Cybersecurity: Safeguarding the digital landscape
This paper examines the crucial subject of cyber security and its relevance in the current digital age. With the accelerated development of technology and interconnection, it is now more important than ever to guard against cyber attacks. The article gives a general overview of cyber security, inclu...
Saved in:
Published in | AIP conference proceedings Vol. 3100; no. 1 |
---|---|
Main Authors | , |
Format | Journal Article Conference Proceeding |
Language | English |
Published |
Melville
American Institute of Physics
11.06.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 0094-243X 1551-7616 |
DOI | 10.1063/5.0219596 |
Cover
Abstract | This paper examines the crucial subject of cyber security and its relevance in the current digital age. With the accelerated development of technology and interconnection, it is now more important than ever to guard against cyber attacks. The article gives a general overview of cyber security, including its meaning and value in protecting people, businesses, and societyat large. It explores a range of cyber threats, including insider threats, phishing scams, and malware assaults. The study then addresses crucial cyber security elements, such as identity and access management, network security, data protection, and application security. It looks at the techniques and recommendations used to improve cyber security, including encryption, firewalls, secure coding techniques, and incident response strategy. The study also examines recent developments in cyber security, such as IoT security, cloud security, and privacy laws. It addresses social engineering assaults and the significance of user education and awareness while emphasising the human element incyber security. The study also emphasizes the value of public-private partnerships, regulatory frameworks, and international collaboration in enhancing cyber security. Finally, it examines the field’s potential future developments, including automation, threat intelligence, and ethical issues. In order to effectively address cyber threats, the study emphasizes the dynamic nature of cyber security and the necessity for continual awareness and agility. |
---|---|
AbstractList | This paper examines the crucial subject of cyber security and its relevance in the current digital age. With the accelerated development of technology and interconnection, it is now more important than ever to guard against cyber attacks. The article gives a general overview of cyber security, including its meaning and value in protecting people, businesses, and societyat large. It explores a range of cyber threats, including insider threats, phishing scams, and malware assaults. The study then addresses crucial cyber security elements, such as identity and access management, network security, data protection, and application security. It looks at the techniques and recommendations used to improve cyber security, including encryption, firewalls, secure coding techniques, and incident response strategy. The study also examines recent developments in cyber security, such as IoT security, cloud security, and privacy laws. It addresses social engineering assaults and the significance of user education and awareness while emphasising the human element incyber security. The study also emphasizes the value of public-private partnerships, regulatory frameworks, and international collaboration in enhancing cyber security. Finally, it examines the field’s potential future developments, including automation, threat intelligence, and ethical issues. In order to effectively address cyber threats, the study emphasizes the dynamic nature of cyber security and the necessity for continual awareness and agility. |
Author | Kaur, Kiranjeet Batth, Jaspreet Singh |
Author_xml | – sequence: 1 givenname: Kiranjeet surname: Kaur fullname: Kaur, Kiranjeet organization: Department of Computer Science and Engineering, Chandigarh University – sequence: 2 givenname: Jaspreet Singh surname: Batth fullname: Batth, Jaspreet Singh email: Jaspreet.e10279@cumail.in organization: Department of Computer Science and Engineering, Chandigarh University |
BookMark | eNotkE1LxDAURYOM4Mzown9QcCd0zEuatHEnxS8YcKGCu_DavNQOY1uTdtF_78jM6m4O917Oii26viPGroFvgGt5pzZcgFFGn7ElKAVprkEv2JJzk6Uik18XbBXjjnNh8rxYMijnikKkegrtON8n7-ipmTC4tmuS8ZsS1zbtiPtkj52LNQ50yc497iNdnXLNPp8eP8qXdPv2_Fo-bNMBpBzT3GSVd1UGQJQXOWnOnfYCpTIicwhg6gpNhhIkaZIOq6JCUYDX5LV3Qq7ZzbF3CP3vRHG0u34K3WHSSq61UaoAdaBuj1SsDzfHtu_sENofDLMFbv-VWGVPSuQfSuxUcA |
CODEN | APCPCS |
ContentType | Journal Article Conference Proceeding |
Copyright | Author(s) 2024 Author(s). Published under an exclusive license by AIP Publishing. |
Copyright_xml | – notice: Author(s) – notice: 2024 Author(s). Published under an exclusive license by AIP Publishing. |
DBID | 8FD H8D L7M |
DOI | 10.1063/5.0219596 |
DatabaseName | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
DatabaseTitle | Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
DatabaseTitleList | Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
EISSN | 1551-7616 |
Editor | Singh, Sandeep Singh, Narinder Tiwary, Aditya Kumar |
Editor_xml | – sequence: 1 givenname: Sandeep surname: Singh fullname: Singh, Sandeep organization: Chandigarh University – sequence: 2 givenname: Aditya Kumar surname: Tiwary fullname: Tiwary, Aditya Kumar organization: Chandigarh University – sequence: 3 givenname: Narinder surname: Singh fullname: Singh, Narinder organization: University of Salerno |
ExternalDocumentID | acp |
Genre | Conference Proceeding |
GroupedDBID | -~X 23M 5GY AAAAW AABDS AAEUA AAPUP AAYIH ABJNI ACBRY ACZLF ADCTM AEJMO AFATG AFHCQ AGKCL AGLKD AGMXG AGTJO AHSDT AJJCW ALEPV ALMA_UNASSIGNED_HOLDINGS ATXIE AWQPM BPZLN F5P FDOHQ FFFMQ HAM M71 M73 RIP RQS SJN ~02 8FD ABJGX ADMLS H8D L7M |
ID | FETCH-LOGICAL-p133t-794bfdb411ee787e600d6f2a35924da119cba94a313e6e3dab8ba281f6ef6fd23 |
ISSN | 0094-243X |
IngestDate | Mon Jun 30 03:58:23 EDT 2025 Tue Jun 25 16:50:41 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | Published under an exclusive license by AIP Publishing. |
LinkModel | OpenURL |
MeetingName | 3RD INDO-EUROPEAN CONFERENCE ON SUSTAINABLE MATERIALS, ENVIRONMENT, AND CONSTRUCTION |
MergedId | FETCHMERGED-LOGICAL-p133t-794bfdb411ee787e600d6f2a35924da119cba94a313e6e3dab8ba281f6ef6fd23 |
Notes | ObjectType-Conference Proceeding-1 SourceType-Conference Papers & Proceedings-1 content type line 21 |
PQID | 3066955815 |
PQPubID | 2050672 |
PageCount | 14 |
ParticipantIDs | proquest_journals_3066955815 scitation_primary_10_1063_5_0219596 |
PublicationCentury | 2000 |
PublicationDate | 20240611 |
PublicationDateYYYYMMDD | 2024-06-11 |
PublicationDate_xml | – month: 06 year: 2024 text: 20240611 day: 11 |
PublicationDecade | 2020 |
PublicationPlace | Melville |
PublicationPlace_xml | – name: Melville |
PublicationTitle | AIP conference proceedings |
PublicationYear | 2024 |
Publisher | American Institute of Physics |
Publisher_xml | – name: American Institute of Physics |
SSID | ssj0029778 |
Score | 2.3605082 |
Snippet | This paper examines the crucial subject of cyber security and its relevance in the current digital age. With the accelerated development of technology and... |
SourceID | proquest scitation |
SourceType | Aggregation Database Publisher |
SubjectTerms | Access control Cybersecurity Data encryption Intelligence gathering Network security Privacy Threat evaluation User training |
Title | Cybersecurity: Safeguarding the digital landscape |
URI | http://dx.doi.org/10.1063/5.0219596 https://www.proquest.com/docview/3066955815 |
Volume | 3100 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF60RfTmE-uLgN4k2n0m8VZqRaU-wBZ6C7vZSfFSi9aD_non6SZNtQh6WUJYluSb2dlvdmdmCTnRhkLShCZOcR36QjcjP2JJ4CsutKXahkZnJ7p39-q6L24HcjCrZpFnl0zMWfK5MK_kP1LFdyjXLEv2D5ItB8UX-IzyxRYljO1PGS9calo3j1ngeFEsdtbnraoL7Q-DLM_dVJftATzpFIa5crhkKfs8zG4POc0zf7OYqOpuABNZ1BKtRFYUxzxzoQZ5MGlS3fxDp85nIr-JF1cBZ_ok9QM1zXwsbGO2_f9dC34YXWQ5iJQ8Q7oQyWhBYev7h_iq3-3Gvc6gt0zqjCNtqZF66_Ku-1R6x0hEp8um-7SiDJTi5-XQc27AKnKEabhChRH01sn2LFfSeyxh3yBLMNokKw6LLULnsL_wqsh7iLznkPdK5LdJ_6rTa1_77poKf4wO_sRHi2ZSawSlAGj-ACmkVSnTXKJvazWlUWJ0JDSnHBRwqw1OABbSVEGqUsv4DqmNXkawS7ym4cwIZoBpJYIkCK2SAJAG2I2CTRrkoPj_2OnhW4xOn4qkDKlskOMSk3g8rVYS51EGiscydiDu_T7IPlmbKdYBqU1e3-EQidfEHDmRfQE7-TG9 |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=AIP+conference+proceedings&rft.atitle=Cybersecurity%3A+Safeguarding+the+digital+landscape&rft.date=2024-06-11&rft.pub=American+Institute+of+Physics&rft.issn=0094-243X&rft.eissn=1551-7616&rft.volume=3100&rft.issue=1&rft_id=info:doi/10.1063%2F5.0219596&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0094-243X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0094-243X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0094-243X&client=summon |