Authors:
K. Daniel Jasper, M. N. Jaishnav, Mansura Ferdous Chowdhury, Rahman Badhan, R. Sivakani
Addresses:
Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India, dk9127@srmist.edu.in, jm5101@srmist.edu.in. Department of Computer Science and Engineering, North East University Bangladesh, Sylhet, Bangladesh, mansurafcr@neub.edu.bd. Department of Computer Science and Engineering, Sichuan University, Chengdu, China, mrrbadhan2018@stu.scu.edu.cn. Department of Artificial Intelligence and Data Science, Dhaanish Ahmed College of Engineering, Chennai, Tamil Nadu, India, sivakani13@gmail.com.
A data breach is an event that results in confidential, private, protected or sensitive information being exposed to a person not authorized to access it. A security architecture has been introduced to prevent data breaches. Security alerts play an essential role. Availability of the organization after the alert prevents more damage or financial loss to the organization. Incident response and overall monitoring of unwanted access and performing vulnerability tests often to enhance the data security. This framework introduces technologies and proactive measures to avoid data breaches. Intrusion Detection Systems (IDS). These systems monitor network and system activities, analyzing patterns and behaviours to detect anomalies that may indicate a security incident. Rules can be defined on the firewall based on the necessity and security policies of the organization. From the perspective of a server, network traffic can be either outgoing or incoming. Modern cybersecurity relies on Intrusion Prevention Systems (IPS) to detect and stop network threats. IPS blocks unwanted access, attacks, and exploits in real-time, unlike intrusion detection systems. When an unauthorised attacker activates the canary tokens tool, security emails the authorised person with the message set as a parameter to secure data and avoid incident response management.
Keywords: Cybersecurity Attacks; Distributed Denial-of-Service (Ddos); Intrusion Detection Systems; Intrusion Prevention System; Incident Response; Vulnerability and Firewall; Monitoring and Compliance.
Received on: 21/08/2023, Revised on: 11/10/2023, Accepted on: 19/11/2023, Published on: 05/03/2024
AVE Trends in Intelligent Computing Systems, 2024 Vol. 1 No. 1, Pages: 17-31