A New Deceptive Tactic aims better Cyber-Solutions for organizations during Global Pandemic
Author(s):
Vatsal Raychura, Chandesh D. Parekh
Keywords:
Pandemic, Information Security, Deception, Deceptive Tactic, Data infrastructure, Cyber-threat, Intruder.
Abstract
The use of data Technology (IT) resources are the regular approach for many organizations in order that they assets and belongings are properly managed. This strategic decision implies its exposure to the surface world through the info infrastructure. Nowadays when the whole world is trying to being strong against this pandemic, The Organizations wants to shield themselves against these expanding attacks risk by implementing security strategies, but in point of fact, the network's first & main defense lines are pervious, and therefore the security architectures don't seem to be dynamic enough to face existing or future threats. NOC, SOC etc. type of services may help you to find cure after the system is affected, but the real threats are always innovative with time, so that the threat detection system may be quite accurate against future threats with the assistance of deceptive model. A Deception-based technology could enable the organizations to quick & easy detection, in order that is easy for analyzing and defend networks & whole system against real-time attacks. Deception technology may provide more accurate information on malware and malicious activity not detected by the other styles of cyber defense. The research intends to look at whether that Deception Technology is required to sustain a good response to attacks by taking a proactive approach. It can instantly detect the presence of an intruder, identify the intruder’s intent, and supply feasible intelligence to prevent current & future attacks against organization. Therefore the intent is to elaborate an anatomy where the industries can understand The Deception Technology its effectiveness, and strategic value so eventually, they will use this system to feature value to a settlement regarding information security strategy.
Article Details
Unique Paper ID: 149864

Publication Volume & Issue: Volume 7, Issue 1

Page(s): 834 - 840
Article Preview & Download


Share This Article

Go To Issue



Call For Paper

Volume 7 Issue 1

Last Date 25 June 2020


About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:+91 820 061 5067
Email: editor@ijirt.org
Website: ijirt.org

Policies