Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Internet Threats and Prevention – A Brief Review

Print
PDF
IJCA Proceedings on International Conference on Advancements in Engineering and Technology
© 2015 by IJCA Journal
ICAET 2015 - Number 10
Year of Publication: 2015
Authors:
Sheenam Bhola
Sonamdeep Kaur
Gulshan Kumar

Sheenam Bhola, Sonamdeep Kaur and Gulshan Kumar. Article: Internet Threats and Prevention – A Brief Review. IJCA Proceedings on International Conference on Advancements in Engineering and Technology ICAET 2015(10):13-17, August 2015. Full text available. BibTeX

@article{key:article,
	author = {Sheenam Bhola and Sonamdeep Kaur and Gulshan Kumar},
	title = {Article: Internet Threats and Prevention – A Brief Review},
	journal = {IJCA Proceedings on International Conference on Advancements in Engineering and Technology},
	year = {2015},
	volume = {ICAET 2015},
	number = {10},
	pages = {13-17},
	month = {August},
	note = {Full text available}
}

Abstract

Network security is a branch of computer technology whose objective is to protect the information and property from theft, corruption, or threats attack. Now a days, we are mostly dependent on internet for many things such as online shopping, bank transactions, internet surfing etc. However, internet is not fully secure as its users are threatened by many computer viruses, malicious threats and many more attacks. This paper summarize various computer threats and mechanisms used for protecting sensitive information over the internet.

References

  • The basic of Web Threats, http://la. trendmicro. com/media/br/the-basic-of-web-threats-brochure-en. pdf
  • Anthony Bisong and Syed (Shawon) M. Rahman , AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING, http://airccse. org/journal/nsa/0111jnsa03. pdf
  • RandyBrown, WEB SECURITY ISSUES: HOW HAS RESEARCH ADDRESSED THE GROWING NUMBER OF THREATS? http://www. swdsi. org/swdsi08/paper/SWDSI%20Proceedings%20Paper%20S301. pdf
  • Potential security threats to your computer system, http://www. guru99. com/potential-security-threats-to-your-computer-systems. html
  • David Harley BA CISSP FBCS CITP , Staying Safe on the Internethttp://www. eset. com/us/resources/white-papers/StaySafeOnTheInternet. pdf
  • Saeed S. Basamh, Hani A. Qudaih, Jamaludin Bin Ibrahim, An Overview on Cyber Security Awareness in Muslim Countries, http://esjournals. org/journaloftechnology/archive/vol4no1/vol4no1_4. pdf
  • Trends for 2014 The Challenge of Internet Privacy, http://www. welivesecurity. com/wp-content/uploads/2013/12/Trends-for-2014. pdf
  • EMERGING CYBER THREATS REPORT 2014, https://www. gtisc. gatech. edu/pdf/Threats_Report_2014. pdf
  • Mark Johnson, Overview of Cyber Security & Risk, http://www. int-comp. org/attachments/Overview-Cyber-Security-Risk. pdf
  • Dennis Rand, CSIS Security Research and Intelligence, http://www. csis. dk/downloads/LinkedIn. pdf
  • Top 10 Internet Threats, http://www. norman. com/home_and_small_office/security_center/internet_security_tips/internet_security_tips_top_10_internet_threats
  • Lujo Bauer, Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Anupam Datta, Efforts to promote online privacy via research and education at Carnegie Mellon, http://p2. zdassets. com/hc/theme_assets/512007/200043500/CMU_Proposal_Updated. pdf
  • http://krebsonsecurity. com/2014/10/spike-in-malware-attacks-on-aging-atms/
  • http://www. bankinfosecurity. com/russian-malware-attacks-drain-atms-a-7412/op-1
  • https://www. iiss. org/en/publications/survival/sections/2013-94b0/survival--global-politics-and-strategy-april-may-2013-b2cc/55-2-08-bronk-and-tikk-ringas-e272
  • http://arstechnica. com/security/2014/02/bizarre-attack-infects-linksys-routers-with-self-replicating-malware/
  • http://ajw. asahi. com/article/behind_news/social_affairs/AJ2011102515710
  • http://www. bbc. com/news/technology-25780908
  • http://blog. returnpath. com/blog/tori-funkhouser/top-7-phishing-scams-of-2013
  • http://www. techworld. com/news/security/criminals-hack-300000-home-routers-as-part-of-mystery-pharming-attack-3505049/
  • http://www. wired. com/2011/09/jihadi-spyware/
  • http://www. symantec. com/security_response/attacksignatures/detail. jsp?asid=27222
  • http://www. cnet. com/news/amazon-ec2-cloud-service-hit-by-botnet-outage/
  • http://www. irishtimes. com/business/transport-and-tourism/one-million-rooms-for-marriott-hotels-book-earlier-ransomware-on-the-rise-hot-hotels-doing-well-1. 208246.