Beyond Traditional Security: A Defense Analysis of Modern Cyber Threats

  • Partha Shankar Nayak
  • Dipankar Basu
  • Ranjan Banerjee
Keywords: Cyber bullying, Network Security, Cyber-Threat, Situation Awareness, Cyber Defense, Cyber Ethics

Abstract

As technology evolves, cyber security has become paramount for organizations to meet the needs of all stakeholders. Building both resilience and trust is crucial in protecting against online threats like hacking and identity theft. Security analysts play a critical role in identifying and mitigating cyber threats by analyzing vast amounts of data, including intrusion alerts and network logs. Situation awareness (SA) is essential for developing proactive defense strategies that can disrupt attackers' attempts to penetrate information systems and cause significant harm to organizations.

Author Biographies

Partha Shankar Nayak

Assistant Professor , Computer Science and Engineering, Brainware University 

 

Dipankar Basu

Assistant Professor , Computer Science and Engineering, Guru Nanak Institute of Technology

 

Ranjan Banerjee

Assistant Professor, Computer Science and Engineering, Brainware University

References

1. H. Gardner, The Mind’s New Science: A History of the Cognitive Revolution, Basic Books, 1987.
2. D. Geer Jr., K. S. Hoo, A. Jaquith, “Information security: Why the future belongs to the quants,” IEEE Security & Privacy, 2003.
3. C. Sutton, A. McCallum, “Piecewise Training for Structured Prediction,” Machine Learning To appear.
4. Alperovitch, Dmitri. (2011). Revealed: Operation Shady Rat. [White Paper]. Retrieved from: http://www.mcafee.com/us/resources/white- papers/wp-operation-shady-rat.pdf
5. Department of Defense. (2011). Department of Defense Strategy for Operating in Cyberspace. Retrieved from: http://www.defense.gov/news/d20110714cyber.pdf
6. McNeese, M., Cooke, N.J., Champion, M.A. (2011) Situating Cyber Situation Awareness. Proceedings of the 10th International Conference on Naturalistic Decision Making.
7. Zetter, K. (2011b) ‘FBI vs. Core flood Botnet: Round 1 Goes to the Feds,’ Wired, April
8. 26 http://www.wired.com/threatlevel/2011/04/coreflood_results/ (accessed November 27, 2012).
9. McGraw, G. (2013) ‘” Active Defense” is Irresponsible,’ Digital blog, February 14. http://www.cigital.com/justice-league-blog/2013/02/14/active-defense-is-irresponsible/ (accessed October 8, 2013).
10. https://www.accenture.com/us-en/services/security/cyber-defense
11. https://en.wikipedia.org/wiki/Proactive_cyber_defense
Published
2024-09-03
How to Cite
Partha Shankar Nayak, Dipankar Basu, & Ranjan Banerjee. (2024). Beyond Traditional Security: A Defense Analysis of Modern Cyber Threats. Revista Electronica De Veterinaria, 25(1), 1011 -1014. https://doi.org/10.69980/redvet.v25i1.781
Section
Articles