Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations | IEEE Conference Publication | IEEE Xplore

Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations


Abstract:

Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now ...Show More

Abstract:

Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments...
Date of Conference: 15-16 February 2018
Date Added to IEEE Xplore: 11 October 2018
ISBN Information:
Conference Location: Erode, India
No metrics found for this document.

I. INTRODUCTION

The demand of human beings changes over a time series even in fraction of seconds and other time units. This on the one hand increases the simplicity way of life. But on the other hand, leads to a fatal exploitation to the data/Information which instead undergo the process of complexity the ways of human life as viewed from data/Information confidentiality perspective. In such a case data/Information processing passes through and stored over the cyber space in a fault resistance, dynamic monitoring, pre-persecution, predictive, automated and SOA enabled communication in between the authorized users. Thus, the cyber space need to be secure in an efficient, effective, well understood, and with low financial crime investigation manner. In order to do so, the best solution is expected to developing an automated and cloud enabling Improved Cyber security for selected Institutions/Organizations in a form suite to commercialize risks against cyber attacker, with complete cyber attacker’s behaviors. The best solution is therefore, finding the cyber attackers behavior with the identified users computer and computer enabling end devices applied by the user. Because end devices are the ultimate source of user behaviors no matter how he/she is an authorized user or unauthorized user. It is known that, there are two basic dimensions for any cyber criminals in doing such a criminal activity. Either to personal benefit or for recreational activities.

Usage
Select a Year
2025

View as

Total usage sinceOct 2018:535
00.20.40.60.811.2JanFebMarAprMayJunJulAugSepOctNovDec100000000000
Year Total:1
Data is updated monthly. Usage includes PDF downloads and HTML views.
Contact IEEE to Subscribe

References

References is not available for this document.