Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
The Reality of Cyber Security.
Author(s):
1. Syeda Marrium Nizami: Lahore Garrison University (LGU), Lahore, Pakistan
2. Gulfraz Naqvi: Lahore Garrison University (LGU), Lahore, Pakistan
Abstract:
The purpose of this article is to provide information about cyber security. It gives an analysis that would be useful in taking measure to prevent attacks. The judgment of this analysis is made by expertise and knowledge of databases, hardware, encryption, networks, and firewalls. Moreover it will give users an idea about how to keep computer system running smoothly, which ensures that they are considering such actions which could prevent them from their data being theft or financial information being stolen. Further the article gives an insight view about the techniques, which could restrain intruder from accessing, and revealing user’s personal information.
Page(s): 11-16
DOI: DOI not available
Published: Journal: International Journal for Electronic Crime Investigation, Volume: 1, Issue: 1, Year: 2017
Keywords:
Keywords are not available for this article.
References:
[1] Cybersecurity, Civil Liberties and Innovation: Hearing Before H. Comm. on Energy and Com., 111th Cong. (2009) (statement of Gregory T. Nojeim),available at http://www.cdt.org/security/20090501_cybersecurity.pdf; Cybersecurity: Preventing Terrorist Attacks and Protecting Cyberspace: Hearing Before S. Comm. on the Judiciary, Subcomm. on Terrorism and Homeland Security, 111th Cong. (2009), available at http://www.cdt.org/files/pdfs/20091117 _senate_cybersec_testimony.pdf.
[2] Crime in India: 2011-Compendium (2012), National Crime Records Bureau, Ministry of Home Affairs, Government of India, New Delhi, India
[3] Clay Wilson, Cong. Research Serv., RL32114, “Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress 5 (2005)”, (Wilson argues that defining any particular act as Cyberterrorism is problematic because of the inherent difficulties in determining the attackers identify, motive and intent, but recognizes the potential for Cyberterrorism). Available on http://www.dtic.mil/get-tr-doc/pdf?AD= ADA44479, Retrieved on 12 March, 2009
[4] Myra Williamson, Terrorism, War and International Law: The Legality of the Use of Force against Afghanistan in 2001. p. 38, Ashgate Publishing. United Kingdom, 2009.; Alex P. Schmid, The Definition of Terrorism. p. 39, The Routledge Handbook of Terrorism Research. Routledge, 2011
[5] Bruce Hoffman, Inside Terrorism, p. 32, 2nd ed., Columbia University Press, 2006,p.32,Seerevie win TheNewYork Times, Inside Terrorism, Available on http://www.nytimes.com/books/first/h/h offman-terrorism.html. Retrieved on 11 February 2012. Cited in “Cyber-Terrorism: Finding a Common Starting Point”by Jeffrey Thomas Biller, to The Faculty of The George Washington University Law School.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

18

Views