Investigating methods of dealing with cyber attacks and assessing information security in cyberspace

  • سال انتشار: 1404
  • محل انتشار: بیست و ششمین کنفرانس بین المللی فناوری اطلاعات، کامپیوتر و مخابرات
  • کد COI اختصاصی: ITCT26_026
  • زبان مقاله: انگلیسی
  • تعداد مشاهده: 74
دانلود فایل این مقاله

نویسندگان

Mahdi Faraji

Master of Science in Information Technology Engineering - Computer Networks, Islamic Azad University, South Tehran Branch

چکیده

In today’s digitally connected world, any organization that uses digital assets and the Internet is at risk of cyberattacks. This reality has expanded dramatically in recent years. Protecting information from cyberattacks, even if it’s not part of your core business plan, should be a top priority. To ensure the security of your business, the best way is to integrate cybersecurity into your business processes. This should be considered a common goal across the organization to protect your digital assets. Cybersecurity has become increasingly important in today’s world. New cyberattacks occur every day that can compromise the sensitive information of users and organizations. Any attempt to gain unauthorized access to a computer, processing system, or computer network with the aim of causing damage is called a cyberattack. Cyber attacks are carried out with the aim of disabling, disrupting, destroying or controlling computer systems or changing them, blocking, deleting, manipulating or stealing data contained in these systems. Any individual or group can carry out cyber attacks from anywhere using one or more different attack strategies. People who carry out cyber attacks are generally considered cybercriminals. These people are often referred to as bad actors, threat actors and hackers; they include people who act alone and use their computer skills to design and execute malicious attacks. Today, cyber attacks and security breaches have become one of the serious challenges for organizations. Any weakness in information security can lead to financial losses, loss of reputation and even legal problems. Therefore, familiarity with the principles of information security and data protection methods is essential for every individual and organization.

کلیدواژه ها

Intelligence, Cyber Attack, Data, security, infiltration, hacking, encryption

مقالات مرتبط جدید

اطلاعات بیشتر در مورد COI

COI مخفف عبارت CIVILICA Object Identifier به معنی شناسه سیویلیکا برای اسناد است. COI کدی است که مطابق محل انتشار، به مقالات کنفرانسها و ژورنالهای داخل کشور به هنگام نمایه سازی بر روی پایگاه استنادی سیویلیکا اختصاص می یابد.

کد COI به مفهوم کد ملی اسناد نمایه شده در سیویلیکا است و کدی یکتا و ثابت است و به همین دلیل همواره قابلیت استناد و پیگیری دارد.