Volume- 6
Issue- 3
Year- 2019
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Ananya Shukla , Prof. Naveen Upreti, Prof. Manoj Kumar
In the development of information technology as well as Internet services Cyber Security plays an important role. When we hear about the word “cybercrime” the first thing that comes in our mind on cyber security and the thing is that how good the infrastructure of our “National Cyber Security”. This term cyber security is sometimes used interchangeably with the term information security. This paper throws light on the latest technology such as mobile, cloud; e-commerce etc. It also explains the challenges which are coming due to lack of coordination between Security agencies and the Critical IT Infrastructure. In the cybercrime the human is the target for cyber-attack, people participate in this unknowingly. Hacking can be good as well as bad based on the mind of the hacker. Hacking is done for the security of the organizations but it can also be used to harm anyone.
[1] Integrated Defense Staff, “National Informatics Center”, Ministry of Defense, India
[2] Yang, Miao, “ACM International Conference Proceeding Series”, vol. 113
[3] Unisys Corporation, “Unisys Descriptive Technology & Trends Points of White Paper Series- Cyber Security” USA, 2011
[4] Cyber Security Strategy of United Kingdom, 2009
[5] ITU Cyber Security Work Program to Assist Development Countries, 2009 [6] Rev. Jonames Burg, TTU WTSA Resolution 50, 2008
[7] ITU Cyber Security Work Program to Assist Development Countries, 2008
[8] Kellermann, “Technology Risk Checklist, Cybercrime and Security”, IIB-2
[9] Schjolberg/Hubbard, “Harmonizing National Legal Approaches on Cybercrime”, 2005
[10] G. Nikhita Reddy, G.J. Ugander Reddy A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies, 8 Feb 2014)
[11] Iuon-Chang Lin1,2 and Tzu-Chun Liao2 “A Survey of Blockchain Security Issues and Challenges”Jan. 12, 2017)
[12] AnwaarAlDairiLo’aiTawalbehCyber“Security Attacks on Smart Cities and Associated Mobile Technologies”12 June 2017
Student, Department of Computer Application, International Institute for Special Education, Lucknow, India ananyadotshukla@gmail.com
No. of Downloads: 24 | No. of Views: 958
Anshita Kesharwani, Kaptan Singh, Amit Saxena.
April 2024 - Vol 11, Issue 2
Niyati Agarwal , Dipti Ranjan Tiwari .
April 2024 - Vol 11, Issue 2
Sandeep Kumar Jaiswal , Rohit Agrawal.
April 2024 - Vol 11, Issue 2