z-logo
open-access-imgOpen Access
Cybersecurity and Web of Things: A review on Ad hoc issues
Author(s) -
Yelena Mujibur Sheikh,
Yash B Dobhal
Publication year - 2022
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2022.40529
Subject(s) - computer security , exploit , computer science , internet security , security through obscurity , the internet , malware , network security , security service , cybercrime , internet privacy , information security , cloud computing security , world wide web , security information and event management , cloud computing , operating system
Cyber Security is employed for shielding knowledge systems like networks, computers, databases, information centers, and applications with acceptable procedural and technical security measures. As most of the issues pop up the thoughts, ‘cybercrimes’ can mix colossally daily. Crime is rising as a grave threat in today’s world. It’s an aggressive space of crime. As the number of web users has grown, so has offense. For example, the current Covid-19 pandemic has had a notable consequence for organizations and establishments, resulting in security vulnerabilities; as a result, network security is becoming progressively diverse and complex, and as a matter of fact, completely different ways are being devised to exploit it. Network engineers got to sustain with recent advances in each hardware and software package field to forestall them from being employed, together with user information. Historically, solely mobile computers and phones were connected to the internet; however, with the advancement of technology, other items such as security cameras, microwaves, automobiles, and industrial machinery are all now connected to the internet. The web of stuff is the term given to this network of interconnected things. Prime Securities for the Web of Things are involved[1]. This paper gives detailed information on cyber security and crime as little more than a result. It addresses forms of cyber security, the need for cyber security, issues regarding cyber security, benefits and drawbacks, criminal background, and criminal offenses. Keywords: Computer Security, Internet, Protection, Application software, IP network, Exploits, Malware Threats, Virus, IoT, Network Security, Computer Network, Cybersecurity.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here