Please use this identifier to cite or link to this item:
Title: Protection of Information Systems and Information Infrastructure from Emerging Cyber Threats
Researcher: Devesh Vats
Guide(s): K P Yadav
University: Noida International University
Completed Date: 
Abstract: In the past three decades, the revolution in the field of Information newlineTechnology has quietly changed the way the operations are carried out all over newlineeither in the businesses or in the governments. During the past twenty years, we newlinehave witnessed the phenomenal growth of the commercial Internet, which planted newlineseed of an interconnected and global digital network that has made such things from newlinee-mail to telemedicine to browsing and social networks to online banking and newlineretailing ubiquitous and affordable. The modern nation s world over have shifted the newlinecontrol of essential processes in manufacturing, utilities, banking, transportation and newlinecommunication to networked computers, without the consideration of cyber newlinesecurity. This resulted in high productivity with fewer investments. The trend newlinetowards migration to networked system continues. Today, our economy and national newlinesecurity has become fully dependent upon information technology and the newlineinformation infrastructure. Cyberspace is a new strategic domain, but it is unlike the newlinephysical territory of which we are used to. It has gradually become the nervous newlinesystem through which society operates. Countries now attach significant newlineimportance to the development of cyberspace technologies. newlineThe development of networks has helped to advance social progress. Open newlinenetworks have encouraged information flow and sharing, provided more newlineopportunities for innovations, lowered the costs of innovations, and has helped newlineimprove the world s health, wealth and prosperity. Individuals and communities newlineworldwide connect, socialize and organize themselves in and through cyber space. newlineCyber space is increasingly getting woven into the fabric of everyday life of citizens newlineacross the globe. International businesses trade goods and services in cyber space by newlinemoving assets across the globe in seconds. In addition to facilitating trade in other newlinesectors, cyber space is itself a key sector of the global economy. Cyber space has newlinebecome an incubator for new forms of entrepreneurship, advances in technology, the newlinespread of free speech and new social networks that drive our economy and reflect newlineour principles. The security and effective operation of Indian Critical Infrastructureincluding energy, banking and finance, transportation, communication and the newlineDefence Industrial base- rely on cyber space, industrial control systems and newlineinformation technology that may be vulnerable to disruption or exploitation. Cyber newlinespace provides a means for organized cyber attacks on our infrastructure from a newlinedistance. Malicious actors who conduct cyber attacks against our Critical newlineInformation Infrastructures (CIIs) are from a broad spectrum of malicious newlinebehaviours / activities. Out of the broad spectrum the primary concern, is the threat newlineof organized cyber attacks capable of causing debilitating disruption to our nation s newlinecritical infrastructures, economy or national security. These attacks require only newlinebasic techniques, and enable attackers to obfuscate their identities, locations and newlinepath of entry. Therefore, an effective mechanism and methodology is to be put in newlineplace by all organisations both government and private as well as individuals to newlineprotect their information systems and information infrastructure from ever evolving newlinecyber threats and cyber attacks. This research has been undertaken to study the newlinepresent scenario of emerging cyber threats and subsequent cyber attacks along with newlinethe steps taken by various organisations for mitigation of risk and protect their newlineinformation systems and information infrastructure. The study will also suggest the newlineVII newlineremedial actions to be taken to minimize the risk of cyber attacks as there is no newlinesuch thing as perfect security . newline__________________ ___
Appears in Departments:Department of Computer Science and Engineering / IT

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File37.06 kBAdobe PDFView/Open
02_certificate.pdf133.86 kBAdobe PDFView/Open
03_contents.pdf111.34 kBAdobe PDFView/Open
04_list of tables.pdf47.61 kBAdobe PDFView/Open
05_list of figures.pdf60.4 kBAdobe PDFView/Open
06_acknowledgement.pdf65.95 kBAdobe PDFView/Open
07_chapter 1.pdf202.01 kBAdobe PDFView/Open
08_chapter 2.pdf566.78 kBAdobe PDFView/Open
09_chapter 3.pdf581.39 kBAdobe PDFView/Open
10_chapter 4.pdf470.51 kBAdobe PDFView/Open
11_chapter 5.pdf737.75 kBAdobe PDFView/Open
12_chapter 6.pdf1.62 MBAdobe PDFView/Open
13_appendix.pdf365.09 kBAdobe PDFView/Open
14_references.pdf117.22 kBAdobe PDFView/Open
15_publications.pdf65.05 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: