Articles | Open Access | DOI: https://doi.org/10.37547/tajet/Volume06Issue07-09

TECHNIQUES TO PROTECT AGAINST CYBER ATTACKS

Vinas Khalid Kadhim , University of Karbala, College of Administration and Economics, Iraq

Abstract

Strong cybersecurity measures are required in this digital era due to the high risk of cyber assaults on people, businesses, and governments. Protecting yourself from cyber threats is the focus of this study, which delves into preventative and reactive measures. To address security weaknesses proactively, it is recommended that advanced encryption technologies and multi-factor authentication (MFA) be implemented and frequent security audits conducted. Implementing intrusion detection and prevention systems (IDPS), real-time monitoring, and quick incident response protocols are all components of reactive methods. In addition, the article delves into how AI and ML improve cyber threat detection and response capabilities by predicting and fighting cyber threats. Users must have cybersecurity education and awareness because user mistakes are still a significant risk. To protect digital assets from the always-changing cyber threat landscape, this paper seeks to offer a broad overview of successful cybersecurity procedures by reviewing existing tactics and emerging developments.

Keywords

Cybersecurity, digital era, multi-factor authentication

References

Abou-Assaleh, T. and Chuluundorj, E. (2010) Cyber-Physical Attack Threats, IAS-2008-41-L. Carleton University National Capital Institute of Telecommunications.

Alves, T. et al. (2010). Cyber Range: Challenges and trends. J. Def. Model. Simul. 11, (1): 17-83.

Gerndt, M. (2015). Defining cyber defense exercising. In Proceedings of the 3rd International Conference: Future - Security, Bonn, Germany, 16-17 September 2015. pp. 9-16

Park, Y. and Sandri, S. (2003). Potential game hazards and cost of anarchy in malicious environments. In The Sixth International Workshop on Discrete Event Systems, 2003. Proceedings. In this Issue, 13-15 October 2003,

Hubei, China Lublin, A. (2016) Ships in Pompeii. How to Train Cyber Security Experts. In@risk - Journal of Risk Analysis, Vol. 4, No. 12, p. 6-11. Available online:

Zørnemann, T. F. (2001). Test management for distributed real-time systems. University of Warwick.

Lublin, A. (2012) Energy Supplies: A Bird's Eye View of Modern Europe. Special Editor T. Boettger. In: NATO Operations in an Immutable World - Defence against Terrorism. Special edition for the conference "Security and Defence Explorations of Change", Vol. 39, ISSN 1864-6619, September, 2012.

Wedde, L.F. (2008). Applications from the art and theory of games - a classifying survey. In Paul W. Goldberg, Norman Y. Foo, Mark Thorwart Goldszmidt, and Lewis Girod, Editors, First international workshop on games and emergent behavior (2005). Games for multi-agent systems, pages 212-225, Berlin, Heidelberg. Springer-Verlag.

Article Statistics

Copyright License

Download Citations

How to Cite

Vinas Khalid Kadhim. (2024). TECHNIQUES TO PROTECT AGAINST CYBER ATTACKS. The American Journal of Engineering and Technology, 6(07), 81–93. https://doi.org/10.37547/tajet/Volume06Issue07-09