Abstract:
Argues vulnerability, essential in cyber security related mechanism to identify attacks over cyber space, has increased due to interdependencies between computer communication systems and more complex infrastructures as information technologies are further integrated into modern devises and networks. Vulnerabilities are due to: ethnical hacking, Trojan attacks, and logical bombing. Recent firewalls and filtering algorithms help decrease vulnerability and avoid hacking. Defines vulnerability as “the weak points and reduced effectiveness of a system’s standard and quality.” Cyber security Is necessary in order to: identify hackers, identify Internet scams and fraud, identify Cyber theft, identify Virus attacks, an identify Spyware. Proposes an approach that combines Firewall, Intrusion Detection System (IDS), Policy Based Rules techniques to maintain high cyber security.
Institution:
PSN College of Engg & Technology, International Journal of Engineering Science and Technology
Industry Focus:
Information & Telecommunication
Internet & Cyberspace