Ask a question from expert

Ask now

Threats, Attacks and Malware in IT Security - Desklib

This assignment requires students to do a 5-10 minute presentation on a recent academic paper related to IT Security.

12 Pages1198 Words192 Views
   

Added on  2022-10-05

About This Document

This presentation reviews recent academic articles on IT security, specifically in Threats, Attacks and Malware. It highlights the various malware that attackers use to perpetrate their attacks depending on their targets.

Threats, Attacks and Malware in IT Security - Desklib

This assignment requires students to do a 5-10 minute presentation on a recent academic paper related to IT Security.

   Added on 2022-10-05

BookmarkShareRelated Documents
Threats, Attacks and
Malware
Presented By: (Add Names)
Threats, Attacks and Malware in IT Security - Desklib_1
INTRODUCTION
The aim of this presentation is to do provide a
review about recent academic articles on IT security.
To help with the review, the article chosen is titled,
“Cyber Security and the Internet of Things:
Vulnerabilities, Threats, Intruders and Attacks,”
authored by Mohamed Abomhara and Geir M. Køien
[1]
This is to help in reviewing issues facing IT security
and specifically in Threats, Attacks and Malware.
Threats, Attacks and Malware in IT Security - Desklib_2
Intention and Content of The Article
The intention of the article is to classify the security threats and
attacks facing IT industry and specifically in the field of IoT.
IoT has been named as the fasted growing technology and has
permeated in almost all sectors of people’s life nowadays [2].
This calls for a robust security that will adequately secure the big
number of devices and services that are connected to the internet all
over the word.
However, the number of threats and their complexity keeps on
increasing every day
Threats, Attacks and Malware in IT Security - Desklib_3
Vulnerabilities
They can be defined as weakness within as system that gives room to
an intruder to carry out his/malicious intentions [3]. For example, IoT
vulnerabilities can be found in the software, hardware, policies or the
users of the devices. Exposure
A mistake or a problem in the configuration of a system that enables
an attacker to conduct information gathering tasks is referred to as
exposure.
Threats, Attacks and Malware in IT Security - Desklib_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Threats, Attacks and Malware in IT Security: A Review of Recent Academic Articles
|8
|2420
|129

Cyber Security and its Impact on IoT and Social Media
|5
|929
|287

Internet of Things (IOT) - Assignment
|10
|1770
|76

IT-373 - Report on IT Security
|11
|2410
|51

IoT Applications and Services - PDF
|8
|2649
|134

Computer Security: Fundamentals, Examples, and Countermeasures
|15
|5240
|98