A Detailed Review on Focus Areas of Cyber Security
AUTHORS
N. Thirupathi Rao,Dept. of Computer Science and EngineeringVignan’s Institute of Information Technology (A), Visakhapatnam 530049, AP, India
Debnath Bhattacharyya,Dept. of Computer Science and EngineeringVignan’s Institute of Information Technology (A), Visakhapatnam 530049, AP, India
ABSTRACT
Security is one of the most important factor or point to be considered for everyone in their life. Providing security and breaking the security are two important points to be noted for everyone who can be using the gadgets in these days. The other important factor or the point to be considered was the cyber security. The attacks or the collection go data unethically without the knowledge of the user’s being stolen. The cases or the issues being under this trap are being increased from time to time and day to day in those days. The data to be stolen will be used for various reasons. Some may be using for money collection and some are using it for anti-social elements and unethical issues. Hence, in the current article an attempt has been made to provide a detailed idea of the types of attacks and types of issues and types of malwares that can be attacked and also some suggestions were provided. The important issues to be focused in the case of cyber security issues are given a thought and the details are given a light on it. The readers of this article can get the basic knowledge about the cyber security issues and threats and the steps to be followed such that to escape from these sorts of attacks. Also a focus was given on various aspects such that to escape from these types of security attacks.
KEYWORDS
Cyber security, Nodes, Attacks, Hackers, Firewalls, Network, Segmentation, Wireless networks, Wi-Fi, Malware, Phishing
REFERENCES
[1] PROTECH, https://www.psgi.net/news/posts/10-focus-areas-for-cyber-security, (2019)
[2] CISCO, Cybersecurity, https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html, (2019)
[3] Yu Jun, Kuang Zhenzhong, Zhang Baopeng, Zhang Wei, and Lin Dan “Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing,” IEEE Transactions on Information Forensics and Security, 2018, vol.13, no.5, pp.1317-1332, (2018) DOI: 10.1109/TIFS.2017.2787986(CrossRef)(Google Scholar)
[4] Yu Jun, Tao Dapeng, Li Jonathan, and Cheng Jun “Semantic preserving distance metric learning and applications,” Information Sciences, vol.281, pp.674-686, (2014) DOI: 10.1016/j.ins.2014.01.025(CrossRef)(Google Scholar)
[5] Yu Jun, Yang Xiaokang, Gao Fei, and Tao Dacheng, “Deep multimodal distance metric learning using click constraints for image ranking,” IEEE Transactions on Cybernetics, vol.47, no.12, pp.4014-4024, (2017) DOI: 10.1109/TCYB.2016.2591583(CrossRef)(Google Scholar)
[6] Yu Jun, Zhang Baopeng, Kuang Zhengzhong, Lin Dan, and Fan Jianping, “iPrivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning,” IEEE Transactions on Information Forensics and Security, vol.12, no.5, pp.1005-1016, (2017) DOI: 10.1109/TIFS.2016.2636090(CrossRef)(Google Scholar)
[7] Jia Gangyong, Han Guangjie, Jiang Jinfang, and Li Aohan, “Dynamic time-slice scaling for addressing OS problems incurred by main memory DVFS in intelligent system,” Mobile Networks & Applications, vol.20, no.2, pp.157-168, (2015) DOI: 10.1007/s11036-015-0587-2(CrossRef)(Google Scholar)
[8] Jia Gangyong, Han Guangjie, Wang Hao, and Wang Feng, “Cost aware cache replacement policy in shared last-level cache for hybrid memory-based fog computing,” Enterprise Information Systems, vol.12, no.4, pp.435-451, (2018) DOI: 10.1080/17517575.2017.1295321(CrossRef)(Google Scholar)
[9] Jiang Congfeng, Duan Liangcheng, Liu Chunlei, Wan Jian, and Zhou LI. “VRAA: Virtualized resource auction and allocation based on incentive and penalty,” Cluster Computing-The Journal of Networks Software Tools and Applications, vol.16, no.4, pp.639-650, (2013) DOI:10.1007/s10586-012-0235-6(CrossRef)(Google Scholar)
[10] Jin Wang, Xiujian Gu, Wei Liu, Arun Kumar Sangaiah, and Hye-Jin Kim, “An empower Hamilton loop based data collection algorithm with mobile agent for WSNs,” Human-centric Computing and Information Sciences, vol.9, no.18, December, (2019) DOI:10.1186/s13673-019-0179-4(CrossRef)(Google Scholar)
[11] Jin Wang, Yu Gao, Kai Wang , Arun Kumar Sangaiah, and Se-Jung Lim, “An affinity propagation based self-adaptive clustering method for wireless sensor networks,” Sensors, vol.19, no.11, pp.2579, (2019) DOI:10.3390/s19112579 (CrossRef)(Google Scholar)
[12] Ruxia Sun, Lingfeng Shi, Chunyong Yin, and Jin Wang, “An improved method in deep packet inspection based on regular expression,” Journal of Supercomputing, vol.75, no.6, pp.3317-3333, (2019)
[13] Chunyong Yin, Jinwen Xi, Ruxia Sun, and Jin Wang, “Location privacy protection based on differential privacy strategy for big data in industrial Internet of Things,” IEEE Transactions on Industrial Informatics, Aug 2018, vol.14, no.8, pp.3628-3636, (2018) DOI: 10.1109/TII.2017.2773646(CrossRef)(Google Scholar)
[14] Yuyu Yin, Yueshen Xu, Wenting Xu, Min Gao, Lifeng Yu, and Yujie Pei, “Collaborative service selection via ensemble learning in mixed mobile network environments,” Entropy, vol.19, no.7, pp.358, (2017)
[15] Yuyu Yin, Wenting Xu, Yueshen Xu, He Li, and LifengYu, “Collaborative QoS prediction for mobile service with data filtering and slopeone model,” Mobile Information Systems, vol.2017, article no.7356213, pp.1-14, (2017) DOI: 10.1155/2017/7356213(CrossRef)(Google Scholar)
[16] Jia Gangyong, Han Guangjie, Jiang Jinfang, and Li Aohan, “Dynamic time-slice scaling for addressing OS problems incurred by main memory DVFS in intelligent system,” Mobile Networks & Applications, vol.20, no.2, pp.157-168, (2015) DOI: 10.1007/s11036-015-0587-2(CrossRef)(Google Scholar)