A Strategic approach, Issues and Challenges of Adaptive Cyber Security

Vol-5 | Issue-7 | July-2020 | Published Online: 25 July 2020    PDF ( 361 KB )
DOI: https://doi.org/10.31305/rrijm.2020.v05.i07.025
Author(s)
Dr. Kirit I. Chokhawala 1; Dr. Vishal H. Bhemwala 2; Dr. Jayesh N Modi 3

1Assistant Professor, Deptartment of Computer Science, Hemchandracharya North Gujarat University, Gujarat (India)

2Assistant Professor, Deptartment of Computer Science, Hemchandracharya North Gujarat University, Gujarat (India)

3Assistant Professor, Deptartment of Computer Science, Hemchandracharya North Gujarat University, Gujarat (India)

Abstract

Cyber security means protection of valuable computer resources like Hardware, Software, Data and Network. Now a day lots of tools and technology available over the network, it is really impossible for the cyber security to trace threat in real time manner. There are lots of tools which provide protection to the cyber security. Many of them have it own disadvantage of usage. Firewall dependents on the network information available from the router. Intrusion Detection System dependents on the rules set by organization. Even they all works fine prone to be hack. These are software system and software itself is hacked and misused by malicious software (Antivirus). To identify probable threat in real time it is impossible for the cyber security tools to early detect and recover system. Hence, change in technology always demand. Security developer and cracker always “race like Micky and Mouse”. The change in security requirement is historical events. I can prove. The Great Wall of China is serving the security need when airplane and other flying object were not discovered. In today, they are ineffective security tools because of many advent tools like missile and submarine has been developed. Same as in the field of cyber security now time comes we need to correct our older security system and one possible solution is adaptive cyber security. Adaptive cyber security is the tools for early warnings to the system. Even attack was not initiated but it is going to give hint based on the system that uses stored data in to the system. Unusual pattern has been analyzed that results in the early indication of unauthorized person or machine tries to steal the information or damage the current security system. It still in its early life, there are so many challenges and issues needs to be concern. In this paper I want highlight the same challenges and issues are going to be face when adaptive cyber security is implemented.

Keywords
Cryptography, Security, Email Security, IP Security, Web Mining, Data and Information Security.
Statistics
Article View: 604