2017
DOI: 10.1007/978-3-319-53396-4_15
|View full text |Cite
|
Sign up to set email alerts
|

Importance of Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…With the recent interest and progress in the development of internet and communication technologies over the last decade, network security has emerged as a vital research domain. It employs tools like firewall, antivirus software, and intrusion detection system (IDS) to ensure the security of the network and all its associated assets within a cyberspace 1 . Among these, network‐based intrusion detection system (NIDS) is the attack detection mechanism that provides the desired security by constantly monitoring the network traffic for malicious and suspicious behavior 2,3 …”
Section: Introductionmentioning
confidence: 99%
“…With the recent interest and progress in the development of internet and communication technologies over the last decade, network security has emerged as a vital research domain. It employs tools like firewall, antivirus software, and intrusion detection system (IDS) to ensure the security of the network and all its associated assets within a cyberspace 1 . Among these, network‐based intrusion detection system (NIDS) is the attack detection mechanism that provides the desired security by constantly monitoring the network traffic for malicious and suspicious behavior 2,3 …”
Section: Introductionmentioning
confidence: 99%
“…To catch up with a development made to new communication platforms and applications, the subject of network security has become one of famous issues that are widely studied. Along this line, many attempts exploit a range of defence mechanism, for instance, firewall and IDS (intrusion detection system) modules to protect assets in a cyberspace [1][2][3]. To be more specific, unpatched services are good examples of targets of an intrusive attack, which is a significant threat to both individuals and institutes [4].…”
Section: Introductionmentioning
confidence: 99%
“…The past presence in the state of mechanisms for interagency planning to implement legislative policies appeared to be the most relevant factor in different nations. Numerous researchers previously depicted the importance of cybersecurity law (Tarter 2017;Veale and Brown 2020) and implementation of cybersecurity law (Azmi 2020;Sattar et al 2018), and a few have described the important factors that can influence the implantation of cybersecurity laws in different countries (Goel 2020). Our study will explain different elements and factors that influence the implementation of a law positively or negatively in developing economies.…”
Section: Introductionmentioning
confidence: 99%