Research Analysis of Cyber Security

1
Rabea Masood
Rabea Masood
2
Mehreen Sirshar
Mehreen Sirshar
3
Qaria Zainab
Qaria Zainab
1 Fatima Jinnah Women University

Send Message

To: Author

GJCST Volume 15 Issue E4

Article Fingerprint

ReserarchID

CSTNWS3U8CQ

Research Analysis of Cyber Security Banner

AI TAKEAWAY

The objective of our study was to evaluate, in a population of Togolese People Living With HIV(PLWHIV), the agreement between three scores derived from the general population namely the Framingham score, the Systematic Coronary Risk Evaluation (SCORE), the evaluation of the cardiovascular risk (CVR) according to the World Health Organization.
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is a major enigmawhich needs to be resolved.With vulnerabilities everywhere, data security and privacy is always at risk. This specially comes in play when services of third party are used knowingly or unknowingly. Government and business organizations are testing and implementing security and monitoring techniques to stand a better chance in raging war against cyber-crimes. Moreover, the formulation of new methods also poses new limitations of the systems as well as the users like lack of efficiency or complexity which need to be resolved in order to get better results. In this research paper some of those limitations and their solutions are discussed.

Article content is being processed or not available yet.

21 Cites in Articles

References

  1. John Malgeri (2009). Cyber security.
  2. R Pal,L Golubchik,K Psounis,Pan Hui (2014). Will cyber-insurance improve network security? A market analysis.
  3. S Kowtha,L Nolan,R Daley (2012). Cyber security operations center characterization model and analysis.
  4. Peter Trim,Yang-Im Lee (2010). A security framework for protecting business, government and society from cyber attacks.
  5. T Feglar Unknown Title.
  6. J Levy (2004). Protecting cyber critical infrastructure (CCI): integrating information security risk analysis and environmental vulnerability analysis.
  7. Andre Teixeira,Saurabh Amin,Henrik Sandberg,Karl Johansson,Shankar Sastry (2010). Cyber security analysis of state estimators in electric power systems.
  8. Peng Xie,Jason Li,Xinming Ou,Peng Liu,Renato Levy (2010). Using Bayesian networks for cyber security analysis.
  9. Alex Malin,Graham Van Heule (2007). Continuous monitoring and cyber security for high performance computing.
  10. R Sandhu,R Krishnan,Gregory White (2010). Towards Secure Information Sharing models for community Cyber Security.
  11. Prof Marthie,; Zama Dlamini,; Siphongobeni (2011). Towards a cyber-security aware rural community.
  12. Dr,R Peter,Trim,Dr,-Im Yang,Lee (2015). A Security Framework for Protecting Business, Government and Society from Cyber Attacks.
  13. Rayne Reid,Johan Van Niekerk (2014). From information security to cyber security cultures.
  14. Jan Kallberg,Bhavani Thuraisingham (2012). Towards cyber operations - The new role of academic cyber security research and education.
  15. K Robert,; Abercrombie,T Frederick,Ali Sheldon,Mili (2014). Validating Cyber Security Requirements: A Case Study.
  16. Ellefsen Ian (2013). The Development of a Cyber Security Policy in Developing Regions and the Impact on Stakeholders.
  17. Anis Ben Aissa,; Robert,K Abercrombie,; Frederick,T Sheldon,Ali Milli (2013). Quantifying Security Threats and Their Impact.
  18. K Dennis,Keith Holstein,Stouffer (2010). Trust but Verify Critical Infrastructure Cyber Security Solutions.
  19. Sajjan Shiva,; Sankardas,Roy (2010). Game Theory for Cyber Security.
  20. Rebecca Lefebvre (2012). The human element in cyber security.
  21. James Tziporahalevi,Lewis;Nasirmemon (2013). A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Rabea Masood. 2015. \u201cResearch Analysis of Cyber Security\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: C.2.0
Version of record

v1.2

Issue date

July 29, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 7815
Total Downloads: 2097
2026 Trends
Research Identity (RIN)
Related Research

Article in Review

In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is a major enigmawhich needs to be resolved.With vulnerabilities everywhere, data security and privacy is always at risk. This specially comes in play when services of third party are used knowingly or unknowingly. Government and business organizations are testing and implementing security and monitoring techniques to stand a better chance in raging war against cyber-crimes. Moreover, the formulation of new methods also poses new limitations of the systems as well as the users like lack of efficiency or complexity which need to be resolved in order to get better results. In this research paper some of those limitations and their solutions are discussed.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Research Analysis of Cyber Security

Rabea Masood
Rabea Masood Fatima Jinnah Women University
Mehreen Sirshar
Mehreen Sirshar
Qaria Zainab
Qaria Zainab

Research Journals