Open Access Open Access  Restricted Access Subscription Access

Analysis of Cyber Attacks and Guidelines to Improve Defence in Academic Organizations- A Survey

Praveen Kumar K C, Bhanu Jyothi H C

Abstract


Nowadays the organizations are being vulnerable to the cyber-attacks vigorously. Also the growing stages of the cyber-attacks and the damages caused by them are highlighted in this paper. This study shows the survey and comprehended cyber-attacks in the academic organizations, including the record of definitions and future about the cyber-attacks. This survey used as a research method and structured telephone interview as the technique to collect the data. In order to minimize the cyber-attacks, we need to use good technology and advanced tools, and keep any device up-to-date with updated versions. The result of this survey report support the view that the cyber-attacks is a crescent issue and it has to be better addressed.

Full Text:

PDF

References


Symantec (2015) ISTR20 – Internet security threat report [online]. Available at https://www.symantec.com/content/en/us/enterprise/ot h resources/21347933_GA_RPT-internet-security- threat-report-volume-20-2015.pdf.(Accessed11 December 2015)

IARPA. (2014) Cyber-attack data [Online]. Available from: http://www.iarpa.gov/index.php/working-with-iarpa/requests-for-information/cyber-attack-data

(Accessed 23 November 2015)

Choo, K.K.R. (2011). The cyber threat landscape: challenges and future research directions” [Online]. Available from:

http://www.sciencedirect.com/science/article/pii/S0167404811001040 (Accessed 18 November 2015).

McAfee &CSIS. (2014) Stopping Cybercrime can positively impact world economies [Online]. Available from:

http://www.mcafee.com/uk/about/news/2014/q2/20140609-01.aspx (Accessed 13 January 2016).

Gandhi, R. et al. (2011) Dimensions of cyber-attacks: Cultural, social, economic, and political” [Online]. Available from: http

err=5725605 (Accessed 26 November 2015).

Uma, M. &Padmavathi, G. (2013). A survey on various cyber-attacks and their classification. [Online]. Available from: http://ijns.femto.com.tw/contents/ijns - v15-n5/ijns-2013-v15-n5-p390-396.pdf (Accessed 27 November2015).

Waxman, M.C. (2011). Cyber-attacks and the use of force: back to the future of Article 2 (4).

[Online]. Available from:

http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=167 4565 (Accessed 13 January 2016).

Radware. (2016). 2015-2016 Global application and Network security report” [Online]. Available from: http://www.radware.com/ert-report-2015/ (Accessed 15 February 2016).

Donald, J.W. & Strutt, J.B. (2015). Academic institution are under cyber-attack [Online]. Available from: http://www.universitybusiness.com/article/1015-jwd(Accessed 13 November2015).

Akinola, A.A., Kuye, A. &Ayodeji, A. (2014) Cyber- attack analysis of a school computer network [Online]. Available from: https://www.researchgate.net/publication/283258166_Cyber-

Attack_Analysis_of_a_School_Computer_Network(Accessed 9 April 2016).


Refbacks

  • There are currently no refbacks.