Back to Search Start Over

A Review Paper on Cyber Security and Digital Forensics.

Authors :
Shirbhate, Dhiraj D.
Gupta, Sunil R.
Source :
Grenze International Journal of Engineering & Technology (GIJET); Jan Part 3, Vol. 10, p2732-2738, 7p
Publication Year :
2024

Abstract

Those who are not in computer science background, the preparation of the tutorial of cyber security can be more complex and difficult to understand. This paper generates a degree level virtualforensics and security course in a computer engineering department which presents synopsis, policies and application for a different departmental student domain. When the larger numbers of students in the section don’t have background of computer science, then the application for integrated student listeners can be challenging. This course led to provide a comprehensive perspective to widen knowledge and deep learning of network security by utilizing multidisciplinary groups to get knowledge and experience taking theory to practice and vice-versa. Computer science gives conceptual support and technological tools and approach to verify security parameters. Scientific techniques and principles to critical analysis are provided by Forensic science. It also collect data and analyzes the data which is digital evidence. The course involves learners from multidisciplinary educational backgrounds promotes cooperation between computer science and forensic students. Through this student gets familiar with the all views of cybersecurity. The abstract concludes that producing students which are well-equipped to plot the route for complex and emerging field of cyber security. The research also explores emerging technologies and trends that are reshaping the cyber security landscape, including the role of artificial intelligence and machine learning in threat detection, the rise of quantum-resistant cryptography, and the implications on digital security. This review paper critically examines the current landscape of cyber security measures with a focus on strategies employed to counteract evolving digital threats. As technology continues to advance, so do the complexities of cyber threats, necessitating a thorough analysis of existing cyber security paradigms. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
23955287
Volume :
10
Database :
Complementary Index
Journal :
Grenze International Journal of Engineering & Technology (GIJET)
Publication Type :
Academic Journal
Accession number :
175658450