UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 1
January-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIREQ06002


Registration ID:
308402

Page Number

6-17

Share This Article


Jetir RMS

Title

Cybersecurity and Emerging Threats in Cybersecurity

Abstract

Cybersecurity is a widely used term with highly diverse, frequently subjective, and occasionally uninformative definitions. Disrupting force processes in national security and the economy can be disastrous. The challenge of meeting safety and quality compliance on operations, given the complexity of widely distributed assets and the inter-dependence between computing, communication and power infrastructures. In recent years a cyber security standard is set by the North American Electric Reliability Corporation (NERC), which demands compliance by the utility with cyber security control systems. This standard identifies various cyber related vulnerabilities in control systems and recommends multiple corrective measures (e.g. best practices). A systematic information security analysis of critical infrastructure is stated in this article. The following four main components propose a framework for monitoring and data acquisition: 1) real-time monitoring; 2) identification of anomalies; 3) effect analyzes; and 4) methods for mitigating. Furthermore, an attack-tree methodology is developed for impact analysis. In order to predict processes, the situation, and leaf-level flaws, the attack-tree model based on power system control networks determines the system's opponents. The insecurity of the leaf is central to port testing or password intensity evaluation methodology. In the framework for controlling the power plant, the measurement of vulnerabilities is based on conditions of former cyber security and the vulnerability indices are assessed.

Key Words

Attack tree, Cybersecurity, Defense systems, Power system control, Security vulnerability

Cite This Article

"Cybersecurity and Emerging Threats in Cybersecurity", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 1, page no.6-17, January-2019, Available :http://www.jetir.org/papers/JETIREQ06002.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Cybersecurity and Emerging Threats in Cybersecurity", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 1, page no. pp6-17, January-2019, Available at : http://www.jetir.org/papers/JETIREQ06002.pdf

Publication Details

Published Paper ID: JETIREQ06002
Registration ID: 308402
Published In: Volume 6 | Issue 1 | Year January-2019
DOI (Digital Object Identifier):
Page No: 6-17
Country: NA, NA, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000504

Print This Page

Current Call For Paper

Jetir RMS