Spectrum of Cyber threats & Available Control Mechanisms  

Abstract

The Internet is undoubtedly the largest public data network enabling and facilitating both personal & business communications worldwide. Wireless networking has experienced a tremendous growth becoming an integral part of homes, offices & all type of businesses. It provides many advantages, but it is also coupled with many security threats and alters the organizations overall information security risk profile. Although implementation of technological solution is the usual respond to the wireless security threats and vulnerabilities, wireless security is primarily a management issue. Cyber crime is constantly evolving and the growing increase in the number of threats that use social engineering techniques is causing concern for several businesses. All it takes is for one user to click on a malicious link and a firm’s network can be brought to a grinding halt. But the early days of cyber threats have gone now. Cyber threats have increased in large number. The volume of effect of these attacks has increased tremendously whereas the transaction time has decreased. The sources of attacks and exploitations are difficult to determine within time frames that enable victims to avoid damage, and any defensive measure is likely eventually to fail given the vulnerabilities of most cyber systems and the incapacities of users. In this paper we review different cyber threats and control mechanisms available and how these are affecting the network world. 

Authors and Affiliations

Vikram Mangla , Dr. S. N. Panda,

Keywords

Related Articles

Design of High Speed Binary to Gray Code Converter Using A Novel Two Transistor XOR Gate  

t—In modern era, Ultra low power design has an Active research topic due to its various Applications. In this paper we introduce a novel low power and Area efficient Binary to Gray code converter is implemented...

Simulation and evaluation of convolution encoder for different noisy channel over wireless communication network in CDMA environment 

In this paper we simulate and evaluate the performance of physical layer of wireless communication system of CDMA-2000 specification using radio configuration-3 under forward fundamental channel 1x in terms of bit...

Design and implementation of low power 16 bit ALU with clock gating  

The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern.In this paper a low power 16 bit ALU is...

Enhancing the Slew rate and Gain Bandwidth of Single ended CMOS Operational Transconductance Amplifier using LCMFB Technique  

Industry is continuously researching techniques to reduce power requirements, while increasing speed, to meet the demands of today’s low (battery) powered wireless systems. The operational transconductance amplifier (OTA...

Fault Tolerant Environment in web crawler Using Hardware Failure Detection  

Fault Tolerant Environment is a complete programming environment for the reliable execution of distributed application programs. Fault Tolerant Distributed Environment encompasses all aspects of modern fault-tolerant dis...

Download PDF file
  • EP ID EP146580
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Vikram Mangla, Dr. S. N. Panda, (2013). Spectrum of Cyber threats & Available Control Mechanisms  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(4), 1439-1447. https://europub.co.uk/articles/-A-146580