Open Access Open Access  Restricted Access Subscription Access

Improve Defence in Academic Organizations- A survey

Praveen Kumar

Abstract


Because of a rising degree of dependence on ICT and the expansion of complex cyberattacks, associations are progressively defenseless against them. Cyberattacks can take many different forms and have many different effects. Additionally, the development of cyberattacks and the harm brought about by them has featured the worry about the topic. Hence, this study points, using a review, to grasp cyberattacks in the scholastic setting and afterward propose rules on the most proficient method to further develop guard against them. To meet the point and the targets of this examination, a writing survey was completed to understand the cyberattack peculiarity on the scholarly association, including the record of master definitions and elements about cyberattacks, the classifying of the most well-known kinds of assaults that have happened overall and scholastic setting and its related expense. To accomplish this understanding, the review was utilized as an exploration strategy and organized phone interview as the method to gather information. According to the analysis of cyberattacks, there are a number of factors that contribute to successful attacks, and modern countermeasures are required to reduce or eliminate these factors. The findings of this study lend credence to the idea that cyberattacks are a growing problem that ought to be properly addressed in order to improve comprehension. This knowledge may enhance the defense system of organizations once they comprehend how, where, and why they are the targets of cyberattacks. This study ought to be of worth to experts of scholarly associations wishing to work on their safeguard against cyberattacks.

Full Text:

PDF

References


Symantec (2015) “ISTR20 – Internet security threat report” [online]. Available at https://www.symantec.com/content/en/us/enterprise/ot h er_resources/21347933_GA_RPT-internet-security- threat-report-volume-20-2015.pdf (Accessed 11

December 2015)

IARPA. (2014) “Cyber attack data” [Online]. Available from: http://www.iarpa.gov/index.php/working -with- iarpa/requests-for-information/cyber-attack-data

(Accessed 23 November 2015)

Choo, K.K.R. (2011) “The cyber threat landscape: challenges and future research directions” [Online]. Available from:

http://www.sciencedirect.com/science/article/pii/S01674 04811001040 (Accessed 18 November 2015).

McAfee & CSIS. (2014) “Stopping Cybercrime can positively impact world economies” [Online]. Available from:

http://www.mcafee.com/uk/about/news/2014/q2/201406 09-01.aspx (Accessed 13 January 2016).

Gandhi, R. et al. (2011) “Dimensions of cyber-attacks:

cultural, social, economic, and political” [Online]. Available


Refbacks

  • There are currently no refbacks.