• Tidak ada hasil yang ditemukan

View of CYBER SECURITY: A STUDY OF ONLINE SECURITY IN PRESENT ERA

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of CYBER SECURITY: A STUDY OF ONLINE SECURITY IN PRESENT ERA"

Copied!
2
0
0

Teks penuh

(1)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 07, Special Issue 05, (IC-RTCASEMHPS-2022) September 2022 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 186 CYBER SECURITY: A STUDY OF ONLINE SECURITY IN PRESENT ERA

Manish Kumar Jain

Asst. Prof. (Computer Dept.) SRGBN College, Sanawad Reena Lonkar

Asst. Prof. (Computer Dept.) SRGBN College, Sanawad

Abstract- Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber Security that goes beyond the limits of the traditional information security to involve not only the security of information tools but also the other assets, involving the person’s own confidential information. In computer security or information security, relation to the human is basically to relate their duty(s) in the security process. In Cyber security, the factor has an added dimension, referring humans as the targets for the cyber-attacks or even becoming the part of the cyber-attack unknowingly. This also involves the details about the cybercriminals and cyber risks going ahead with the classification of the Cybercrimes which is against individual, property, organization and society. Impacts of security breaches are also discussed. Countermeasures for computer security are discussed along with the Cyber security standards, services, products, consultancy services, governance and strategies.

Risk management with the security architecture has also been discussed. Other section involves the regulation and certification controls; recovery and continuity plans and Cyber security skills.

1 INTRODUCTION

Cyber security refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.From a computing point of view, security comprises cyber security and physical security — both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity, and availability of data, is a subset of cyber security. The use of cyber security can help prevent cyber attacks, data breaches, and identity theft and can aid in risk management.

2 PREVENTION OF CYBER CRIME 1) Use Strong Passwords

Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis.

2) Secure your computer

Activate your firewall – Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers.

Use anti-virus/malware software Prevent viruses from infecting your computer by installing and regularly updating anti-virus software.

3) Block spyware attacks

Prevent spyware from infiltrating your computer by installing and updating anti-spyware software.

4) Be Social-Media Savvy

Make sure your social networking profiles (e.g. Face book, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online.

Once it is on the Internet, it is there forever!

5) Secure your Mobile Devices

Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources. Install the latest operating system updates; Keep your applications and operating system (e.g. Windows, Mac, and Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software.

6) Protect your Data

Use encryption for your most sensitive files such as tax returns or financial records. Make regular back-ups of all your important data, and store it in another location.

(2)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 07, Special Issue 05, (IC-RTCASEMHPS-2022) September 2022 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 187 7) Secure your wireless network

Wi-Fi (wireless) networks are vulnerable to intrusion if they are not properly secured.

Review and modify default settings. Public Wi-Fi, a.k.a. ―Hot Spots‖, are also vulnerable.

Avoid conducting financial or corporate transactions on these networks.

8) Protect your e-identity

Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g.

when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).

9) Avoid being scammed

Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.

10) Call the right person for help

Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician.

3 CYBER LAW

Cyber law is any law that applies to the internet and internet-related technologies. Cyber law is one of the newest areas of the legal system. This is because internet technology develops at such a rapid pace. Cyber law provides legal protections to people using the internet. This includes both businesses and everyday citizens. Understanding cyber law is of the utmost importance to anyone who uses the internet. Cyber Law has also been referred to as the "law of the internet."

4 CONCLUSION

With the rapid growth of IT, organization is taking extra precautions when it comes to protecting information and cyber crime but hackers will continue developing and upgrading to stay ahead of the law. So we must aware of cyber law and adhere to it to secure our data and information.

REFERENCES

1. https://www.engpaper.com/cyber-security 2. https://www.academic.oup.com/cybersecurity

Referensi

Dokumen terkait

It is important to consider the category "security" also in a separate context considering the important component of the security in the structure of the

Various concepts and steps related to improving the organization and handling of institutions that deal with cyber-security are carried out in order to ensure the achievement and