logo

Cyber security.

   

Added on  2022-11-28

9 Pages325 Words20 Views
CYBER SECURITY
STUDENT NAME:

CHALLENGES OF CYBER SECURITY
Attacks via IoT Devices:
IoT devices might be used
to perform DDoS attacks.
Poor security systems are
exploited by cyber
criminals, making them
create enormous quantity
of traffic.
Cloud Security Problems:
APIs are only facets
having public IP address
outside trusted industrial
boundaries in several
cloud systems. Thus,
attackers get a chance to
access cloud applications
through insecure APIs.
Ransom ware: The
primary target is the
organizations which store
important information
like personal data of
users, cloud services.
AI and Machine Learning
Attacks: Machine
Leaning and AI can be
used to perform several
kinds of attacks such as
sending huge amount of
fraud messages through
Chabot's, AI-powered
passwords to perform
cryptographic attacks.

GOALS OF CYBER SECURITY
Protection of Data Confidentiality: It
protects the data from various attacks,
by providing access to only authorized
users. Data encryption is used for
ensuring confidentiality.
Protection of Data Integrity: Integrity is
the property where data cannot be
altered in unauthorized process and the
information source is genuine.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment 2022
|13
|965
|14

Software Quality Assurance in Cyber Security
|8
|613
|243

Applications of Cyber-Security in Higher Education
|28
|7698
|11

cyber Attack presentation 2022
|11
|796
|49

Cyber security Attacks | Assessment 1
|7
|1374
|30

Cyber Security And Privacy Issues
|4
|647
|26