How to Cite:
Sharma, A., Tyagi, A., & Bhardwaj, M. (2022). Analysis of techniques and attacking
pattern in cyber security approach: A survey. International Journal of Health
Sciences, 6(S2), 13779–13798. https://doi.org/10.53730/ijhs.v6nS2.8625
International Journal of Health Sciences ISSN 2550-6978 E-ISSN 2550-696X © 2022.
Manuscript submitted: 09 March 2022, Manuscript revised: 18 April 2022, Accepted for publication: 27 May 2022
13779
Analysis of techniques and attacking pattern in
cyber security approach: A survey
Aman Sharma
Department of Computer Science and Information Technology, KIET Group of
Institutions, Delhi-NCR, Muradnagar, India
Anushka Tyagi
Department of Computer Science and Information Technology, KIET Group of
Institutions, Delhi-NCR, Muradnagar, India
Dr. Manish Bhardwaj
Department of Computer Science and Engineering, KIET Group of Institutions,
Delhi-NCR, Muradnagar, India
Abstract---IT or Cybersecurity. It's the protection of computer systems
and networks against data leakage, theft or damage to their hardware
and software as well as service interruption or misdirection.
Increasing reliance on computer systems, such as smart phones,
televisions and the micro devices that make up the Internet of Things,
has made this field increasingly vital. Data security has risen to the
top of the to-do list in today's globe. Cybercrime is being tackled in a
variety of ways by governments and corporations around the world.
There is still a lot of anxiety about cyber security, despite several
efforts. This Paper provides an Intensive survey of various cyber-
attacks in India and their Countermeasures.
Keywords---cyber security, cyber attacks, cybercrimes, cyber
solutions.
Introduction
We all live in a fast-paced and developing society, and the Internet is now the
most important infrastructure in our daily lives. Our data is our most valuable
asset or liability on the Internet. It may be our credit card information, medical
records, financial transaction reports, military secrets, business strategies, chats,
videos, and anything else. What happens if the evil people get their hands on it?
When it comes to protecting our data from unauthorised access and modification,
this is where cybersecurity comes into play.