Cloud Based Effective Cyber Security System

Main Article Content

Dr. A. Nanda Gopal Reddy

Abstract

From the stadium of pc system era cyber security can be just really a huge consideration to stop assets of networks, private data along with essential information within a single business. The purpose with the paper will be to underline different kinds of cyber threats and also their way to over come out of these. In addition to that, in addition, it clarifies different characteristics of cyber crime and its own particular security while within the worldwide planet. But, using all the enlargement of internet utilization, cyber security isn't confined to your own workstation, however also utilized to curb information on personal cellular apparatus such as cell and tabs phones due to the fact that they've grown quite crucial moderate of information transport as a result of recent breakthroughs in technology. In order to better comprehend the growing threats in today's technologically sophisticated world, security experts from different sectors, including as the government, academia, and business, must cooperate in order to address cyber security problems.

Downloads

Download data is not yet available.

Article Details

How to Cite
Dr. A. Nanda Gopal Reddy. (2023). Cloud Based Effective Cyber Security System. Journal of Advanced Zoology, 44(S7), 939–944. https://doi.org/10.53555/jaz.v44iS7.2984
Section
Articles
Author Biography

Dr. A. Nanda Gopal Reddy

Professor, Mahaveer Institute of Science & Technology, Hyderabad, Telangana, India.

References

http://deity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20%281%29. pdf accessed on 18 jan2016 at 1100 hrs.

Douglas A. Barnes. Deworming the internet. Texas Law Review,83:279–329, November 2004.

Seymour E. Goodman and Herbert S. Lin, editors. Toward a Saferand More Secure Cyberspace. National Academies Press, 2007.

United States Department of Justice, editor. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. 2002.

Paul Ohm, Douglas Sicker, and Dirk Grunwald. Legal Issues Surrounding Monitoring (Invited Paper). In Internet Measurement Conference, October 2007.

Yang and J. Lui. Security adoption in heterogenous networks: The influence of cyber-insurance market. In IFIP Networking, 2012

M. Lelarge and J. Bolot. Economic incentives to increase security in the internet: The case for insurance. In IEEE INFOCOM, 2009

Khouzani, S. Sen, and N. Shroff. An economic analysis of regulatingsecurity investments in the internet. In IEEE INFOCOM, 2013

Cui Jing, Liu Guangzhong, the basics of computer network [J]. Tsinghua University Press,2010.07.01.

Daniel J. Solove. Digital dossiers and the dissipation of fourth amendment privacy. Southern California Law Review, pages 1083–1167, 2002.