Abstract
Due to the technology growth throw the years, Hackers are evolution a divers and sophistication methods to attack systems security. Mostly these attacks occur to get personal benefits from harming the system physically by steeling and destroying devices that contain precious information or non-physically (logically) by alter and eavesdrop on sensitive data and more than that. This paper surveys aim to discuss the most common cyber security attacks types, what the mechanisms that used in these attacks and how to prevent the system from these threats. In particular, it concentrates on exploiting the system vulnerabilities to steal information and gain benefits from it.
Cite
CITATION STYLE
Alhathally*, L. … Masud, M. (2020). Cyber security Attacks: Exploiting weaknesses. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 906–913. https://doi.org/10.35940/ijrte.e4876.018520
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.