Open Access Open Access  Restricted Access Subscription Access

CYBER SECURITY NETWORK AND LAWS

MOHAMMAD AAMIR KHAN, TABISH MUFTI, FARAZ DOJA

Abstract


Cybersecurity plays a crucial role in the field of information technology. Securing data has become one of the most significant and challenging issues in today's world. At the point when we consider network safety, the principal thing that strikes a chord is "digital violations," which are quickly expanding. Governments and businesses are implementing various measures to protect against these cyber crimes. However, despite these efforts, cybersecurity remains a significant concern for many.

This paper focuses on the challenges faced by cybersecurity in modern technologies. It also highlights the current trends in cybersecurity practices, ethics, and the evolving landscape of cyber defence


Full Text:

PDF

References


M. Zwilling, G. Klien, D. Lesjak, L. Wiechetek, F. Cetin, and H. N. Basım, “Cyber security awareness, knowledge and behaviour: A comparative study,” Journal of Computer Information Systems, vol. 62, no. 1, pp. 82-97, 2020, doi:10.1080/08874417.2020.1712269.

H. Teymourlouei, “Quick reference: Cyber-attacks awareness and prevention method for home users,” World Academy of Science, Engineering and Technology International Journal of Computer and Systems Engineering, vol. 9, no. 3, pp. 678-684, 2015, Digital Object Identifier: 10.5281/zenodo.1338144.

A. Garba, M. B. Sirat, S. Hajar, and I. B. Dauda, “Cyber security awareness among University students: A case study,” Science Proceedings Series, vol. 2, no. 1, pp. 82-86, 2020, Digital Object Identifier: 10.31580/sps. v2i1.1320.

J. Müller, “Malaysia: Internet penetration rate,” Statista, 11-Aug-2021. [Online]. Available: https://www.statista.com/statistics/975058/internet-penetration-rate-in-malaysia/ (Accessed: 16-Feb-2022).

M. D. Elradi, A. A. A. Altigani, and O. I. Abaker, “Cyber security awareness among students and faculty members in a Sudanese college,” Electrical Science & Engineering, vol. 2, no. 2, pp. 24- 28, 2020 Digital Object Identifier: 10.30564/ese. v2i2.2477.

N. A. Khan, S. N. Brohiand, N. Zaman, “Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic,” TechRxiv,12-May-2020, doi:10.36227/techrxiv. 12278792.v1.

J. Chigada and R. Madzinga, “Cyberattacks and threats during COVID-19: A systematic literature review,” South African Journal of Information Management, vol. 23, no. 1, pp. 1-11, 2021, Digital Object Identifier: 10.4102/sajim. v23i1.1277.

L. Tawalbeh, F. Muheidat, M. Tawalbeh, M. Quwaider, and G. Saldamli, "Predicting and preventing cyber-attacks during COVID-19 time using data analysis and proposed secure IoT layered model," 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA), 2020, pp. 113-118, Digital Object Identifier: 10.1109/MCNA50957.2020.9264301.

S. S. Tirumala, A. Sarrafzadeh, and P. Pang, "A survey on internet usage and cybersecurity awareness in students," 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, pp. 223-228, Digital Object Identifier: 10.1109/PST.2016.7906931.

R. A. Ramadan, B. W. Aboshosha, J. S. Alshudukhi, A. J. Alzahrani, A. El-Sayed, and M. M. Dessouky, “Cybersecurity and countermeasures at the time of the pandemic,” Journal of Advanced Transportation, vol. 2021, pp. 1–19, 2021, Digital Object Identifier: 10.1155/2021/6627264.


Refbacks

  • There are currently no refbacks.