Analysis and Survey on Cybersecurity: Threats and Solutions

Authors

  • Om Dhule
  • Hrishikesh Bhorde
  • Shail Alavani
  • Avinash Janbhare
  • Gauri Dhongade

Keywords:

Cyber Security, Cyber-Threats, Malware, Countermeasures, Awareness, Hacking, Phishing, DDOS

Abstract

This research paper will explore the various types of cyber attacks that are currently impacting individuals and organizations, and the solutions that are available to mitigate these threats. The paper will begin by providing an overview of the current state of cybersecurity, including the types of attacks that are most commonly seen and the industries that are most at risk.

The paper will then delve into specific types of attacks, such as ransomware and phishing, and examine the methods that are used to carry out these attacks, as well as the potential consequences for victims. The paper will also provide data about cybersecurity awareness amongst the people.

Downloads

Download data is not yet available.

References

File: PhishingTrustedBank.png. (n.d.). Wikimedia Commons. Retrieved April 15, 2023, from https://en.wikipedia.org/wiki/File:PhishingTrustedBank.png

What Is Malware? (n.d.). Akamai. Retrieved April 15, 2023, from https://www.akamai.com/glossary/what-is-malware

Phishing Examples. (n.d.). Phishing.org. Retrieved April 15, 2023, from https://www.phishing.org/phishing-examples

Bourg, G., Bullock, M., & Miller, R. (2014, December 1). Trojan Placeholder. Placeholder Trojan: Writing a Malware Software. Retrieved April 15, 2023, from https://www.cse.wustl.edu/~jain/cse571-14/ftp/p_trojan/index.html

Why Use 2FA? : TechWeb. (n.d.). Boston University. Retrieved April 15, 2023, from https://www.bu.edu/tech/support/information-security/why-use-2fa/

Gray, K. (2022, October 17). Fake Wi-Fi HotSpots: A Criminal's Tool to Steal from You. Retrieved April 15, 2023, from https://blog.envisionitsolutions.com/computer-security-and-fake-wi-fi-hotspots-a-criminals-tool-to-steal-from-you

Cyber Security Solutions | Protect Enterprise Networks | Imperva. (n.d.). Imperva, Inc. Retrieved April 15, 2023, from https://www.imperva.com/learn/application-security/cyber-security-solutions/

Additional Files

Published

30-05-2023

How to Cite

Om Dhule, Hrishikesh Bhorde, Shail Alavani, Avinash Janbhare, & Gauri Dhongade. (2023). Analysis and Survey on Cybersecurity: Threats and Solutions. Vidhyayana - An International Multidisciplinary Peer-Reviewed E-Journal - ISSN 2454-8596, 8(si7), 378–391. Retrieved from http://j.vidhyayanaejournal.org/index.php/journal/article/view/831