
Analysis Report on Attacks and Defence Modeling Approach to Cyber Security
Author(s) -
Bechoo Lal,
Chandrahauns R Chavan
Publication year - 2019
Publication title -
international journal of scientific research in science and technology
Language(s) - English
Resource type - Journals
eISSN - 2395-602X
pISSN - 2395-6011
DOI - 10.32628/ijsrst196215
Subject(s) - computer security , cyber attack , computer science , password , cyber threats , firewall (physics) , information security , information operations , cyberwarfare , malware , command and control , business , telecommunications , accretion (finance) , schwarzschild radius , finance , charged black hole
The researcher stated that critical analysis on attacks and defense modeling approach to cyber security which is one of the significant research issues in the computing environment. The researcher focused on some of the factors such as control the side of damage, perform forensic analysis, executive standard counter measures, perform threat detection and hunting, and gather threat intelligence. These all are the defense parameters which are stated to modeling approach in cyber security. During the research the researcher evaluated the security parameters including password strength, fraud detection system, firewall and others security parameters which are significant with respect to cyber attach and environment. The researcher shown statistical report on industries impacted by cyber-attacks worldwide as of September 2017. The researcher stated that passwords are basic cyber-security tool that people encounter nearly every day to prevent valuable data and highly sensitive information from unauthorized persons. The researcher represented an attack and defense modeling approach with the help of cyber security attributes such as information security, network security, operational security, end-user protection and application security. The researcher also stated that a case study of the 2016 Korean cyber command compromise: the victim of a prospering cyber-attack that allowed access to internal networks. Per usual with massive scale attacks against South Korean entities, the hack was straight off attributed to DPRK. Case study-2: cyber warfare conflict analysis and case studies, to analysis historical cyber warfare incidents from the past to the current and capture relevant information in a very information acquisition section.