Search In this Thesis
   Search In this Thesis  
العنوان
Detecting abnormal behaviors by modeling an intelligent system \
المؤلف
Mhedi, Ehab Anan.
هيئة الاعداد
باحث / EHAB ANAN MHEDI
مشرف / Prof. Dr. Usama A. Aburawash
مشرف / Dr. Narmeen Mahmoud Kashef
مشرف / Dr. Shaimaa A. Elmorsy
الموضوع
Modeling. System.
تاريخ النشر
2022.
عدد الصفحات
74 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
علوم الحاسب الآلي
تاريخ الإجازة
19/11/2022
مكان الإجازة
جامعة الاسكندريه - كلية العلوم - Mathematics
الفهرس
Only 14 pages are availabe for public view

from 74

from 74

Abstract

Cybersecurity faces a major challenge called the ”wicked problem,” Cyber security is ”transboundary in nature, occurs at several levels across sectors, between institutions, and will have a complex, interrelated, and often highly political on all actors, both public and private”[7]. Rapid technological development, the political and strategic application of these tools by both state- and non-state actors, as well as numerous initiatives by the government and its bureaucracies, society, that contribute to cyber security becoming a politically relevant issue.[1] . Every day, new forms of cyberattacks are developed to target electronic systems, networks, data, and smart devices, as well as the services they offer. By taking advantage of the intended victim’s weaknesses, these assaults become worse every day. The defense and protection system against these attacks is Cybersecurity[8]. The International Committee of the Red Cross, for example, stated on Feb 16, 2022, that systems storing personal data of more than 515,000 people around the world had been hijacked in a complicated cyber-attack in January, Personal information from all across the world, including names, contact information, and locations, was exposed. The International Committee to Support the Protection of Systems has hired a cybersecurity firm to investigate a malfunction of the ICRC’s computers, which contained information about the Red Cross and Red Crescent Movement of the World’s RFL services. The company then conducted a thorough investigation into the data, determining on January 18 that the hackers had access to the data stored in these systems and were present there[9].