Research Analysis of Cyber Security

Article ID

CSTNWS3U8CQ

Research Analysis of Cyber Security

Rabea Masood
Rabea Masood Fatima Jinnah Women University
Mehreen Sirshar
Mehreen Sirshar
Qaria Zainab
Qaria Zainab
DOI

Abstract

In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is a major enigmawhich needs to be resolved.With vulnerabilities everywhere, data security and privacy is always at risk. This specially comes in play when services of third party are used knowingly or unknowingly. Government and business organizations are testing and implementing security and monitoring techniques to stand a better chance in raging war against cyber-crimes. Moreover, the formulation of new methods also poses new limitations of the systems as well as the users like lack of efficiency or complexity which need to be resolved in order to get better results. In this research paper some of those limitations and their solutions are discussed.

Research Analysis of Cyber Security

In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is a major enigmawhich needs to be resolved.With vulnerabilities everywhere, data security and privacy is always at risk. This specially comes in play when services of third party are used knowingly or unknowingly. Government and business organizations are testing and implementing security and monitoring techniques to stand a better chance in raging war against cyber-crimes. Moreover, the formulation of new methods also poses new limitations of the systems as well as the users like lack of efficiency or complexity which need to be resolved in order to get better results. In this research paper some of those limitations and their solutions are discussed.

Rabea Masood
Rabea Masood Fatima Jinnah Women University
Mehreen Sirshar
Mehreen Sirshar
Qaria Zainab
Qaria Zainab

No Figures found in article.

Rabea Masood. 2015. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
GJCST-E Classification: C.2.0
Keywords
Article Matrices
Total Views: 7773
Total Downloads: 2155
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Research Analysis of Cyber Security

Rabea Masood
Rabea Masood Fatima Jinnah Women University
Mehreen Sirshar
Mehreen Sirshar
Qaria Zainab
Qaria Zainab

Research Journals