Startseite Mathematik Cybersecurity threats in modern digital world
Kapitel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Cybersecurity threats in modern digital world

  • Rahul Bijalwan , Vandana Rawat , Akshita Patwal und Sudhanshu Maurya
Veröffentlichen auch Sie bei De Gruyter Brill
Algorithms
Ein Kapitel aus dem Buch Algorithms

Abstract

New and enhanced methods of protection against malware have been designated as an immediate priority by the cybersecurity community. This also includes the rising number of cyberattacks during the COVID-19 era and shows the problems faced by the organization due to data breeches which cause loss of secured data. The issue of cybersecurity has prompted the development of a number of frameworks and models. It also explains what cybersecurity is, how it works, and how to keep your personal data safe online. The effectiveness and limitations of current cutting-edge mitigation strategies are then discussed. We then take a look at how hackers are using emerging platforms like social media, the cloud, mobile devices, and key infrastructure to launch their attacks. This chapter gives the review about the most common cyberattack used by the hacker during COVID era.

Abstract

New and enhanced methods of protection against malware have been designated as an immediate priority by the cybersecurity community. This also includes the rising number of cyberattacks during the COVID-19 era and shows the problems faced by the organization due to data breeches which cause loss of secured data. The issue of cybersecurity has prompted the development of a number of frameworks and models. It also explains what cybersecurity is, how it works, and how to keep your personal data safe online. The effectiveness and limitations of current cutting-edge mitigation strategies are then discussed. We then take a look at how hackers are using emerging platforms like social media, the cloud, mobile devices, and key infrastructure to launch their attacks. This chapter gives the review about the most common cyberattack used by the hacker during COVID era.

Heruntergeladen am 20.10.2025 von https://www.degruyterbrill.com/document/doi/10.1515/9783111229157-008/html
Button zum nach oben scrollen