Explore our curated collection of top research papers on Cyber Security. Dive into the latest insights and advancements in protecting information systems, networks, and data from cyber threats. This resource is perfect for academics, professionals, and anyone with an interest in understanding the evolving domain of cyber security.
Looking for research-backed answers?Try AI Search
authors unavailable
HOLISTICA – Journal of Business and Public Administration
The paper explains the components of cyber terrorism and motivation of it, and two case studies related to cybersecurity also provide in this paper.
Cyber Security is protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
V. Madhumitha
International Scientific Journal of Engineering and Management
This paper focuses primarily on cyber security concerns related to the new technology, and concentrates on the new technologies for cyber security, ethics, and developments that impact cyber security.
Yasser A. Khan
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
The relationships among cybersecurity, information security, OT security, IT security, and other related disciplines and practices, e.g. cyber defence, related to their implementation aligned with the planned or existing cybersecurity strategy at the national level are described.
Abhishek Pandit, Abhishek P, Abhilash H + 1 more
International Journal of Advanced Research in Science, Communication and Technology
The current state of cyber security is examined, discussing the threats posed by malicious actors, the technologies used to protect against them, and best practices for individuals and organizations to ensure their security.
Vinisha Bhagwani, Sakina Balasinorwala
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
There is the need for continued investment in cyber security research and development to help keep pace with the evolving threat landscape, and best practices for individuals and organizations to protect themselves from cyber attacks.
Michael A. Goedeker
Global Business Leadership Development for the Fourth Industrial Revolution
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence.
The curriculum has been developed to standards established by the federal government, and the school is a member of the Cyber Security Education Consortium.
Despite heightened media attention and a general feeling of impending cyber-doom in some government circles, the level of cyber-risk is generally overstated, which has important repercussions for decision-makers and students, which are addressed in the concluding section.
Prof. Simranpreet Kaur
International Journal for Research in Applied Science and Engineering Technology
This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access.
R. Ford, M. Carvalho, Liam M. Mayron + 1 more
journal unavailable
It is argued that a general, quantitative set of metrics for resilience of cyber systems is impractical, and that a set of considerations and guidelines for building metrics that are helpful for a particular system are provided.
R. K. Goutam
International Journal of Computer Applications
It is demonstrated that hacking is now common and harmful for global economy and security and the various methods of cyber attacks in India and worldwide are presented.
Shivani Ghundare, Akshada A. Patil, Rashmi Lad
International journal of engineering research and technology
Security and privacy in online networking, cryptographic application in cloud computing and internet of things and privacy-preserving computing are introduced and approaches to prevent, detect, and respond to cyber-attacks are discussed.
Security in the Cyber Age breaks-down how cyberspace works, analyzes how state and non-state actors exploit vulnerabilities in cybersspace, and provides ways to improve cybersecurity.
Karan B. Maniar
international journal of engineering trends and technology
This paper aims to elucidate primary factors relating to security, and provides information on some more common types of attacks and steps to be taken to avert them.
Bharat Yadav Student, B. Tech
International Journal of Advanced Research in Science, Communication and Technology
This document explains how cybersecurity applies to both software and hardware, as well as information on the Internet, which can protect everything from personal information to complex government systems.
Praveen Pandey
International Journal for Research in Applied Science and Engineering Technology
The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions and the various tiny devices that constitute the Internet of Things.
Ujjwal Rao
International Journal of Advanced Research in Science, Communication and Technology
The paper analyzes the impact of cyber threats on different sectors, such as government, finance, healthcare, and education, and examines the role of various stakeholders in ensuring cybersecurity, including individuals, organizations, and governments.
How cybersecurity increasingly connects to consumer safety and critical industrial infrastructure, as well as the digital economy and systems of democracy, is explained, and baseline recommendations, across all stakeholders, necessary for improving the cyber-physical ecosystem are suggested.
Rozwój technologii sprawił, że internet stał się wirtualnym światem, który odgrywa kluczową rolę w realnej rzeczywistości. Obecnie, nie jest jedynie miejscem rozrywki. W Internecie znajdują się oficjalne strony rządowe, witryny państwowe, e-urzędy, czy też e-bankowość. Temat artykułu skupia się na cyberbepieczeństwie. W artykule zdefiniowane jest pojęcie cyberprzestrzeni, a także zagrożenia jakie w niej występują. Cyberprzestrzeń charakteryzuje się rozciągłością na cały świat i wszechstronną bazą danych. Jednakże w cyberprzestrzeni występują także działania, które tworzą dla niej zagrożenie, s...