Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Network Breaching, Detection, and Solutions in Cyber Forensics

Chaitanya S. Shivalkar, Vaishnavi Gowda

Abstract


Network breaches pose a significant risk to organizations because they can result in the loss of sensitive data, financial loss, and reputational harm. In this paper, we will discuss various methods of network breaching such as malware, phishing, and social engineering. Additionally, we will go over the significance of identifying network breaches and the various tools available to stop them. This paper will provide an overview of the current state of network security and the different approaches used to detect and prevent network breaches. Additionally, we will also discuss the importance of educating employees on safe computing practices and the role of proactive measures such as regular software updates, firewalls, and intrusion detection systems. The paper will conclude with a summary of the key takeaways and recommendations for organizations to improve their network security.


Full Text:

PDF

References


McNab C. Network Security Assessment: Know Your Network. Sebastopol, CA: O'Reilly Media; 2007.

Sunit B, Nina G. Cyber Security: Understanding Cybercrimes, Computer Forensics and Legal Perspectives. New Delhi: Wiley India; 2011.

What Is Networking Security? 2022. Available at https://www.quora.com/What-is-networking-security

Network Security: Complete Guide to Threats & Defenses. Cynet. 2022. Available at https://www.cynet.com/initial-access-vectors/network-security-complete-guide-to-threats-and-how-to-defend-your-network/

Network Attacks and Network Security Threats. Cynet. 2023. Available at https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/.

What Is a Network Security Breach? | E-N Computers. E-N Computers. 2021. Available at https://www.encomputers.com/2021/05/what-is-a-network-security-breach/

Archon ZV: Secure Mobile Computing. ID Technologies. 2019. Available at https://www.idtec.com/case-studies/archon-zv-secure-mobile-computing/

City of Oakland Declares State of Emergency due to Ransomware Attack. PhishingSeason. 2023. Available at https://phishingseason.com/2023/02/15/city-of-oakland-declares-state-of-emergency-due-to-ransomware-attack/

How Atmosphere Detects Web Server Down. Alibaba Cloud. Alibabacloud.com. 2023. Available at https://www.alibabacloud.com/tech-news/web-server/4l6uhrqyexj-how-atmosphere-detects-web-server-down

Back to Basics: The Rise of Ransomware. Quadrant Security. Quadrantsec.com. Available at https://quadrantsec.com/blog/back-basics-rise-ransomware


Refbacks

  • There are currently no refbacks.