineering degree which have less exposure to m...
A Global Sampling Based Image Matting Using Non-Negative Matrix Factorization
Image matting is a technique in which a foreground is separated from the background of a given image along with the pixel wise opacity. This foreground can then be seamlessly composited in a different background to obtai...