Some Cyber Security Topics: Review Study

PRAMOD KUMAR

Abstract


Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber-attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Cloud computing has emerged from the legacy data centres. Consequently, threats applicable in legacy system are equally applicable to cloud computing along with emerging new threats that plague only the cloud systems. Traditionally the data centres were hosted on-premises. Hence, control over the data was comparatively easier than handling a cloud system which is borderless and ubiquitous. Threats due to multi-tenancy, access from anywhere, control of cloud, etc. are some examples of why cloud security becomes important. Considering the significance of cloud security, this work is an attempt to understand the existing cloud service and deployment models, and the major threat factors to cloud security that may be critical in cloud environment.

Keywords


Cloud Computing; Multi Tenancy; Control of Cloud; Cloud Security; Deployment Models;

References


. "#Cybercrime— what are the costs to victims - North Denver News". North Denver News. 17 January 2015. Retrieved 16 May 2015.

. "Bitcoin not a currency says Japan government". BBC News. 7 March 2014. Retrieved 25 January 2022.

. "Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress". www.everycrsreport.com. Retrieved 5 September 2021.

. "BUFFETT: This is 'the number one problem with mankind'". Business Insider. Retrieved 17 May 2021.

. "Chapter 3: Computer Forensic Fundamentals - Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives [Book]". www.oreilly.com. Retrieved 2022-03-04.

. "Computer and Internet Fraud". LII / Legal Information Institute. Retrieved 1 November 2020.

. "computer security | Definition & Facts | Britannica". www.britannica.com. Retrieved 12 July 2022.

. "Computer Security and Mobile Security Challenges". researchgate.net. 3 December 2015. Archived from the original on 12 October 2016. Retrieved 4 August 2016.

. "Cryptocurrencies: What Are They?". Schwab Brokerage.

. "Cyber crime costs global economy $445 billion a year: report". Reuters. 9 June 2014. Retrieved 17 June 2014.

. "cybercrime | Definition". Encyclopedia Britannica. Retrieved 25 May 2021.

. "cybercrime | Definition, Statistics, & Examples | Britannica". www.britannica.com. Retrieved 14 December 2021.

. "Email Security | Trellix". www.trellix.com. Retrieved 24 October 2022.

. "EXP-SA: Prediction and Detection of Network Membership through Automated Hard Drive Analysis".

. "Ghidra". Archived from the original on 15 August 2020. Retrieved 17 August 2020.

. "How To Make A Mint: The Cryptography of Anonymous Electronic Cash". groups.csail.mit.edu. Archived from the original on 26 October 2017. Retrieved 11 January 2018.

. "Identifying Phishing Attempts". Case. Archived from the original on 13 September 2015. Retrieved 4 July 2016.

. "Insurtech startups are leveraging rapid growth to raise big money". TechCrunch. April 20, 2021. Retrieved October 13, 2021.

. "Is it a currency? A commodity? Bitcoin has an identity crisis". Reuters. 3 March 2020. Retrieved 25 January 2022.

. "KPMG Pulse of Fintech H1 2021 - Global". KPMG. 2021. Retrieved December 28, 2021.

. "KPMG Pulse of Fintech H1 2021 - Global". KPMG. 2021. Retrieved December 28, 2021.

. "KPMG Pulse of Fintech H1 2021 - Global". KPMG. Retrieved December 28, 2021.

. "KPMG Pulse of FinTech H1 2021 Global". KPMG. 2021. Retrieved December 28, 2021.

. "Reliance spells end of road for ICT amateurs". The Australian. 7 May 2013.

. "The Global Risk Report 2020" (PDF). World Economic Forum. 15th Edition: 102. 15 January 2020.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.