Abstract
The Internet or World Wide Web has become prominent platform for business and commerce and is witnessing user growth with increased penetration of mobile Internet. Huge traffic is being generated, some of it being legitimate and the rest being malicious. Hence the implementation and maintenance of Information Security programs is been done .In the age of the Internet, protecting our information has become just as important as protecting our property. Malware authors have found and exploited new zero-day vulnerabilities resulting in damage to end-user system. Ransomware, a malware that has taken malware attacks to a new level by locking files of the affected user and demand Bitcoin payment to unlock those files. On the other hand the Volume and frequency of Distributed Denial of Service (DDoS) attacks have increased. Many unpatched machines without the knowledge of its owners have become a part of Botnets which carry out DDoS attacks. This paper focuses on strategies to be adopted to protect individual hosts from malware attacks and other types of intrusions using Deception, White-Listing and Reputation Services.
Description
The Internet or World Wide Web has become prominent platform for business and commerce and is witnessing user growth with increased penetration of mobile Internet. .In the age of the Internet, protecting our information has become just as important as protecting our property. Information security (InfoSec) is the practice of protecting both physical and digital information. We might have personal medical or financial records that we want to keep private from destruction or unauthorized access. Personally Identifiable Information like our Internet passwords, credit card numbers, and banking information should be guarded from getting into the wrong hands. Information is a critical resource for all organizations since information supports business continuity and commerce and helps managers and staff to make appropriate and effective decisions. Securing organizational information and its critical elements, including the systems and hardware that use, store, and transmit that information have become more and more important. Data and the infrastructure on which it resides are assets for organization. The attacker’s motive is to steal or cause damage to these assets. To achieve this objective they need access and also need to maintain it. The attackers achieve their objective by generating payload using various exploit kits.
Links and resources
Tags