Investigating methods of dealing with cyber attacks and assessing information security in cyberspace

سال انتشار: 1404
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 61

فایل این مقاله در 14 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ITCT26_026

تاریخ نمایه سازی: 17 مهر 1404

چکیده مقاله:

In today’s digitally connected world, any organization that uses digital assets and the Internet is at risk of cyberattacks. This reality has expanded dramatically in recent years. Protecting information from cyberattacks, even if it’s not part of your core business plan, should be a top priority. To ensure the security of your business, the best way is to integrate cybersecurity into your business processes. This should be considered a common goal across the organization to protect your digital assets. Cybersecurity has become increasingly important in today’s world. New cyberattacks occur every day that can compromise the sensitive information of users and organizations. Any attempt to gain unauthorized access to a computer, processing system, or computer network with the aim of causing damage is called a cyberattack. Cyber attacks are carried out with the aim of disabling, disrupting, destroying or controlling computer systems or changing them, blocking, deleting, manipulating or stealing data contained in these systems. Any individual or group can carry out cyber attacks from anywhere using one or more different attack strategies. People who carry out cyber attacks are generally considered cybercriminals. These people are often referred to as bad actors, threat actors and hackers; they include people who act alone and use their computer skills to design and execute malicious attacks. Today, cyber attacks and security breaches have become one of the serious challenges for organizations. Any weakness in information security can lead to financial losses, loss of reputation and even legal problems. Therefore, familiarity with the principles of information security and data protection methods is essential for every individual and organization.

نویسندگان

Mahdi Faraji

Master of Science in Information Technology Engineering - Computer Networks, Islamic Azad University, South Tehran Branch