Delving into Security of Networks - Times Need

Authors

  • Annie Singla Research Scholar, Disaster Mitigation & Management, IIT Roorkee, India
  • Kamal Jain Professor, Department of Civil Engineering, IIT Roorkee, India
  • Ajay Gairola Head, Centre of Excellence in Disaster Mitigation & Management, IIT Roorkee, India

Keywords:

Phishing Attack, DDoS

Abstract

Cyber space is an inevitable and indispensable place in every human beings life now. With the advent of Internet fad, the rapid digitization has taken place. But with the rapid digitization, there is a rapid increase in the occurrence of cyber disasters. Disasters are measured on two parameters-loss to life and property. In cyber disasters, there is a hell lot loss to money, zillions of people are getting affected on a daily basis and the loss of money is in billions of dollars in every disaster. They are bringing down the economy of the nation and people are also affecting on regular basis. Their privacy is being compromised. Due to the Internet fad, E-commerce, e-banking, online casinos are victimized. The vulnerability in the webpage of Gmail is found out during research study. The studies of vulnerability lead to cyber disasters using Phishing attacks through which the passwords were retrieved and accessed of various people. Users should be more aware as well as updated in terms of technology which can diminish these cyber disasters.

 

References

Norton Report (2013). Available at (Retrieved on May, 2014)

Karnika Seth (8th May 2010). IT Act 2000 vs 2008- Implementation, Challenges, and the Role of Adjudicating Officers. Available at (Retrieved 29th May,2014)

2013- The Impact of Cyber Crime. Available at (Retrieved on 23rd March,2014)

EERI Special Earthquake Report — April 2005 global cyber war and crime: A conceptual framework * Bryan School of Business and Economics, The University of North Carolina at Greensboro, Bryan Building, Room: 368, P.O. Box 26165, Greensboro, NC 27402-6165, USA ,Received 14 December 2004; accepted 14 September 2005.

Chris Welch(3rd October, 2013). Available at . (Retrieved on 29th Nov, 2013).

Kounteya Sinha (28th Feb, 2014). Available at . (Retrieved on 14th April, 2014).

Steven Musil (February 11, 2014). Available at < http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-in-europe-hits-400gbps/> (Retrieved 23rd March,2014)

Downloads

Published

2014-10-30

How to Cite

[1]
A. Singla, K. Jain, and A. Gairola, “Delving into Security of Networks - Times Need”, Int. J. Sci. Res. Net. Sec. Comm., vol. 2, no. 3, pp. 1–8, Oct. 2014.

Issue

Section

Research Article