publication . Article . 2018

Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

Jawad Hussain Awan; Shahzad Memon; Sheeraz Memon; Kamran Taj Pathan; Niaz Hussain Arijo;
Open Access English
  • Published: 01 Apr 2018 Journal: Mehran University Research Journal of Engineering and Technology, volume 37, issue 2, pages 359-366 (issn: 0254-7821, eissn: 2413-7219, Copyright policy)
  • Publisher: Mehran University of Engineering and Technology
Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and m...
Persistent Identifiers
ACM Computing Classification System: ComputingMilieux_MISCELLANEOUS
free text keywords: lcsh:Technology, lcsh:T, lcsh:Engineering (General). Civil engineering (General), lcsh:TA1-2040, lcsh:Science, lcsh:Q, Cyber threats, Computer security, computer.software_genre, computer, Business
Any information missing or wrong?Report an Issue