Chowdhury, 2016 - Google Patents
Recent cyber security attacks and their mitigation approaches–an overviewChowdhury, 2016
- Document ID
- 16503175848453495859
- Author
- Chowdhury A
- Publication year
- Publication venue
- International conference on applications and techniques in information security
External Links
Snippet
The advent of digital media, Internet, web and online social media has drawn the attention of relevant research community significantly and created many new research challenges on cyber security. People, organisations and governments around the world are losing a huge …
- 230000000116 mitigating 0 title abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chowdhury | Recent cyber security attacks and their mitigation approaches–an overview | |
Dargahi et al. | A Cyber-Kill-Chain based taxonomy of crypto-ransomware features | |
Almaiah et al. | Classification of cyber security threats on mobile devices and applications | |
Kafi et al. | Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection | |
Tailor et al. | A comprehensive survey: ransomware attacks prevention, monitoring and damage control | |
Shah et al. | Ransomware-Threats, vulnerabilities and recommendations | |
Altwairqi et al. | Four most famous cyber attacks for financial gains | |
Asaad et al. | A cyber security threats, vulnerability, challenges and proposed solution | |
Hossain et al. | Classifying cyberattacks on financial organizations based on publicly available deep web dataset | |
Moldovan et al. | Cyber-security attacks, prevention and malware detection application | |
Belmabrouk | Cyber criminals and data privacy measures | |
Shyam et al. | Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey. | |
Muhammad et al. | Information protection of end users on the web: privacy issues and measures | |
Hassan | Ransomware overview | |
Harris et al. | Cybersecurity in the golden state | |
Yosifova et al. | Trends review of the contemporary security problems in the cyberspace | |
Al Faisal et al. | Growing digital vulnerability: A case study of threats to Pakistans national assets | |
Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
Chopra et al. | PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD | |
Vakil et al. | Cyber Attacks: Detection and Prevention | |
Gundu et al. | A Glance View on Cloud Infrastructures Security and Solutions | |
Akpan et al. | Leveraging on Cyber Security for Digital Economy: Analysis of Emerging Cyber Security Threats and Attacks | |
Azhar et al. | Big Data Security Issues: A Review | |
Pillai et al. | Protection Guidelines for Blockchain Based Digital Identity | |
Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention |