Cyber attacks, network security and information, are complex issues of a new area for research in the field of national security policy. Cyber attacks have now become a major problem in our society. As organizations are becoming more dependent on information technology, the emphasis on information security is getting more significant. Much of the literature on cyber attacks, also known as cyber-terrorism, suggests that computer networks are vulnerable as well as providing essential structure of human activity, and the vulnerability are at great risk of national security. Cyber attacks, like phishing, are bait in which innocent and mostly new users get caught. With the passage, of time the methods have advanced and emails and web sites have become more sophisticated and believable. Among many ways in which users can take care of the phishing, spyware, hacking and other such methods one method is also the use of technology. Like other technologies, the criminal technologies used for identity theft and other cyber crimes are also advancing.
Mitigating Cyber Attacks: An Empirical Review
Introduction
Computer frauds and hacking activities have become a constant war with these intelligent criminals. There have been instances in which they have been able to capture the complete systems of Internet service providers and even threatened them to destroy their system and to distribute all the credit card information. In certain cases, there have been employees who sabotaged the whole system. Internal employees having access to critical files have also caused trouble in certain cases. Dealing with an outsider as well an insider is a hard to juggle task. All the major banks and financial institution are deeply worried about electronic money, open-access World Wide Web sites, investment dealings worldwide and the threat of those breaking into secure systems.
Research Problem
The main aim and objective of this paper is to discover and explore all possible damages that the cyber attacks are causing and ways to mitigate those attacks. Cyber attacks are unethical conduct. It is not only harmful for businesses that suffer from mammoth amount loss, but it is also harmful for normal individuals as they face the threat of leakage of their personal information.
Addressing the Research Problem
The research problem will be addressed through researching relevant literature, periodicals & journal articles in the areas of cyber crimes, online security, solutions to cyber attacks etc. In this research study the data collected from the research methods will be extracted from numerous sources. These sources include online libraries, peer review journals, and marketing articles, and different online books on cyber attacks and its mitigation. The main objective of using the secondary research for this research study is the accumulation of the relevant information via different authenticated sources. These authenticated sources include broadcast media, literature, publication, and other sources. These sources are categorized as the non human interference sources. A secondary research interprets and analyzes primary sources. Some types of secondary sources are:
Textbooks
Journal articles
Literary criticism and comments
Encyclopaedias
Biographies
These sources helped the research study to focus on the cyber attacks and ...