Journal international des progrès technologiques

Journal international des progrès technologiques
Libre accès

ISSN: 0976-4860

Abstrait

Cyber Security and Cyber Attacks

Rebecca Smith

The majority of economic, commercial, cultural, social, and governmental activities and contacts of countries are now conducted in cyberspace at all levels, including individuals, non-governmental groups, and government and governmental institutions. Many private firms and government agencies throughout the world are currently dealing with cyber-attacks and the dangers of wireless communication technologies. Protecting data against cyber-attacks is a difficult task in today's environment, which is heavily reliant on electronic technology. Cyber-attacks are designed to cause financial harm to businesses. Cyber-attacks can also be used for military or political reasons in some situations. PC viruses, knowledge breaks, Data Distribution Service (DDS), and other assault vectors are examples of these harms. To this goal, numerous businesses employ a variety of strategies to mitigate the effects of cyber-attacks. Cyber security is based on real-time data on the most recent IT data. Until now, academics from all over the world have offered a variety of ways for preventing cyber-attacks or reducing the damage they do. Some of the methods are in use, while others are still being researched. The goal of this research is to examine and review the usual advances in the field of cyber security, as well as to look into the obstacles, flaws, and strengths of the offered approaches. The many sorts of new descendant attacks are discussed in depth. The history of early-generation cyber-security methods is described together with standard security frameworks. The goal of this research is to examine and review the usual advances in the field of cyber security, as well as to look into the obstacles, flaws, and strengths of the offered approaches. The many sorts of new descendant attacks are discussed in depth. The history of early-generation cybersecurity methods is described together with standard security frameworks.

Top