P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh
{"title":"Need of Cyber Security, Tools, Uses and Future Research","authors":"P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh","doi":"10.1109/ICOEI56765.2023.10125792","DOIUrl":null,"url":null,"abstract":"Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI56765.2023.10125792","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.