학술논문
A Detailed Investigation on Various Cyber Security Models and their Comparisons with the Detailed Performance Analysis for the Application of IIOT Systems
Document Type
Conference
Author
Source
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) Advance Computing and Innovative Technologies in Engineering (ICACITE), 2023 3rd International Conference on. :779-783 May, 2023
Subject
Language
Abstract
Data security & Cyber security are sometimes used indiscriminately, however the first emphasizes that the exact point does have the potential to be a victim, whereas the second one addresses the function of the individual in the security process. Nevertheless, because it emphasizes the ethical component of civilization holistically, this debate of cyber security holds significant implications. Different architectures & designs have been proposed to handle the problem of cyber security. Additionally, it covers the ideas behind cyber security, including its organizational structure, human resources, and advice on how to safeguard private data on computers. This essay examines such designs, their shortcomings, as well as the prior methods employed to lessen these dangers. Additionally, the paper makes suggestions for additional study.