Detection and prevention of cyber attacks and preservation of informationbased on artificial intelligence

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 13

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ITCT23_004

تاریخ نمایه سازی: 1 شهریور 1403

Abstract:

Cyber security refers to a set of measures, techniques and technologies designed to protectinformation, systems and computer networks against cyber attacks. In today's world, cyberthreats are becoming more complex and diverse every day, and cyber security has become a bigchallenge for organizations and individuals. Hackers and cyber attackers use different methodsand techniques to penetrate systems, access sensitive information and destroy the performance ofnetworks. These attacks can include system penetration, information theft attacks, datamodification attacks, and many others. Cyber security includes a set of technical andorganizational measures. In the technical sector, encryption, intrusion detection, attackprevention, access management, support for secure applications and security monitoring areamong the main activities. In the organizational sector, employee training, security policies, riskmanagement and crisis planning also play an important role in cyber security. Paying attention tocyber security can lead to many benefits for organizations and individuals. These benefitsinclude protecting sensitive information, maintaining customer trust, preventing financial lossesand identity theft, maintaining the health of systems and networks, complying with laws andregulations related to the protection of personal information, and many others. Due to the everincreasinggrowth of cyber threats, awareness and preparation in the field of cyber security isvery important. Organizations and individuals should use modern security techniques andmethods and deal with the up-to-dateness of their knowledge in this field.

Authors

Alireza Ranjbar

Master student of science and technology policy, Tehran University

Marziyeh Felahat

Department of Mathematics,Faculty of Basic Sciences, Bozorgmehr University of Qaenat,Iran

Sara Mousavi

Bachelor of Medical-Bioelectrical Engineering, Islamic Azad University, Kazeroon branch