International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 182 - Number 49 |
Year of Publication: 2019 |
Authors: Jemima Treesa Thomas, Mukta Sharma |
10.5120/ijca2019918764 |
Jemima Treesa Thomas, Mukta Sharma . Cyber Poison. International Journal of Computer Applications. 182, 49 ( Apr 2019), 50-54. DOI=10.5120/ijca2019918764
The cyber-world is developing with each passing second and one needs to know how to protect themselves from cyber-attacks as they are also growing at a much faster pace. This research paper shed light on the recent cyber-threats faced by not only the individuals, corporates, governments but also by the nations globally. The paper focuses on the top attacks which have actually changed the perspective of an attack. The attacks are not just limited to disrupting the functioning of the system, deleting some files, stealing the customers’ identity or breach for monetary benefits rather it is more hazardous as these days attacks are involved in being used as a cyber-weapon. The paper also discusses about one of the most mysterious hackers that lead to the most devastating cyber-attacks in the history of the cyber-world. The authors share how the non-technical organizations are more prone for cyber-attacks and how much badly it could affect their businesses. The author felt the need to share the prevention mechanisms through which the companies can keep them and their data confidential and secure from getting exploited by such attacks.