An Investigation on Cyber Security Threats and Security Models

Kutub Thakur, Meikang Qiu*, Keke Gai, Md Liakat Ali

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

131 Citations (Scopus)

Abstract

Cyber security has been used interchangeably for information security, where later considers the role of the human in the security process while former consider this as an additional dimension and also, focus person has a potential target. However, such discussion on cyber security has important implication as it focuses on the ethical part of the society as a whole. To address the issue of cyber security, various frameworks and models have been developed. It also introduces the concepts of cyber security in terms of its framework, workforces and information related to protecting personal information in the computer. This paper reviews these models along with their limitations and review the past techniques used to mitigate these threats. Furthermore, the report also provides recommendations for future research.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015
EditorsTao Zhang, Sajal K. Das, Tao Zhang, Meikang Qiu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages307-311
Number of pages5
ISBN (Electronic)9781467392990
DOIs
Publication statusPublished - 4 Jan 2016
Externally publishedYes
Event2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - New York, United States
Duration: 3 Nov 20155 Nov 2015

Publication series

NameProceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015

Conference

Conference2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015
Country/TerritoryUnited States
CityNew York
Period3/11/155/11/15

Keywords

  • Cybersecurity
  • frameworks
  • techniques
  • threats
  • workforces

Fingerprint

Dive into the research topics of 'An Investigation on Cyber Security Threats and Security Models'. Together they form a unique fingerprint.

Cite this