Search GSSD

Evaluation of Vulnerability Assessment in System From Hackers in Cyber Security

Abstract: 
Argues vulnerability, essential in cyber security related mechanism to identify attacks over cyber space, has increased due to interdependencies between computer communication systems and more complex infrastructures as information technologies are further integrated into modern devises and networks. Vulnerabilities are due to: ethnical hacking, Trojan attacks, and logical bombing. Recent firewalls and filtering algorithms help decrease vulnerability and avoid hacking. Defines vulnerability as “the weak points and reduced effectiveness of a system’s standard and quality.” Cyber security Is necessary in order to: identify hackers, identify Internet scams and fraud, identify Cyber theft, identify Virus attacks, an identify Spyware. Proposes an approach that combines Firewall, Intrusion Detection System (IDS), Policy Based Rules techniques to maintain high cyber security.
Author: 
Suma Christal Mary
Institution: 
PSN College of Engg & Technology, International Journal of Engineering Science and Technology
Year: 
2010
Region(s): 
Industry Focus: 
Information & Telecommunication
Internet & Cyberspace
Datatype(s): 
Bibliographies & Reports