Abstract

Cybersecurity is the practice of protecting our systems, networks, and programmes from cyber attackers and it aims to access, alter, or destroy sensitive information that affects normal processes. Cybersecurity specialists are constantly searching for new, cutting-edge strategies, where the various methods that cybercriminals can use to attack. According to the Cyber Security & Infrastructure Security Agency (CISA), “Cyber security is the art of protecting networks, devices and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity and availability of information”. Cybersecurity protects against theft and loss of all forms of data, including sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and systems used by governments and businesses hence it is essential. One of the most important aspects of cybersecurity is End-user Protection. All software and hardware used by end users must be scanned at regular intervals as there can be malicious threats. The attackers do not fall behind as a result of the advancement of new cyber security systems. They use improved hacking methods and target the weaknesses of numerous companies worldwide. Aside from other things, many people are still very concerned about cyber security. At present cyber security faces, many challenges and this study focuses on user security for the most recent technologies that encountered difficulties. Keywords— Cyber Security, Cyber Attacks, Defects, Technologies, Hacking.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.