Analysis and Survey on Cybersecurity: Threats and Solutions
Keywords:
Cyber Security, Cyber-Threats, Malware, Countermeasures, Awareness, Hacking, Phishing, DDOSAbstract
This research paper will explore the various types of cyber attacks that are currently impacting individuals and organizations, and the solutions that are available to mitigate these threats. The paper will begin by providing an overview of the current state of cybersecurity, including the types of attacks that are most commonly seen and the industries that are most at risk.
The paper will then delve into specific types of attacks, such as ransomware and phishing, and examine the methods that are used to carry out these attacks, as well as the potential consequences for victims. The paper will also provide data about cybersecurity awareness amongst the people.
Downloads
References
File: PhishingTrustedBank.png. (n.d.). Wikimedia Commons. Retrieved April 15, 2023, from https://en.wikipedia.org/wiki/File:PhishingTrustedBank.png
What Is Malware? (n.d.). Akamai. Retrieved April 15, 2023, from https://www.akamai.com/glossary/what-is-malware
Phishing Examples. (n.d.). Phishing.org. Retrieved April 15, 2023, from https://www.phishing.org/phishing-examples
Bourg, G., Bullock, M., & Miller, R. (2014, December 1). Trojan Placeholder. Placeholder Trojan: Writing a Malware Software. Retrieved April 15, 2023, from https://www.cse.wustl.edu/~jain/cse571-14/ftp/p_trojan/index.html
Why Use 2FA? : TechWeb. (n.d.). Boston University. Retrieved April 15, 2023, from https://www.bu.edu/tech/support/information-security/why-use-2fa/
Gray, K. (2022, October 17). Fake Wi-Fi HotSpots: A Criminal's Tool to Steal from You. Retrieved April 15, 2023, from https://blog.envisionitsolutions.com/computer-security-and-fake-wi-fi-hotspots-a-criminals-tool-to-steal-from-you
Cyber Security Solutions | Protect Enterprise Networks | Imperva. (n.d.). Imperva, Inc. Retrieved April 15, 2023, from https://www.imperva.com/learn/application-security/cyber-security-solutions/