Challenges of Information Security in the Contemporary Cyber Threat Perception
Tripti Misra1, Kingshuk Srivastava2, Rajeshwari3

1Tripti Misra, School of Computer Science, University of Petroleum and Energy Studies (UPES), Dehradun, India.

2Dr. Kingshuk Srivastava, School of Computer Science (SCS), University of Petroleum and Energy Studies (UPES), Dehradun, India.

3Rajeshwari, School of Business, University of Petroleum and Energy Studies (UPES), Dehradun, India. 

Manuscript received on 02 October 2019 | Revised Manuscript received on 13 October 2019 | Manuscript Published on 29 June 2020 | PP: 334-342 | Volume-8 Issue-10S2 August 2019 | Retrieval Number: J106008810S19/2019©BEIESP | DOI: 10.35940/ijitee.J1060.08810S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Information security comprises advancements, methods and practices proposed to guarantee protection of system hubs, programs, information, data and system from hack assaults, modifications to data or unintended access. To repress cybercriminals from gaining access to system resources specifically sensitive data, it is fundamental for organizations and individuals to take necessary actions to preserve the confidentiality, integrity and availability of delicate data. Information security spreads complex strategies to safeguard not only data during transmission, but also data stored in the system even when the system is not connected to the internet. In other words, it encompasses security of both data at rest and data in transmission. Numerous strategies have been employed by the professionals to protect organizations and records from interlopers. To deal with malevolent projects, there are a great deal of “off the rack” just as tweaked items accessible in the market which additionally give ongoing barrier and security to the delicate and sensitive data. There is still absence of techniques on the most capable strategy to appear and execute tasks that can be accustomed to the activities taking place at real time. This paper focuses on looking into the present methodologies used to give digital security, and identify the various loopholes in the present situation.

Keywords: Artificial Intelligence, Bot, Cyber Security, Proactive.
Scope of the Article: Artificial Intelligence and Machine Learning