학술논문

A Detailed Investigation on Various Cyber Security Models and their Comparisons with the Detailed Performance Analysis for the Application of IIOT Systems
Document Type
Conference
Source
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) Advance Computing and Innovative Technologies in Engineering (ICACITE), 2023 3rd International Conference on. :779-783 May, 2023
Subject
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Computers
Surveys
Ethics
Firewalls (computing)
Passwords
Safety
Performance analysis
Cyber security
architectures
workforces
dangers
approaches
Language
Abstract
Data security & Cyber security are sometimes used indiscriminately, however the first emphasizes that the exact point does have the potential to be a victim, whereas the second one addresses the function of the individual in the security process. Nevertheless, because it emphasizes the ethical component of civilization holistically, this debate of cyber security holds significant implications. Different architectures & designs have been proposed to handle the problem of cyber security. Additionally, it covers the ideas behind cyber security, including its organizational structure, human resources, and advice on how to safeguard private data on computers. This essay examines such designs, their shortcomings, as well as the prior methods employed to lessen these dangers. Additionally, the paper makes suggestions for additional study.