A Review on Cyberattacks and Their Preventive Measures

A Review on Cyberattacks and Their Preventive Measures

Farhana Haque Sumi, Lokesh Dutta, Farhana Sarker
Copyright: © 2019 |Pages: 18
DOI: 10.4018/IJCRE.2019070102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Every year many individuals and organizations suffer from cyberattacks, which include data loss, information hacks, transaction problem, and unauthorized access of information or data. The frequency of these attacks is increasing day by day and it's creating a lot of problems or threats in our life. These attacks can be extremely damaging to businesses as well as people. Therefore, we must know about cyberattacks and their preventive measures as many of us are still unaware about it. The objective of this paper is to create awareness of the various types of cyber-attacks and lay the foundation for their cyber security planning. In this paper, we discuss different types of cyberattacks and the tools used to perform these cyberattacks. Moreover, this paper presents a clear picture of some attacks that helps people to understand how attacker accomplishes all these attacks. Finally, we discuss the preventive measures.
Article Preview
Top

Introduction

A cyberattack is an unauthorized access of computer systems. Cyber-attacks are propagated on computer users who are unaware of cybercrime techniques. Many organizations have already implemented safety measures to protect themselves from cyberattacks. Normal users suffer more because they don’t know how to protect their personal data, personal networks, and personal system from cyberattack. Cyber security is necessary to protect personal data, networks, and personal systems from unauthorized access and protect data from misuse. Cyber security consists of technologies, processes and measures that are designed to protect systems, networks, and data damage from cybercrimes. Effective cyber security reduces the risk of a successful cyberattack and protects data, organizations and individuals from the planned misuse of systems, networks and technologies. To refine the online search regarding cyber security challenges, the following keywords were used to search in the Google scholar, ISI Web of Knowledge, different Journals, Wikipedia, books etc. All articles’ bibliographies were also searched for additional resources. In the next section different types of cyberattacks are described briefly

Complete Article List

Search this Journal:
Reset
Volume 5: 1 Issue (2024)
Volume 4: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 3: 2 Issues (2021)
Volume 2: 2 Issues (2020)
Volume 1: 2 Issues (2019)
View Complete Journal Contents Listing