AN ANALYSIS OF THE LITERATURE ON SOCIETY’S CONCERNS ON INDIA’S CYBERSECURITY IN THE TWENTY-FIRST CENTURY

Authors: V. A. Ragavendran & Dr. A. Meenakshi

ABSTRACT

Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber security should be introduced to and ingrained from a young age. Security countermeasures aid in preserving the confidentiality, availability, and integrity of information systems by preventing or lessening asset losses brought on by cyber security threats. An intrusion detection system (IDS) application analyses what happens during an execution and searches for indications that the computer has been mistreated. Numerous metaphors, including those relating to biological processes, healthcare, markets, three-dimensional space, and the preservation of tangible goods, were taken into account. These in turn sparked the investigation of a wide range of prospective tactics for advancing cyber security in the future. The concepts of “Heterogeneity,” “Motivating Secure Behaviour,” and “Cyber Wellness” were employed to define these tactics. Cyber security plays an important role in the development of information technology and Internet services. Our attention tends to gravitate toward “Cyber Security” when we hear about “Cyber Crimes.” Therefore, how well our system handles “Cyber Crimes” is the first factor we take into account when talking about “National Cyber Security”. This newsletter focuses on expanding trends in cyber security in light of the widespread adoption of cutting-edge technologies including mobile computing, cloud computing, e-commerce, and social networking. In the research, it is also covered how challenges are exacerbated by a lack of coordination between security organizations and crucial IT infrastructures.

Keywords: – Cyber Safety, Metaphors, Internet Engineering Task Force and Intrusion Detection System

REFERENCES

  • Himanshu Arora, Tanuj Manglani, Geetanjli Bakshi, Shikha Choudhary. “Cyber Security Challenges and Trends on Recent Technologies”, 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), 2022
  • Ajith Abraham, Johnson Thomas. “chapter 5 Distributed Intrusion Detection Systems”, IGI Global, 2006
  • Ganesh, K. Sri, M. Raja Sekar, and V. Vaidehi. “Semantic Intrusion Detection System using pattern matching and state transition analysis”, 2011 International Conference on Recent Trends in Information Technology (ICRTIT), 2011.
  • Christos Xenakis. “chapter 22 Security in 2.5G Mobile Systems”, IGI Global, 2008
  • Loren Paul Rees, Jason K. Deane, Terry R. Rakes, Wade H. Baker. “Decision support for Cybersecurity risk planning”, Decision Support Systems, 2011