Title | Cyber Security at a Glance |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Asish, Madiraju Sairam, Aishwarya, R. |
Conference Name | 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) |
Keywords | antivirus, BeEF, BIOS Security, boot sector virus, Brute forcing, Computer crime, Computer hacking, computer malwares, computer viruses, Cyber Attacks, cyber security, data records, DDoS and DOS attacks, DDoS Attack, denial-of-service attack, distributed denial-of-service attack, firewall, Firewalls (computing), hacking techniques, human factors, Internet, Malware, man in the middle attack, Metrics, polymorphic virus, proxy, pubcrawl, resilience, Resiliency, Scalability, Sniffing, Social Engineering, Spoofing, Tor browser, trojan, Trojan horses, Trojans, vpn, Worm |
Abstract | The privacy of people on internet is getting reduced day by day. Data records of many prestigious organizations are getting corrupted due to computer malwares. Computer viruses are becoming more advanced. Hackers are able penetrate into a network and able to manipulate data. In this paper, describes the types of malwares like Trojans, boot sector virus, polymorphic virus, etc., and some of the hacking techniques which include DOS attack, DDoS attack, brute forcing, man in the middle attack, social engineering, information gathering tools, spoofing, sniffing. Counter measures for cyber attacks include VPN, proxy, tor (browser), firewall, antivirus etc., to understand the need of cyber security. |
DOI | 10.1109/ICONSTEM.2019.8918889 |
Citation Key | asish_cyber_2019 |