An Overview of Implementation Strategies on Cyber Security

Because of the ubiquitous use of technology and the internet in modern culture, internet safety has become increasingly important. This study paper provides a complete assessment of the present status of cyber security, emphasizing the necessity for good practices and legislation to avoid future cyb...

Full description

Saved in:
Bibliographic Details
Published in2023 International Conference on Sustainable Emerging Innovations in Engineering and Technology (ICSEIET) pp. 625 - 628
Main Authors Sharma, Anushka, Chauhan, Alok Singh, Vishwakarma, Anurag
Format Conference Proceeding
LanguageEnglish
Published IEEE 14.09.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Because of the ubiquitous use of technology and the internet in modern culture, internet safety has become increasingly important. This study paper provides a complete assessment of the present status of cyber security, emphasizing the necessity for good practices and legislation to avoid future cyber-attacks. A detailed examination of cyber security will be offered, concentrating on its relevance, types of threats, practices and tactics, rules and standards, difficulties, and future directions. Malware, phishing, ransom ware, and other cyber security dangers are explored in depth, outlining how each type of attack operates and the possible harm they may inflict. Firewalls, antivirus programmes, and encryption are examples of common cyber security practices and approaches, as well as a discussion of their usefulness in preventing cyberattacks. The article also discusses legislative frameworks and standards such as the General Data Protection Regulation, or GDPR, and ISO 27001, as well as its shortcomings and weaknesses. Furthermore, rising cyber security concerns such as the Web, the Internet of Things (also known as IOT) and the use of AI are covered, as is the importance of continual monitoring and updating of cyber security practices and legislation. Finally, the report makes recommendations for future cyber security upgrades and advances.
ISBN:9798350329186
DOI:10.1109/ICSEIET58677.2023.10303587