IRJET- A Survey Paper on Cyber Security, Elements, Parameter and its Ethics

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 07 Issue: 02 | Feb 2020

p-ISSN: 2395-0072

www.irjet.net

A SURVEY PAPER ON CYBER SECURITY, ELEMENTS, PARAMETER AND ITS ETHICS Mrs. R. Surya prabha[1], Miss. B. Vishalini[2], Mr. S. Nishak[3] [1]Assistant

professor, Department of software systems, Sri Krishna Arts and Science College, kuniyamuthur, Coimbatore, India [2].[3]Student, Department of software systems, Sri Krishna Arts and Science College, kuniyamuthur, Coimbatore, India ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract – This paper gives detailed in sequence concerning cyber security and its elements. Cyber Security plays a significant role in the pasture of information technology. It is combination of processes, technologies and practices. Nowadays, cybercrime is one of the major crimes done by computer proficient. Securing the information has become one of the biggest challenges in the current day. Cyber security is to grant prevention beside the cybercrime, while cybercrime is that group of performance made by the people by creating commotion in network, burglary others important and private data, documents, hack bank details and accounts and transferring money to their own. The aggressors smash up or pilfering software or information well as from interruption or misdirection of the services they misguide. We also give various security aspects associated with cyber security. We reveal that hacking is now common and destructive for global economy and security and presented the various methods of cyber attacks in India and worldwide. 1. INTRODUCTION Cyber security is defined as technologies and processes constructed to defend computers, computer hardware, software, networks and data from unconstitutional contact, vulnerabilities abounding right the way through Internet by cyber criminals, terrorist groups and hackers. It is a combining form describing to information and technology, the internet, and virtual reality. The stretch cyber security is used to refer to the security obtainable through on-line services to defend your online information. Internet is now not only the resource of information but also has conventional as a medium through which we do business, to broadcast and sell our products in various forms, communicate with our customers and retailers and do our financial communication. Cyber security is also body of technologies, processes and practices considered to protect and secure networks, computer systems, various programs and data from cyber-attack, damage all these things or unconstitutional access these. Cyber security strives to ensure the accomplishment and protection of the security properties of the association and user’s property beside significant security risks in the cyber environment. Today Internet is the fastest upward infrastructure in everyday life. © 2020, IRJET

|

Impact Factor value: 7.34

|

In today’s technical environment many latest technologies are varying the face of the mankind. Even the latest technologies like cloud computing, mobile computing, Ecommerce, net banking etc also needs high level of security. Today many nations and governments are imposing strict laws on cyber securities in order to prevent the loss of some important information. 2. ELEMENTS OF CYBER SECURITY: Application security is the utilize software, hardware, and procedural methods to defend application from exterior threats, viruses, malwares or attacks. At the time of software design, security is becoming a very imperative apprehension during progress of applications. It would become more and more reachable in excess of networks, and as a result, there are potential to a extensive assortment of threats entered to destruction software or application and its information. Security process at the instance of building applications and application security routines which curtail the unconstitutional code will be able to influence applications to access, steal, modify, or delete sensitive data. 

  

Communication Security: Communication security is also known as COMSEC. It is the progression to sheltered or avert unconstitutional access to traffic will be generated from telecommunication systems, or it will also help for any written in sequence that is transmitted or transferred to another device via any other medium. There are several communication security disciplines. Cryptographic security: It encrypts information of correspondent surface and makes it scrawled in anticipation of the information is decrypted by beneficiary surface. Emission security: It is used to avert the discharge or confine of apparatus emanations to avert in sequence from unconstitutional interception. Physical security: It ensures by giving anticipation of unconstitutional access to a network’s cryptographic information, documents and equipment. Transmission security: It is used to defend unconstitutional access when data is actually transferred from one surface to other surface or one medium to other medium to avert issues such as service disturbance, steal data by malevolent person.

ISO 9001:2008 Certified Journal

|

Page 2582


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.