Skip to main content

Internet Security: Threats and Its Preventive Measures

  • Conference paper
  • First Online:
Advances in VLSI, Communication, and Signal Processing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 911))

  • 611 Accesses

Abstract

Internet security is a broad issue that encompasses security for all transitions made over the Internet. Internet security provides authentication when data is exchanged over the Internet. Internet security is becoming a top priority, especially for financial and government institutions, as lack of security is a serious threat to the integrity and confidentiality of any organization. Since the Internet is an insecure channel for exchanging private data on messages and is susceptible to intrusion or frauds such as phishing. Therefore, it is necessary to implement certain methods to protect your data messages. In this paper, we provide an analysis of various security threats and the protective measures that can help the users to protect their data from unwanted access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rhee, M.Y.: Internet Security: Cryptographic Principles, Algorithms and Protocols. Wiley, New York (2003)

    Google Scholar 

  2. Data Security Overview BITUG, December 2017. https://dan-lewis-fns9.squarespace.com/s/Data-Security-BITUG-DEC-2017.pdf

  3. Malware. https://searchsecurity.techtarget.com/definition/malware

  4. The Internet comes down with a virus. The New York Times. https://www.nytimes.com/times-insider/2014/08/06/1988-the-internet-comes-down-with-a-virus

  5. Barwise, M.: What is an internet worm? BBC (2010). http://www.bbc.co.uk/webwise/guides/internet-worms

  6. Landwehr, C.E., Bull, A.R., McDermott, J.P., Choi, W.S.: A taxonomy of computer program security flaws, with examples. Naval Research Lab Washington DC (1993)

    Google Scholar 

  7. He, D., Chan, S., Guizani, M.: Mobile application security: malware threats and defenses. IEEE Wirel. Commun. 22(1), 138–144 (2015)

    Article  Google Scholar 

  8. Richardson, R., North, M.M.: Ransomware: evolution, mitigation and prevention. Int. Manage. Rev. 13(1), 10 (2017)

    Google Scholar 

  9. International Institute for Strategy studies Survival: bi-monthly journal. https://www.iiss.org/en/publications/survival/sections/2013-94b0/survival--global-politics-and-strategy-april-may-2013-b2cc/55-2-08-bronk-and-tikk-ringas-e272

  10. Bizarre attack infects Linksys routers with self-replicating malware. https://arstechnica.com/information-technology/2014/02/bizarre-attack-infects-linksys-routers-with-self-replicating-malware/

  11. 11 real and famous cases of malware attacks. https://gatefy.com/blog/real-and-famous-cases-malware-attacks/

  12. India Rejects use of Israeli Software Pegasus; what is Pegasus? https://youtu.be/AB7T5Ljj03s

  13. FIREBALL – The Chinese Malware of 250 Million Computers Infected. https://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/

  14. What is a keylogger? How attackers can monitor everything you type. https://www.csoonline.com/article/3326304/what-is-a-keylogger-how-attackers-can-monitor-everything-you-type.html

  15. The 11 Most Common Types of Malware. https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

  16. Famous DDoS attacks. The largest DDoS attacks of all time. https://www.cloudflare.com/learning/ddos/famous-ddos-attacks/

  17. Ping of death DDoS attack. https://www.cloudflare.com/learning/ddos/ping-of-death-ddos-attack/

  18. Kurose, J.: Computer Networking: A Top-Down Approach (2013). James F. Kurose, Keith W. Ross

    Google Scholar 

  19. Schneider, M., Shulman, H., Sidis, A., Sidis, R., Waidner, M.: Diving into email bomb attack. In: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 286–293. IEEE, June 2020

    Google Scholar 

  20. Confronting the threat of edge-enabled swarm attacks. https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Confronting-the-threat-of-edge-enabled-swarm-attacks

  21. Use a free password manager. https://web.archive.org/web/20160125015536/http://scsccbkk.org/Use%20a%20Password%20Manager%20for%20Security.pdf

    Google Scholar 

  22. Fraud: 5 Hot Scams In 2021, And How To Avoid Them. https://www.forbes.com/uk/advisor/personal-finance/2021/01/05/fraud-5-hot-scams-in-2021-and-how-to-avoid-them/

  23. Surat: Two involved in Rs 120 crore online frauds held: The Time of India. https://timesofindia.indiatimes.com/city/surat/two-involved-in-rs-120cr-online-fraud-held/articleshow/83410934.cms

  24. E-commerce fraud to surpass $20B in 2021, report finds. https://www.retaildive.com/news/e-commerce-fraud-to-hit-20-billion-2021-an-18-jump-from-prior-year/599395/

  25. Working from home from invisibility to decent work. https://www.ilo.org/wcmsp5/groups/public/---ed_protect/---protrav/---travail/documents/publication/wcms_765806.pdf

  26. APWG, 2018. Phishing Activity Trends Report: 1st Quarter 2018. https://docs.apwg.org//reports/apwg_trends_report_q1_2018.pdf

  27. 11 Types of Phishing + Real-Life Examples. https://www.pandasecurity.com/en/mediacenter/tips/types-of-phishing/

  28. 5 Stock Market Fraud Schemes to Watch Out For in 2021. https://www.zamansky.com/5-stock-market-fraud-schemes-to-watch-out-for-in-2021/

  29. 7 Best Practices to Prevent Intellectual Property Theft. https://www.ekransystem.com/en/blog/best-practices-to-prevent-intellectual-property-theft

  30. Fridge sends spam emails as attack hits smart gadgets. https://www.bbc.com/news/technology-25780908

  31. Ramzan, Z.: Phishing attacks and countermeasures. In: Stamp, M., Stavroulakis, P. (eds.) Handbook of Information and Communication Security, pp. 433–448 (2010)

    Google Scholar 

  32. Build Your Own Free Security Suite. https://www.pcworld.com/article/150204/free_security_suite.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dharamdas Kumhar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumhar, D., Kewat, A., Kumar, A. (2022). Internet Security: Threats and Its Preventive Measures. In: Dhawan, A., Mishra, R.A., Arya, K.V., Zamarreño, C.R. (eds) Advances in VLSI, Communication, and Signal Processing. Lecture Notes in Electrical Engineering, vol 911. Springer, Singapore. https://doi.org/10.1007/978-981-19-2631-0_65

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-2631-0_65

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-2630-3

  • Online ISBN: 978-981-19-2631-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics