Abstract
Internet security is a broad issue that encompasses security for all transitions made over the Internet. Internet security provides authentication when data is exchanged over the Internet. Internet security is becoming a top priority, especially for financial and government institutions, as lack of security is a serious threat to the integrity and confidentiality of any organization. Since the Internet is an insecure channel for exchanging private data on messages and is susceptible to intrusion or frauds such as phishing. Therefore, it is necessary to implement certain methods to protect your data messages. In this paper, we provide an analysis of various security threats and the protective measures that can help the users to protect their data from unwanted access.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rhee, M.Y.: Internet Security: Cryptographic Principles, Algorithms and Protocols. Wiley, New York (2003)
Data Security Overview BITUG, December 2017. https://dan-lewis-fns9.squarespace.com/s/Data-Security-BITUG-DEC-2017.pdf
Malware. https://searchsecurity.techtarget.com/definition/malware
The Internet comes down with a virus. The New York Times. https://www.nytimes.com/times-insider/2014/08/06/1988-the-internet-comes-down-with-a-virus
Barwise, M.: What is an internet worm? BBC (2010). http://www.bbc.co.uk/webwise/guides/internet-worms
Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.:Â A taxonomy of computer program security flaws, with examples. Naval Research Lab Washington DC (1993)
He, D., Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22(1), 138–144 (2015)
Richardson, R., North, M.M.: Ransomware: evolution, mitigation and prevention. Int. Manage. Rev. 13(1), 10 (2017)
International Institute for Strategy studies Survival: bi-monthly journal. https://www.iiss.org/en/publications/survival/sections/2013-94b0/survival--global-politics-and-strategy-april-may-2013-b2cc/55-2-08-bronk-and-tikk-ringas-e272
Bizarre attack infects Linksys routers with self-replicating malware. https://arstechnica.com/information-technology/2014/02/bizarre-attack-infects-linksys-routers-with-self-replicating-malware/
11 real and famous cases of malware attacks. https://gatefy.com/blog/real-and-famous-cases-malware-attacks/
India Rejects use of Israeli Software Pegasus; what is Pegasus? https://youtu.be/AB7T5Ljj03s
FIREBALL – The Chinese Malware of 250 Million Computers Infected. https://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/
What is a keylogger? How attackers can monitor everything you type. https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-can-monitor-everything-you-type.html
The 11 Most Common Types of Malware. https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/
Famous DDoS attacks. The largest DDoS attacks of all time. https://www.cloudflare.com/learning/ddos/famous-ddos-attacks/
Ping of death DDoS attack. https://www.cloudflare.com/learning/ddos/ping-of-death-ddos-attack/
Kurose, J.: Computer Networking: A Top-Down Approach (2013). James F. Kurose, Keith W. Ross
Schneider, M., Shulman, H., Sidis, A., Sidis, R., Waidner, M.: Diving into email bomb attack. In: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 286–293. IEEE, June 2020
Confronting the threat of edge-enabled swarm attacks. https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Confronting-the-threat-of-edge-enabled-swarm-attacks
Use a free password manager. https://web.archive.org/web/20160125015536/http://scsccbkk.org/Use%20a%20Password%20Manager%20for%20Security.pdf
Fraud: 5 Hot Scams In 2021, And How To Avoid Them. https://www.forbes.com/uk/advisor/personal-finance/2021/01/05/fraud-5-hot-scams-in-2021-and-how-to-avoid-them/
Surat: Two involved in Rs 120 crore online frauds held: The Time of India. https://timesofindia.indiatimes.com/city/surat/two-involved-in-rs-120cr-online-fraud-held/articleshow/83410934.cms
E-commerce fraud to surpass $20B in 2021, report finds. https://www.retaildive.com/news/e-commerce-fraud-to-hit-20-billion-2021-an-18-jump-from-prior-year/599395/
Working from home from invisibility to decent work. https://www.ilo.org/wcmsp5/groups/public/---ed_protect/---protrav/---travail/documents/publication/wcms_765806.pdf
APWG, 2018. Phishing Activity Trends Report: 1st Quarter 2018. https://docs.apwg.org//reports/apwg_trends_report_q1_2018.pdf
11 Types of Phishing + Real-Life Examples. https://www.pandasecurity.com/en/mediacenter/tips/types-of-phishing/
5 Stock Market Fraud Schemes to Watch Out For in 2021. https://www.zamansky.com/5-stock-market-fraud-schemes-to-watch-out-for-in-2021/
7 Best Practices to Prevent Intellectual Property Theft. https://www.ekransystem.com/en/blog/best-practices-to-prevent-intellectual-property-theft
Fridge sends spam emails as attack hits smart gadgets. https://www.bbc.com/news/technology-25780908
Ramzan, Z.: Phishing attacks and countermeasures. In: Stamp, M., Stavroulakis, P. (eds.) Handbook of Information and Communication Security, pp. 433–448 (2010)
Build Your Own Free Security Suite. https://www.pcworld.com/article/150204/free_security_suite.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumhar, D., Kewat, A., Kumar, A. (2022). Internet Security: Threats and Its Preventive Measures. In: Dhawan, A., Mishra, R.A., Arya, K.V., Zamarreño, C.R. (eds) Advances in VLSI, Communication, and Signal Processing. Lecture Notes in Electrical Engineering, vol 911. Springer, Singapore. https://doi.org/10.1007/978-981-19-2631-0_65
Download citation
DOI: https://doi.org/10.1007/978-981-19-2631-0_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2630-3
Online ISBN: 978-981-19-2631-0
eBook Packages: Computer ScienceComputer Science (R0)