Implementation and Mitigation for Cyber Attacks with proposed OCR Process Model

Main Article Content

Dr. Rajkumar Banoth, G Arunakranthi, Priyank Vachhani, Shreya Kalaria, Rajkumar Rathod

Abstract

Technological innovation is rapidly accelerating in a Cyber world that is powered by social networks, online transactions, cloud computing, and automated processes. The technology evolution often brings it with the advancement of cybercrime. Which leads to Evolve in Security tools, techniques, and attack types, allowing attackers to penetrate more complex, even while remaining undetected. To make our systems more secure, it is crucial to know about those attacks, before and after they occur. Cyber security experts suggest that it is hard to predict an attack without knowing how vulnerable a network is. Therefore, it is important to analyze a network to determine top vulnerabilities, which can give the best idea of how to shield the network. It is the ever-evolving nature of Cyber Attacks that represents the main challenge of cyber security specialist. In this paper, we will discuss the importance of cyber security and the different risks that are present in the current security era. We will also evaluate countermeasures that can be implemented when attacks occur with the proposed process model of File Upload Vulnerability. This research also seeks to identify vulnerabilities through attacks and to provide mitigation for those vulnerabilities.


 

Article Details

Section
Articles