Mitigating Cyber Attacks Through Security Models and Networking Protocols
DOI:
https://doi.org/10.26438/ijcse/v6i8.925929Keywords:
Cyber Security, Cyber-attacks, Cypher Text, Cryptography, Phishing, Security ProtocolAbstract
With the increasing dependency of most of the organizations on technology in today’s world, the aspect of information security is a major concern. A plethora of data, be it insignificant (like text messages) or vital (data of some government agency) is stored and transferred over the internet and is exposed to a variety of attacks by people with immoral intentions. Information security is therefore a vital aspect for any organization or government body which has to ensure that their data is not mutated by an attacker and reaches the intended recipient unchanged. This paper discusses various types of security models which are used in practice by the organizations and various cryptographic methods that are commonly used for the protection of data against undesirable breaches. A variety of algorithms have been developed in order to protect the data. Various types of keys which form an essential component of the encrypting algorithms are also discussed. There are several cyber-attacks which pose an austere threat to the organizations. These threats can be mitigated using various cryptographic algorithms and network protocols. These protocols also play an important role in mitigating the security breaches of sensitive data and are discussed towards the end of this paper.
References
[1] Singh Anurag, Singh Brijmohan, "Cyber Security Policies for Digital India: Challenges & Opportunities", International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.164-168, 2017.
[2] Steve G. Walkins, “An Introduction to Information Security and ISO27001:2013: A Pocket Guide”, IT Governance Publishing, pp. 21-42, 2013.
[3] Suganya V,"A Review on Phishing Attacks and Various Anti Phishing Techniques." International Journal of Computer Applications 139.1 (2016): 20-23.
[4] Amalraj, A. Joseph, and J. John Raybin Jose. "A survey paper on cryptography techniques." International Journal of Computer Science and Mobile Computing 5.8 (2016): 55-59.
[5] Cherdantseva, Yulia, and Jeremy Hilton. "A reference model of information assurance & security." 2013 International Conference on Availability, Reliability and Security. IEEE, 2013.
[6] Vipin Poddar, Hitesh Choudhary. "A Comparitive Analysis of Wireless Security Protocols (WEP and WPA2)”, International Journal of AdHoc Networking Systems, Vol. 4, No. 3, July 2014.
[7] Mahjabin, Tasnuva, Yang Xiao, Guang Sun, and Wangdong Jiang. "A survey of distributed denial-of-service attack, prevention, and mitigation techniques." International Journal of Distributed Sensor Networks 13, no. 12, 2017.
[8] Mishra, Neha, and Sunita Gond. "Defenses to protect against SQL injection attacks." International Journal of Advanced Research in Computer and Communication Engineering 2.10 (2013).
[9] Ayushi. “A Symmetric Key Cryptographic Algorithm”, International Journal of Computer Applications, Volume 1 – No. 15, 2010.
[10] Sanjay E. Pate, Bhojaraj H. Barhate, "A survey of Possible Attacks on Text & Graphical Password Authentication Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.77-80, 2018
[11] B. Bhasker, T. Jagadish kumar, M.V.Kamal, "A Security Determination-Reaction Architecture for Heterogeneous Distributed Network", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.26-34, 2017
[12] Poonam Devi , "Attacks on Cloud Data: A Big Security Issue", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.15-18, 2018
[13] Shailja Sharma, "A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.66-69, 2018
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
