2020
DOI: 10.35940/ijrte.e4876.018520
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security Attacks: Exploiting weaknesses

Lama Alhathally*,
Mohammed A. AlZain,
Jehad Al-Amri
et al.

Abstract: Due to the technology growth throw the years, Hackers are evolution a divers and sophistication methods to attack systems security. Mostly these attacks occur to get personal benefits from harming the system physically by steeling and destroying devices that contain precious information or non-physically (logically) by alter and eavesdrop on sensitive data and more than that. This paper surveys aim to discuss the most common cyber security attacks types, what the mechanisms that used in these attacks and how t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 18 publications
(45 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?