Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{149864, author = {Vatsal Raychura and Chandesh D. Parekh}, title = {A New Deceptive Tactic aims better Cyber-Solutions for organizations during Global Pandemic}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {7}, number = {1}, pages = {834-840}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=149864}, abstract = {The use of data Technology (IT) resources are the regular approach for many organizations in order that they assets and belongings are properly managed. This strategic decision implies its exposure to the surface world through the info infrastructure. Nowadays when the whole world is trying to being strong against this pandemic, The Organizations wants to shield themselves against these expanding attacks risk by implementing security strategies, but in point of fact, the network's first & main defense lines are pervious, and therefore the security architectures don't seem to be dynamic enough to face existing or future threats. NOC, SOC etc. type of services may help you to find cure after the system is affected, but the real threats are always innovative with time, so that the threat detection system may be quite accurate against future threats with the assistance of deceptive model. A Deception-based technology could enable the organizations to quick & easy detection, in order that is easy for analyzing and defend networks & whole system against real-time attacks. Deception technology may provide more accurate information on malware and malicious activity not detected by the other styles of cyber defense. The research intends to look at whether that Deception Technology is required to sustain a good response to attacks by taking a proactive approach. It can instantly detect the presence of an intruder, identify the intruder’s intent, and supply feasible intelligence to prevent current & future attacks against organization. Therefore the intent is to elaborate an anatomy where the industries can understand The Deception Technology its effectiveness, and strategic value so eventually, they will use this system to feature value to a settlement regarding information security strategy.}, keywords = {Pandemic, Information Security, Deception, Deceptive Tactic, Data infrastructure, Cyber-threat, Intruder.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry