[go: up one dir, main page]

Chowdhury, 2016 - Google Patents

Recent cyber security attacks and their mitigation approaches–an overview

Chowdhury, 2016

Document ID
16503175848453495859
Author
Chowdhury A
Publication year
Publication venue
International conference on applications and techniques in information security

External Links

Snippet

The advent of digital media, Internet, web and online social media has drawn the attention of relevant research community significantly and created many new research challenges on cyber security. People, organisations and governments around the world are losing a huge …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Chowdhury Recent cyber security attacks and their mitigation approaches–an overview
Dargahi et al. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
Almaiah et al. Classification of cyber security threats on mobile devices and applications
Kafi et al. Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection
Tailor et al. A comprehensive survey: ransomware attacks prevention, monitoring and damage control
Shah et al. Ransomware-Threats, vulnerabilities and recommendations
Altwairqi et al. Four most famous cyber attacks for financial gains
Asaad et al. A cyber security threats, vulnerability, challenges and proposed solution
Hossain et al. Classifying cyberattacks on financial organizations based on publicly available deep web dataset
Moldovan et al. Cyber-security attacks, prevention and malware detection application
Belmabrouk Cyber criminals and data privacy measures
Shyam et al. Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey.
Muhammad et al. Information protection of end users on the web: privacy issues and measures
Hassan Ransomware overview
Harris et al. Cybersecurity in the golden state
Yosifova et al. Trends review of the contemporary security problems in the cyberspace
Al Faisal et al. Growing digital vulnerability: A case study of threats to Pakistans national assets
Narain Ransomware-rising menace to an unsuspecting cyber audience
Chopra et al. PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD
Vakil et al. Cyber Attacks: Detection and Prevention
Gundu et al. A Glance View on Cloud Infrastructures Security and Solutions
Akpan et al. Leveraging on Cyber Security for Digital Economy: Analysis of Emerging Cyber Security Threats and Attacks
Azhar et al. Big Data Security Issues: A Review
Pillai et al. Protection Guidelines for Blockchain Based Digital Identity
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention