International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 5 | Views: 133 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper | Information Security | India | Volume 13 Issue 3, March 2024 | Popularity: 4.9 / 10


     

Protecting the Digital Frontier: Understanding Cybersecurity Challenges and Innovations in the Age of Technology

Dr. Ashok Kumar Yadav


Abstract: The significance of cybersecurity in the domain of Information Technology cannot be overstated. The safeguarding of information has emerged as a formidable challenge in contemporary times. The proliferation of cyber-crimes has become a major concern, prompting governments and corporations to adopt numerous measures to prevent them. Despite these efforts, cybersecurity remains a pressing issue for many. This paper primarily concentrates on the challenges encountered by Cyber Security in the context of cutting-edge technologies. It also delves into the latest Cyber Security techniques, ethical considerations, and trends that are transforming the landscape of Cyber Security.


Keywords: Cyber security, Cyber-crime, Cyber Security techniques, Computing services


Edition: Volume 13 Issue 3, March 2024


Pages: 520 - 523


DOI: https://www.doi.org/10.21275/SR24306174323



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Dr. Ashok Kumar Yadav, "Protecting the Digital Frontier: Understanding Cybersecurity Challenges and Innovations in the Age of Technology", International Journal of Science and Research (IJSR), Volume 13 Issue 3, March 2024, pp. 520-523, URL: https://www.ijsr.net/getabstract.php?paperid=SR24306174323, DOI: https://www.doi.org/10.21275/SR24306174323



Downloads: 246 | Views: 469 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 8 Issue 11, November 2019

Pages: 95 - 101

Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)

S K. Niamathulla


Downloads: 221 | Views: 647 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Downloads: 161 | Views: 323 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 7 Issue 7, July 2018

Pages: 905 - 907

The Language of Information Security

Mahesh P G


Downloads: 148 | Views: 295 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C


Downloads: 144 | Views: 281 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Security, Kenya, Volume 7 Issue 1, January 2018

Pages: 345 - 350

Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya

Jairus E. Ounza, Samuel Liyala, Solomon Ogara


Top