Home Mathematics Cybersecurity threats in modern digital world
Chapter
Licensed
Unlicensed Requires Authentication

Cybersecurity threats in modern digital world

  • Rahul Bijalwan , Vandana Rawat , Akshita Patwal and Sudhanshu Maurya
Become an author with De Gruyter Brill
Algorithms
This chapter is in the book Algorithms

Abstract

New and enhanced methods of protection against malware have been designated as an immediate priority by the cybersecurity community. This also includes the rising number of cyberattacks during the COVID-19 era and shows the problems faced by the organization due to data breeches which cause loss of secured data. The issue of cybersecurity has prompted the development of a number of frameworks and models. It also explains what cybersecurity is, how it works, and how to keep your personal data safe online. The effectiveness and limitations of current cutting-edge mitigation strategies are then discussed. We then take a look at how hackers are using emerging platforms like social media, the cloud, mobile devices, and key infrastructure to launch their attacks. This chapter gives the review about the most common cyberattack used by the hacker during COVID era.

Abstract

New and enhanced methods of protection against malware have been designated as an immediate priority by the cybersecurity community. This also includes the rising number of cyberattacks during the COVID-19 era and shows the problems faced by the organization due to data breeches which cause loss of secured data. The issue of cybersecurity has prompted the development of a number of frameworks and models. It also explains what cybersecurity is, how it works, and how to keep your personal data safe online. The effectiveness and limitations of current cutting-edge mitigation strategies are then discussed. We then take a look at how hackers are using emerging platforms like social media, the cloud, mobile devices, and key infrastructure to launch their attacks. This chapter gives the review about the most common cyberattack used by the hacker during COVID era.

Downloaded on 19.10.2025 from https://www.degruyterbrill.com/document/doi/10.1515/9783111229157-008/html
Scroll to top button