Cybersecurity threats in modern digital world
-
Rahul Bijalwan
Abstract
New and enhanced methods of protection against malware have been designated as an immediate priority by the cybersecurity community. This also includes the rising number of cyberattacks during the COVID-19 era and shows the problems faced by the organization due to data breeches which cause loss of secured data. The issue of cybersecurity has prompted the development of a number of frameworks and models. It also explains what cybersecurity is, how it works, and how to keep your personal data safe online. The effectiveness and limitations of current cutting-edge mitigation strategies are then discussed. We then take a look at how hackers are using emerging platforms like social media, the cloud, mobile devices, and key infrastructure to launch their attacks. This chapter gives the review about the most common cyberattack used by the hacker during COVID era.
Abstract
New and enhanced methods of protection against malware have been designated as an immediate priority by the cybersecurity community. This also includes the rising number of cyberattacks during the COVID-19 era and shows the problems faced by the organization due to data breeches which cause loss of secured data. The issue of cybersecurity has prompted the development of a number of frameworks and models. It also explains what cybersecurity is, how it works, and how to keep your personal data safe online. The effectiveness and limitations of current cutting-edge mitigation strategies are then discussed. We then take a look at how hackers are using emerging platforms like social media, the cloud, mobile devices, and key infrastructure to launch their attacks. This chapter gives the review about the most common cyberattack used by the hacker during COVID era.
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
- Machine learning-enabled techniques for speech categorization 1
- Comprehensive study of cybersecurity issues and challenges 21
- An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies 41
- A comparative study on security issues and clustering of wireless sensor networks 55
- Heuristic approach and its application to solve NP-complete traveling salesman problem 69
- Assessment of fake news detection from machine learning and deep learning techniques 87
- Spam mail detection various machine learning methods and their comparisons 119
- Cybersecurity threats in modern digital world 137
- Mechanism to protect the physical boundary of organization where the private and public networks encounter 149
- By combining binary search and insertion sort, a sorting method for small input size 167
- Index 179
Chapters in this book
- Frontmatter I
- Preface V
- Contents VII
- Machine learning-enabled techniques for speech categorization 1
- Comprehensive study of cybersecurity issues and challenges 21
- An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies 41
- A comparative study on security issues and clustering of wireless sensor networks 55
- Heuristic approach and its application to solve NP-complete traveling salesman problem 69
- Assessment of fake news detection from machine learning and deep learning techniques 87
- Spam mail detection various machine learning methods and their comparisons 119
- Cybersecurity threats in modern digital world 137
- Mechanism to protect the physical boundary of organization where the private and public networks encounter 149
- By combining binary search and insertion sort, a sorting method for small input size 167
- Index 179