A Detailed Review on Cyber Security and Its Challenges

AUTHORS

N. Thirupathi Rao,Department of Computer Science and Engineering, Vignan’s Institute of Information Technology (A), Visakhapatnam 530049, AP, India
Debnath Bhattacharyya,Department of Computer Science and Engineering, Vignan’s Institute of Information Technology (A), Visakhapatnam 530049, AP, India

ABSTRACT

The utilization of various electronic gadgets with data usage had increased a lot in recent days. The mostly used devices are like the mobile phones, laptops and other network-based working devices. As these devices are being used, the internet connectivity for these devices are mandatory and the utilization of internet connectivity to all the applications in those devices is becoming a serious problem. As these applications are connected with internet facility always and the data stored in such devices can be accessed easily by using various secret applications or any other patch files. The breaching of data in those devices or applications in those devices had become easier and can be tapped the data without the knowledge of the users of such devices. These applications and things are providing serious challenges to the users for keeping their devices safe and use those devices safe and secure. In the current article, an attempt had been made to provide the various cyber security challenges being faced by users and the latest trends and challenges being generated and faced by the users are given in detail.

 

KEYWORDS

Security, Networks, Nodes, Websites, Online banking, Hardware components, Modems

REFERENCES

[1]    Thakur, Kutub, Qiu, Meikang, Gai, Keke, and Ali, Md., “An investigation on cyber security threats and security models,” IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015), At New York, USA, pp.25-36, (2015) DOI:10.1109/CSCloud(CrossRef)(Google Scholar)
[2]    MSc Cyber Security, https://www.york.ac.uk/study/postgraduate-taught/courses/msc-cyber-security, (2019)
[3]    Jeffrey Roman ,“Application security: Four key steps,” Bank Info Security, January, (2015)
[4]    Cyber EDU, “What is network security? Network security defined, explained, and explored,” FORCEPOINT, https://www.forcepoint.com/cyber-edu/network-security, (2019)
[5]    Ravi kandala, “Security analytics-big data use case,” Business Analytics, (2014)
[6]    “Critical infrastructure: Recent cyber security threat incidents,” https://www.oilandgasiq.com/events-oil-and-gas-cyber-security/downloads/critical-infrastructure-recent-cyber-security-threat-incidents, (2019)
[7]    Feba Babu and Kishore Sebastian, “A review on cyber security threats and statistical models”, IOP Conf. Series: Materials Science and Engineering, vol.396, pp.1-6, (2018) DOI:10.1088/1757-899X/396/1/012029.(CrossRef)(Google Scholar)
[8]    Kutub Thakur, Meikang Qiu, Keke Gai, and Md Liakat Ali, “An investigation on cyber security threats and security models,” IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY, USA, (2015) DOI: 10.1109/CSCloud(CrossRef)(Google Scholar)
[9]    Yang Lu, “Cyber security research: A review of current research topics,” Journal of Industrial Integration and Management, vol.3, no.4, pp.1-25, (2018) DOI: 10.1142/S2424862218500148(CrossRef)(Google Scholar)
[10]  N.Thirupathi Rao and Debnath Bhattacharyya, “Review on space and security issues in cloud computing,” International Journal of Security and Its Applications, vol.13, no.2, pp.1-8 (2019),
[11]  N.Thirupathi Rao, “Security issues and routing challenges on mobile ad-Hoc networks: An extensive review,” International Journal of Security and Its Applications, vol.12, no.6, pp.27-36, (2018)

CITATION

  • APA:
    Rao,N.T.& Bhattacharyya,D.(2019). A Detailed Review on Cyber Security and Its Challenges. International Journal of Wireless and Mobile Communication for Industrial Systems, 6(1), 21-28. 10.21742/IJWMCIS.2019.6.1.03
  • Harvard:
    Rao,N.T., Bhattacharyya,D.(2019). "A Detailed Review on Cyber Security and Its Challenges". International Journal of Wireless and Mobile Communication for Industrial Systems, 6(1), pp.21-28. doi:10.21742/IJWMCIS.2019.6.1.03
  • IEEE:
    [1] N.T.Rao, D.Bhattacharyya, "A Detailed Review on Cyber Security and Its Challenges". International Journal of Wireless and Mobile Communication for Industrial Systems, vol.6, no.1, pp.21-28, Dec. 2019
  • MLA:
    Rao N. Thirupathi and Bhattacharyya Debnath. "A Detailed Review on Cyber Security and Its Challenges". International Journal of Wireless and Mobile Communication for Industrial Systems, vol.6, no.1, Dec. 2019, pp.21-28, doi:10.21742/IJWMCIS.2019.6.1.03

ISSUE INFO

  • Volume 6, No. 1, 2019
  • ISSN(p):2205-8443
  • ISSN(e):2207-5399
  • Published:Dec. 2019

DOWNLOAD