2022
DOI: 10.1007/978-981-19-2374-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Security Infrastructure for Cyber Attack Targeted Networks and Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
1
0
Order By: Relevance
“…This framework also contains a layered defense mechanism, which incorporates multiple security measures layers to prevent different types of threats. These measures guard the network, for instance, firewalls and intrusion alarms, endpoint protection like antivirus software and device management, and data security practices such as encryption and access controls Kumar & Somani (2022). However, by implementing these layers, the framework ensures comprehensive coverage, making it difficult for the attacker to penetrate the defenses.…”
Section: Holistic Framework For Enhancing Threat Mitigation In Digita...mentioning
confidence: 99%
“…This framework also contains a layered defense mechanism, which incorporates multiple security measures layers to prevent different types of threats. These measures guard the network, for instance, firewalls and intrusion alarms, endpoint protection like antivirus software and device management, and data security practices such as encryption and access controls Kumar & Somani (2022). However, by implementing these layers, the framework ensures comprehensive coverage, making it difficult for the attacker to penetrate the defenses.…”
Section: Holistic Framework For Enhancing Threat Mitigation In Digita...mentioning
confidence: 99%
“…There are many take place countermeasures to detect and prevent the cyber-attacks, such as encryption algorithm, VPN, Firewall, antivirus software, IDS, and access control. From a security management viewpoint, the countermeasures must hood risk estimate of resources at behind attack, exchange and manage of secret key, and vulnerability reporting [20]. Different security strategies to defense solution through AI, machine-learning (ML), certificate authenticity (CA), and proactive real-time IPS-IDS.…”
Section: Artificial Intelligence Techniques In Sgmentioning
confidence: 99%