Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

  • Jawad Hussain Awan Institute of Information and Communication Technology, University of Sindh, Jamshoro
  • Shazad Memon Institute of Information and Communication Technology, University of Sindh, Jamshoro
  • Sheeraz Memon Department of Computer Systems Engineering, Mehran University of Engineering and Technology, Jamshoro
  • Kamran Taj Pathan Institute of Information and Communication Technology, University of Sindh, Jamshoro
  • Niaz Hussain Arijo Institute of Information and Communication Technology, University of Sindh, Jamshoro.

Abstract

Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.

Published
Apr 1, 2018
How to Cite
AWAN, Jawad Hussain et al. Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities. Mehran University Research Journal of Engineering and Technology, [S.l.], v. 37, n. 2, p. 359-366, apr. 2018. ISSN 2413-7219. Available at: <http://publications.muet.edu.pk/index.php/muetrj/article/view/205>. Date accessed: 20 oct. 2018. doi: http://dx.doi.org/10.22581/muet1982.1802.12.
Section
Articles
This is an open Access Article published by Mehran University of Engineering and Technolgy, Jamshoro under CCBY 4.0 International License