Spectrum of Cyber threats & Available Control Mechanisms
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
The Internet is undoubtedly the largest public data network enabling and facilitating both personal & business communications worldwide. Wireless networking has experienced a tremendous growth becoming an integral part of homes, offices & all type of businesses. It provides many advantages, but it is also coupled with many security threats and alters the organizations overall information security risk profile. Although implementation of technological solution is the usual respond to the wireless security threats and vulnerabilities, wireless security is primarily a management issue. Cyber crime is constantly evolving and the growing increase in the number of threats that use social engineering techniques is causing concern for several businesses. All it takes is for one user to click on a malicious link and a firm’s network can be brought to a grinding halt. But the early days of cyber threats have gone now. Cyber threats have increased in large number. The volume of effect of these attacks has increased tremendously whereas the transaction time has decreased. The sources of attacks and exploitations are difficult to determine within time frames that enable victims to avoid damage, and any defensive measure is likely eventually to fail given the vulnerabilities of most cyber systems and the incapacities of users. In this paper we review different cyber threats and control mechanisms available and how these are affecting the network world.
Authors and Affiliations
Vikram Mangla , Dr. S. N. Panda,
Data mining approach to evaluate the data lossless Data Compression algorithms
: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression r...
A Study on Handwritten Signature Verification Approaches
People are comfortable with pen and papers for authentication and authorization in legal transactions. Due to increasing the amount of handwritten signatures it is very essential that a person offline hand written signat...
Cluster Based Energy Efficient Sensory Data Collection With Mobile Sink
Wireless sensor network energy efficiency is the important factor of the network lifetime, most of the sensor nodes are present in an isolated urban fields to sensing the data in particular area .These sensor nodes...
A New Multiplier - Accumulator Architecture based on High Accuracy Modified Booth Algorithm
In this paper, a new MAC architecture is developed for high speed performance. The performance can be improved by developing a new carry save adder which is designed by combining multiplication with accumulation. The ove...
XML Query Answering using Tree based Association Rules
Mainly two approaches are used to access XML document: keyword-based search and query-answering. The first one comes from the tradition of information retrieval. Where most searches are performed on the textual con...