Today: Sunday, 22 December 2024
-
Information Technology
-
Computer
-
Telecommunications
Architecture of cyber evaluation within the organization
Volume 3, Issue 4, 2021, Pages 82 - 90
1 Master of Information Technology Engineering, Department of Computer, Zanjan Branch, Islamic Azad University, Zanjan, Iran
2 Faculty of Computer Engineering, Faculty of Engineering and Basic Sciences, Zanjan Branch, Islamic Azad University, Zanjan, Iran
Abstract :
Today, the widespread use of computer networks in most governmental and non-governmental organizations and institutions, on the other hand, has made things easier for most people. On the other hand, this development in computer networks has created dangers and threats, and practically everyone has access to the Internet, which is a very large database of information. Ignoring these threats and security problems can sometimes lead to a lot of damage, such as the loss of valuable information of owners and customers. Traditionally, techniques such as user authentication, data encryption, malware detection systems, and firewalls have been used to protect computer security, but today, cyber-attack detection systems have become very common to prevent such threats. The purpose of cyber attack detection systems is to detect various types of malicious network and computer traffic that are not detected by firewalls.
Today, the widespread use of computer networks in most governmental and non-governmental organizations and institutions, on the other hand, has made things easier for most people. On the other hand, this development in computer networks has created dangers and threats, and practically everyone has access to the Internet, which is a very large database of information. Ignoring these threats and security problems can sometimes lead to a lot of damage, such as the loss of valuable information of owners and customers. Traditionally, techniques such as user authentication, data encryption, malware detection systems, and firewalls have been used to protect computer security, but today, cyber-attack detection systems have become very common to prevent such threats. The purpose of cyber attack detection systems is to detect various types of malicious network and computer traffic that are not detected by firewalls.
Keywords :
Cyber, infiltration, firewall, defense, attack
Cyber, infiltration, firewall, defense, attack