UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 5
May-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1905X60


Registration ID:
502775

Page Number

514-519

Share This Article


Jetir RMS

Title

What to do after data is breached and how to restore data – A Review on Cyber Security

Abstract

The current world is run by technology and network connections, it is crucial to know what cyber security is, it should be understood to be able to use it effectively. If there is no security to protect it, systems, important files, data, and other important virtual things are at risk. Every company, whether it is an IT firm or not, must be protected equally. With the advancement of the new technology, the attackers do not lag behind in terms of cyber security technology. The hackers are using improved hacking techniques and are targeting the weak points of many businesses. Cyber security is critical because the military, government, and other organizations rely on it. Financial, medical, and corporate organizations amass, practice, and store unprecedented amounts of data on PCs and other devices. A significant portion of that data may contain sensitive information, such as financial information or intellectual property, personal information, or other types of data for which unauthorized access or acquaintance could result in negative consequences. With the help of proper tools as well as management, we can prevent our data from getting breached. This research paper is made using the APA method. All in all, cybersecurity is quite a serious topic to have a discussion about which is why this paper is written in order to give an insight to what we can do if our data is breached.

Key Words

What to do after data is breached and how to restore data – A Review on Cyber Security

Cite This Article

"What to do after data is breached and how to restore data – A Review on Cyber Security", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 5, page no.514-519, May 2019, Available :http://www.jetir.org/papers/JETIR1905X60.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"What to do after data is breached and how to restore data – A Review on Cyber Security", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 5, page no. pp514-519, May 2019, Available at : http://www.jetir.org/papers/JETIR1905X60.pdf

Publication Details

Published Paper ID: JETIR1905X60
Registration ID: 502775
Published In: Volume 6 | Issue 5 | Year May-2019
DOI (Digital Object Identifier):
Page No: 514-519
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00093

Print This Page

Current Call For Paper

Jetir RMS