z-logo
open-access-imgOpen Access
Cybersecurity Snapshot: Google, Twitter, and Other Online Databases
Author(s) -
Bharat S. Rawal,
Gabrielle Eberhardt,
Jaein Lee
Publication year - 2016
Publication title -
journal of advanced computer science and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-4332
DOI - 10.14419/jacst.v5i1.6181
Subject(s) - hacker , computer security , computer science , snapshot (computer storage) , battle , internet privacy , world wide web , domain name , cyber threats , the internet , database , archaeology , history
Every day, millions of attacks are carried out on the networks and computer systems. In recent years, these numbers have increased dramatically. All it requires is one success for a hacker to gain unauthorized access and data, but for administrators, it is a constant battle to protect what is rightfully theirs. In this paper, we look into how these attacks have increased, what the studies of various databases and reports say on how and what types of data are being breached, who is breaching them, and how they are breaching the systems. Also, we propose various unconventional ways to prevent these attacks from happening in the future. Furthermore, this paper lists the top 26 bug-fix times reported in the Google Security Research Project (GSRP). This article brings to light reoccurring cyber threats, challenges associated with these threats, and emerging trends in the domain of cyber security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here