SNDT WOMEN'S UNIVERSITY

BMK Knowledge Resource Centre

Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049

Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control (Record no. 132713)

MARC details
000 -LEADER
fixed length control field 02162nam a2200145 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250904b |||||||| |||| 00| 0 eng d
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Aastha Verma
245 ## - TITLE STATEMENT
Title Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control
300 ## - PHYSICAL DESCRIPTION
Extent PP478-492
520 ## - SUMMARY, ETC.
Summary, etc. biblio.abstract The proliferation of the Internet’s interconnections has led to a substantial increase in cyberattack incidents, often with devastating and grave consequences for the organizations and their associated clientele. The pandemic of COVID-19 has pushed most organizations towards digital transformation. The higher dependence of a firm on digital infrastructure makes it more vulnerable to cyber-crimes. The existing literature suggests that the most notable and frequently chosen weapons of attackers are Internet of things (IoT) attacks, phishing attack, malware attack, distributed denial of service (DDoS) attack and structured query language (SQL) injection attack. In this study, an attempt has been made to generate a protection framework from these cyberattacks. In doing so, the present research has adopted a systematic stepwise process of investigation. The research method consists of four components. First, through bibliometric analysis in VOSviewer, authors identified the scope for searching the related literature published worldwide and generated visualization for comprehension. This step led to the selection of 60 research articles for further analysis. After that, each security threat’s MAXQDA software word tree was developed, representing its linkages with possible security solutions and control measures. Lastly, they adopted expert elicitation protocol through semi-structured interviews with six corporate IT experts and five academic experts. The synthesis of information gathered leads to the development of a suggestive protection framework for the organizations.
654 ## - SUBJECT ADDED ENTRY--FACETED TOPICAL TERMS
Subject <a href="Cyber threats">Cyber threats</a>
-- <a href="cyber security ">cyber security </a>
-- <a href="Bibliometric analysis ">Bibliometric analysis </a>
-- <a href="word tree">word tree</a>
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Charu Shr
773 0# - HOST ITEM ENTRY
Host Biblionumber 80316
Host Itemnumber 113436
Place, publisher, and date of publication New Delhi Sage Publications
Title Vision: The Journal of Business Perspectives
International Standard Serial Number 0972-2629
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Journal Article
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Location (home branch) Sublocation or collection (holding branch) Date acquired Koha issues (times borrowed) Piece designation (barcode) Koha date last seen Price effective from Koha item type
    Dewey Decimal Classification     SNDT Juhu SNDT Juhu 04/09/2025   jp858.6 04/09/2025 04/09/2025 Journal Article