Cyber security Attacks: Exploiting weaknesses

  • et al.
N/ACitations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to the technology growth throw the years, Hackers are evolution a divers and sophistication methods to attack systems security. Mostly these attacks occur to get personal benefits from harming the system physically by steeling and destroying devices that contain precious information or non-physically (logically) by alter and eavesdrop on sensitive data and more than that. This paper surveys aim to discuss the most common cyber security attacks types, what the mechanisms that used in these attacks and how to prevent the system from these threats. In particular, it concentrates on exploiting the system vulnerabilities to steal information and gain benefits from it.

Cite

CITATION STYLE

APA

Alhathally*, L. … Masud, M. (2020). Cyber security Attacks: Exploiting weaknesses. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 906–913. https://doi.org/10.35940/ijrte.e4876.018520

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free