A Survey on Various Cyber Attaeks and Their Classifieation
dc.category | Journal Article | |
dc.contributor.author | Uma, M | |
dc.contributor.author | Padmavathi, G | |
dc.date.accessioned | 2017-04-18T19:31:33Z | |
dc.date.available | 2017-04-18T19:31:33Z | |
dc.date.issued | 2013 | |
dc.department | Information Technology | en_US |
dc.description.abstract | The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others. Such exploitation of cyberspace for the purpose of accessing unauthorized or secure information, spying, disabling of networks and stealing both data and money is termed as cyber attack. Such attacks have been increasing in number and complexity over the past few years. There has been a dearth of knowledge about these attacks which has rendered many individuals/agencies/organizations vulnerable to these attacks. [7] Hence there is a need to have comprehensive understanding of cyber attacks and its classification. The purpose of this survey is to do a comprehensive study of these attacks in order to create awareness about the various types of attacks and their mode of action so that appropriate defense measures can be initiated against such attacks. | en_US |
dc.identifier.uri | https://ir.avinuty.ac.in/handle/avu/3242 | |
dc.lang | English | en_US |
dc.publisher.name | International Journal of Network Security | en_US |
dc.publisher.type | International | en_US |
dc.title | A Survey on Various Cyber Attaeks and Their Classifieation | en_US |
Files
Original bundle
1 - 1 of 1