Abstract

Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecting benefits and minimizing risks requires reliable and robust cyber security, backed by a robust research and translation system. Trust is essential for growth and maintenance of participation in the digital community. Organizations gain trust by acting in a trustworthy way leading to building reliable and secure systems, treating people, their privacy and their data with respect, and providing reliable and understandable information to help people understand how safe they are. Research and revolution in industry and academia will continue to make important contributions to create flexible and reliable digital environment. Cyber Security has a main role in the field of information technology because securing information has become one of the greatest challenges today. When we think about the cyber security, the first thing that comes to our mind is “cyber crimes” which are increasing exponentially day by day. Many governments and firms are taking many measures to prevent these cybercrimes. Besides the various measures, cyber security remains a major concern. This paper intended to give a deep overview of the concepts and principles of cyber security that affect the safety and security in an international context. It mainly focuses on challenges faced by cyber security on the latest technologies and focuses also on introducing security types, cyber security techniques, cyber security ethics, trends that change the face of cyber security and finally attempting to solve one of the most serious cyber security crimes of violating privacy on the internet by improving the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm that analyzes the user’s information resources and determines the valid data to be encrypted, then uses adaptive acquisition methods to collect the information and finally a new cryptographic method is used to complete SPI secure encryption according to acquisition results as described in details in Section 4.

Highlights

  • Today a person can send and receive any form of data that may be an e-mail, voice or video with just one click of a button, but has he ever thought about how safe it is to send his data ID or send it to the other person safely without any leakage of information? The answer could be found in cyber security

  • It mainly focuses on challenges faced by cyber security on the latest technologies and focuses on introducing security types, cyber security techniques, cyber security ethics, trends that change the face of cyber security and attempting to solve one of the most serious cyber security crimes of violating privacy on the internet by improving the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm that analyzes the user’s information resources and determines the valid data to be encrypted, uses adaptive acquisition me

  • Due to the increase in cyber-terrorism and crime, we can conclude that cyber security has become one of the prerequisites of the democratic concept of life in the modern society, so it is necessary to organize systematic education and to strengthen operational military, intelligence, police and civil centers for the defense from cyber-attacks

Read more

Summary

Introduction

Today a person can send and receive any form of data that may be an e-mail, voice or video with just one click of a button, but has he ever thought about how safe it is to send his data ID or send it to the other person safely without any leakage of information? The answer could be found in cyber security. Many modern technologies are changing the face of humanity. Due to these emerging technologies, we are not able to protect our private information in a very effective way and these days’ cybercrime is increasing day by day. Since these technologies contain some important information regarding a person, it has safely become a must. We try to solve one of the most serious cyber security crimes of violating privacy on the internet by enhancing the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm.

Cybercrime
Trends Changing Cyber Security
Counter Measures
Problematic Elements of Cyber Security
Major Security Problems
Types of Hackers
2.10. Management of Cyber Security Risks
2.11. Advantages and Disadvantages of Cyber Security
2.12. Safety Tips for Cyber Security
Issues in Cyber Security
Cyber Security Techniques
The Best Practices to Overcome Cyber Security Risks?
Problem That Faces Sensitive Information Security in Cyber Physical System
Experimental Results and Analysis
Methods
Conclusion and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.