DOIONLINE

DOIONLINE NO - IJAECS-IRAJ-DOIONLINE-19333

Publish In
International Journal of Advances in Electronics and Computer Science-IJAECS
Journal Home
Volume Issue
Issue
Volume-9,Issue-12  ( Dec, 2022 )
Paper Title
Cyber Security: A Study Recommended for Emergency to Establish International Technology Laws
Author Name
Saphalya Peta
Affilition
B.E, CSE-III Year, Chaitanya Bharathi Institute of Technology, Hyderabad, 500035, India
Pages
47-52
Abstract
Abstract - The prevalence of cybercrimes on systems can be extremely harmful as our world digitises. Cybercrimes are on the rise more than ever as technology develops and more people rely on internet-enabled services for routine tasks like storing their credit card information and making purchases online. These cyber attacks have damaging effects and have the potential to do significant harm. Some of the various types of cyber-crimes prevalent today are: Web Attacks, SQL Injections, Cross-Site Scripting, DDOS Attacks, Password Attacks, Eavesdropping Attacks, Brute-Force and Dictionary Network Attacks, Insider Threats, Man-in-The-Middle Attacks, AI-poured Attacks, Drive-by Attacks, Phishing Attacks, Spear Phishing Attacks, Whale Phishing Attacks, Malware, Ransom ware, Trojan Horses, Teardrop Attack, Ping of Death Attack, and many more. Protecting our electronic systems, networks, computers, mobile devices, applications, and data from harmful digital attacks is known as cyber security. Cybercriminals can use a range of attacks against specific targets or entire organisations, including gaining access to, altering, or erasing important data; extorting money; or interfering with company operations. By stealing millions of pieces of information from users in recent years, cybercrime has become a serious menace to internet users. The global economy has also taken a significant hit as a result. By 2022, the demand for cyber security is predicted to reach $170.4 billion globally, according to Gartner. A strategy for protecting a company from internal and external threats through the selection and application of best practises is known as a cyber security strategy. The cyber security plan also creates a foundation for a business' security programme, enabling it to react continuously to new dangers and risks. A cyber security policy needs to be developed and implemented now more than ever because the pandemic saw a 500% surge in security-related breaches. Additionally, the average ransom ware payment increased by 82 percent to $572,000 in 2021 compared to the previous year. There is no indication that these attacks are slowing down, and there is evidence to suggest that threat actors will merely keep targeting weak systems. Keywords - Cyber Crime; Cyber Security; Economy; Cyber Terrorism; Establishment of International Technology Laws
  View Paper