Cyber Security Challenges on Latest Technologies

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 06 | Jun 2022

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

Cyber Security Challenges on Latest Technologies Anusha Patil1, Dr. Samita K2 1Student

Dept. Of MCA, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India Professor, Dept. Of MCA, Dayananda Sagar College of Engineering, Bangalore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------2Associate

Abstract -Data innovation relies heavily on information

on making the Web more secure (as well as protecting Internet users). There has to be a more comprehensive and secure approach to combating digital misconduct. In order to prevent all misconduct, policing authorities must be able to investigate and punish digital crimes in the real world. Many countries and state-run institutions are imposing strict regulations on digital protections in order to prevent the loss of crucial data. Each and every person must be prepared for this digital security and protect themselves from these increasing digital violations[4].

security, which plays a major role. Data security has become possibly the most challenging issue in the modern world. 'Digital wrongdoings,' which are growing exponentially on a daily basis, always come to mind when people think of digital security. There are a variety of measures being taken by governments and organizations around the world to stop these online crime. Network security is still a major concern for many people, despite the implementation of many solutions. It is the focus of this study to examine the most current challenges to digital security. This article also discusses some of the most recent developments in network security, including new ethical standards and emerging patterns.

2.CYBER CRIME The phrase "digital wrongdoing" refers to any criminal activity in which the use of a PC is a primary means of committing the crime or conducting a burglary. If a crime can be proven using a computer, it is considered digital wrongdoing by the US Division of Equity. It's becoming increasingly common for PCs to be used to perpetrate crimes that were previously unimaginable due to human error, such as disruptions to businesses and the spread of computer viruses. However, PCs can also be used to perpetrate crimes that were previously illegal but have now taken on new dimensions due to the widespread use of PCs. "Digital wrongdoing" describes crimes performed with a computer and the internet to steal somebody's identity, sell stolen property, find victims or disrupt activities with noxious software as "digital wrongdoing." Every time a new technological advancement is made, it brings with it an increase in the importance of digital wrongdoing[2].

Keywords: cyber security, cyber-crime, cyber ethics, social media, cloud computing, android apps.

1. INTRODUCTION Modern technology allows us to instantly transmit and receive virtually any type of data, including audio and video files. But, even if we can send and receive data via email, sound, and video files, all with the press of a button, have we ever considered how securely our data is transported to and from the other party? The response lies in digital protection. Today, the Internet is the fastest-growing structure in our daily lives. It's becoming increasingly common to see new technological advancements reshaping the world around us. Digital wrongdoings are on the rise every day because of these new technologies, which make it impossible for us to protect our private information in an efficient manner. High levels of security are vital in today's environment, where more than 60% of all commercial transactions are conducted online. Digital security has now become a major concern. More than only data in the IT business is covered by digital protection; it extends into other areas like the internet and so on[4].

2. NETWORK SECURITY Any association's main priority will always be protecting and securing its membership' personal data. As a result, we're now living in a society where everything is stored electronically. Long-distance informal communication destinations allow consumers to cooperate with loved ones in a secure setting. Digital thieves would then proceed to target web-based entertainment venues in order to steal private information from customers at home. Individuals should accept all needed safety measures in person-toperson conversation as well as during bank exchanges[2].

Even the most recent technological improvements, such as cloud computing, flexible registration, E-commerce, online banking, and so on, necessitate an increased level of security. The security of these inventions has become a need due to the fact that they contain sensitive data about an individual. Every country's security and economic growth depend on enhancing digital security and protecting key data foundations. Legislative and administrative growth depends

© 2022, IRJET

|

Impact Factor value: 7.529

|

98 percent of firms are maintaining or extending their network security assets, and half of those are doing so in order to better protect against cyber predators in the next year.

ISO 9001:2008 Certified Journal

|

Page 1846


Turn static files into dynamic content formats.

Create a flipbook