CFP last date
20 May 2024
Reseach Article

Internet Threats and Prevention � A Brief Review

Published on August 2015 by Sheenam Bhola, Sonamdeep Kaur, Gulshan Kumar
International Conference on Advancements in Engineering and Technology
Foundation of Computer Science USA
ICAET2015 - Number 10
August 2015
Authors: Sheenam Bhola, Sonamdeep Kaur, Gulshan Kumar
ff934880-ec2d-4727-9a3f-0db6989b9813

Sheenam Bhola, Sonamdeep Kaur, Gulshan Kumar . Internet Threats and Prevention � A Brief Review. International Conference on Advancements in Engineering and Technology. ICAET2015, 10 (August 2015), 13-17.

@article{
author = { Sheenam Bhola, Sonamdeep Kaur, Gulshan Kumar },
title = { Internet Threats and Prevention � A Brief Review },
journal = { International Conference on Advancements in Engineering and Technology },
issue_date = { August 2015 },
volume = { ICAET2015 },
number = { 10 },
month = { August },
year = { 2015 },
issn = 0975-8887,
pages = { 13-17 },
numpages = 5,
url = { /proceedings/icaet2015/number10/22277-4147/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advancements in Engineering and Technology
%A Sheenam Bhola
%A Sonamdeep Kaur
%A Gulshan Kumar
%T Internet Threats and Prevention � A Brief Review
%J International Conference on Advancements in Engineering and Technology
%@ 0975-8887
%V ICAET2015
%N 10
%P 13-17
%D 2015
%I International Journal of Computer Applications
Abstract

Network security is a branch of computer technology whose objective is to protect the information and property from theft, corruption, or threats attack. Now a days, we are mostly dependent on internet for many things such as online shopping, bank transactions, internet surfing etc. However, internet is not fully secure as its users are threatened by many computer viruses, malicious threats and many more attacks. This paper summarize various computer threats and mechanisms used for protecting sensitive information over the internet.

References
  1. The basic of Web Threats, http://la. trendmicro. com/media/br/the-basic-of-web-threats-brochure-en. pdf
  2. Anthony Bisong and Syed (Shawon) M. Rahman , AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING, http://airccse. org/journal/nsa/0111jnsa03. pdf
  3. RandyBrown, WEB SECURITY ISSUES: HOW HAS RESEARCH ADDRESSED THE GROWING NUMBER OF THREATS? http://www. swdsi. org/swdsi08/paper/SWDSI%20Proceedings%20Paper%20S301. pdf
  4. Potential security threats to your computer system, http://www. guru99. com/potential-security-threats-to-your-computer-systems. html
  5. David Harley BA CISSP FBCS CITP , Staying Safe on the Internethttp://www. eset. com/us/resources/white-papers/StaySafeOnTheInternet. pdf
  6. Saeed S. Basamh, Hani A. Qudaih, Jamaludin Bin Ibrahim, An Overview on Cyber Security Awareness in Muslim Countries, http://esjournals. org/journaloftechnology/archive/vol4no1/vol4no1_4. pdf
  7. Trends for 2014 The Challenge of Internet Privacy, http://www. welivesecurity. com/wp-content/uploads/2013/12/Trends-for-2014. pdf
  8. EMERGING CYBER THREATS REPORT 2014, https://www. gtisc. gatech. edu/pdf/Threats_Report_2014. pdf
  9. Mark Johnson, Overview of Cyber Security & Risk, http://www. int-comp. org/attachments/Overview-Cyber-Security-Risk. pdf
  10. Dennis Rand, CSIS Security Research and Intelligence, http://www. csis. dk/downloads/LinkedIn. pdf
  11. Top 10 Internet Threats, http://www. norman. com/home_and_small_office/security_center/internet_security_tips/internet_security_tips_top_10_internet_threats
  12. Lujo Bauer, Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Anupam Datta, Efforts to promote online privacy via research and education at Carnegie Mellon, http://p2. zdassets. com/hc/theme_assets/512007/200043500/CMU_Proposal_Updated. pdf
  13. http://krebsonsecurity. com/2014/10/spike-in-malware-attacks-on-aging-atms/
  14. http://www. bankinfosecurity. com/russian-malware-attacks-drain-atms-a-7412/op-1
  15. https://www. iiss. org/en/publications/survival/sections/2013-94b0/survival--global-politics-and-strategy-april-may-2013-b2cc/55-2-08-bronk-and-tikk-ringas-e272
  16. http://arstechnica. com/security/2014/02/bizarre-attack-infects-linksys-routers-with-self-replicating-malware/
  17. http://ajw. asahi. com/article/behind_news/social_affairs/AJ2011102515710
  18. http://www. bbc. com/news/technology-25780908
  19. http://blog. returnpath. com/blog/tori-funkhouser/top-7-phishing-scams-of-2013
  20. http://www. techworld. com/news/security/criminals-hack-300000-home-routers-as-part-of-mystery-pharming-attack-3505049/
  21. http://www. wired. com/2011/09/jihadi-spyware/
  22. http://www. symantec. com/security_response/attacksignatures/detail. jsp?asid=27222
  23. http://www. cnet. com/news/amazon-ec2-cloud-service-hit-by-botnet-outage/
  24. http://www. irishtimes. com/business/transport-and-tourism/one-million-rooms-for-marriott-hotels-book-earlier-ransomware-on-the-rise-hot-hotels-doing-well-1. 208246.
Index Terms

Computer Science
Information Sciences

Keywords

Internet Threats Security Prevention