Cybersecurity: Protecting Networks, Systems, and Data from Cyberattacks

Main Article Content

Rajeev Yadav
Gurdeep Kashyap
Aman Kumawat
Divyanshu Sharma

Abstract

The prevalence of cyber risks presents an ever-increasing threat to the security of networks, systems, and sensitive data in an era where digital connectivity rules. This study explores the complex field of cybersecurity with the goal of offering a thorough grasp of the tactics used to defend against cyberattacks.
The first section of the study examines the historical background of cybersecurity, showing how it developed from simple computer security measures to the complex array of modern threats. The focus is on describing the wide range of cyberthreats, such as ransomware, phishing, and malware, and illustrating how they appear and what happens in the real world. A large amount of research is devoted to analyzing the vulnerabilities present in operating systems, networks, and data storage, providing insight into the complex interactions between technological flaws and human variables. The paper explores the role of human error as a crucial trigger for cybersecurity breaches in addition to clarifying the various attack surfaces.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Yadav, R. ., Kashyap, G. ., Kumawat, A., & Sharma, D. . (2019). Cybersecurity: Protecting Networks, Systems, and Data from Cyberattacks. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1565–1568. https://doi.org/10.61841/turcomat.v10i3.14395
Section
Research Articles

References

Anderson, R., & Moore, T. (2009). Information security economics—and beyond. In T. M. Moore (Ed.),

Economics of Information Security (Vol. 1, pp. 187-198). Springer.

Clarke, R., & Knake, R. K. (2010). Cyber war: The next threat to national security and what to do about it.

HarperCollins..

Disterer, G. (2012). Cyber security and the politics of time. In Proceedings of the 2012 European Conference

on Information Warfare and Security (pp. 71-79). Academic Conferences International Limited.

Eren, S., & Batur, D. (2017). Cybersecurity challenges in critical infrastructure protection. In Advances in

Information Security, Privacy, & Ethics (pp. 19-43). IGI Global.

Goodman, S. E. (Ed.). (2015). The dynamics of cyberspace: Understanding complex and unpredictable

behavior. Oxford University Press.

Herold, R. V. (2016). Data privacy for the smart grid. Springer.

Kizza, J. M. (2015). Guide to computer network security (3rd ed.). Springer.

Landwehr, C. E., & Bull, J. M. (2012). Cyber security: A critical review of several key issues. In Proceedings

of the 45th Hawaii International Conference on System Sciences (pp. 1032-1041). IEEE.

NIST. (2018). Framework for improving critical infrastructure cybersecurity. National Institute of Standards

and Technology. https://www.nist.gov/cyberframework.

Ozdemir, Z. D. (2017). Cybersecurity in smart grid communication networks. In Security and Privacy in

Communication Networks (pp. 199-224). Springer.

Ransbotham, S., Kiron, D., & Prentice, P. (2015). Beyond the hype: The hard work behind analytics success.

MIT Sloan Management Review, 56(4), 1-31.

Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.

W. Norton & Company..

Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford

University Press.

World Economic Forum. (2018). "Digital Transformation Initiative: Unlocking $100 Trillion for Business

and Society from Digital Transformation."

Whitman, M. E., & Mattord, H. J. (2018). Management of Information Security (6th ed.). Cengage Learning.

R. K. Kaushik Anjali and D. Sharma, "Analyzing the Effect of Partial Shading on Performance of Grid

Connected Solar PV System", 2018 3rd International Conference and Workshops on Recent Advances and

Innovations in Engineering (ICRAIE), pp. 1-4, 2018.