Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3) 2022
DOI: 10.19107/cybercon.2022.11
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attacks Identification and Measures for Prevention

Abstract: In the present digitization era, almost everything is available online, at just one click away from us, which offer a lot of opportunities, like saving a lot of time, but also many challenges, due to the existence of many cyber-attacks, more complex and difficult to be detected. The cyber-attacks effects can be data theft, modification, or alteration. In recent time, cybersecurity is very important also in the academic field, because schools and universities systems are connected online. To protect our data fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…In addition, malware results in data leakage (Alexei & Alexei, 2021). At times, the attackers would be after corruption or deletion of data as well as the identity theft (Chopra, Marwaha, & Sharma, 2022). Some services get interrupted as results of the denial of service leading to freezing of certain business divisions.…”
Section: Impact Of Malware Attacksmentioning
confidence: 99%
“…In addition, malware results in data leakage (Alexei & Alexei, 2021). At times, the attackers would be after corruption or deletion of data as well as the identity theft (Chopra, Marwaha, & Sharma, 2022). Some services get interrupted as results of the denial of service leading to freezing of certain business divisions.…”
Section: Impact Of Malware Attacksmentioning
confidence: 99%