Cyber Attacks and Preventive Measures on Network Applications

  • Udoh, Godwin Joseph Department of Computer Engineering
  • Umoh, Mfreke E. Department of Computer Science
Keywords: Cyber-attack, Network security, Cybercrime, Cyber prevention, network Applications

Abstract

Computer network security is of great importance for many users. With the increase in network development applications, the problem of network security is becoming more and more serious. Due to the diversity of computer network connections, terminal distribution in homogeneity, network openness, and sharing of network resources, the computer network is vulnerable to different forms of attacks such as viruses, hackers, malware attacks, and other misconduct. To ensure the safety and smoothness of information, the network security and preventive measures are eyebrow nimble. This paper analyzes the following with regards to the subject matter. History of cybercrime, motives behind cybercrime, cyber-attacks. cyber-attacks prevention and the cost of not being cyber secured.

References

1. Adrian. (2020). What is a dictionary attack and how to prevent it?. https://www.internetsecurity.tips/what-is-a-dictionary-attack-and-how-to-prevent it/#:~:text=In%20a%20Dictionary%20attack%2C%20cyber,to%20guess%20the%20correct%20credentials.
2. Biswal, C.S. & Dr. Pani, A.K. (2020). Cyber-crime prevention methodology, utkal university, p8-10,
3. Buckbee, M. (2020). What Is a Man-in-the-Middle Attack: Detection and Prevention Tips https://www.varonis.com/blog/man-in-the-middle-attack.
4. Byos. (n.d). How to prevent malware attacks. Retrieved from https://www.byos.io/blog/how-to-prevent-malware-attacks
5. CASHTEST SECURITY. (2022). What is password attack. https://crashtest-security.com/password-attack/
6. Expert Insights. (2022). The top 10 biggest cyberattacks of 2021. https://expertinsights.com/insights/10-high-profile-attacks-2021/
7. ExtraHop. (n.d). Denial of service attack: definition, examples, and prevention. https://www.extrahop.com/resources/attacks/dos/
8. Flylib. (n.d). Attack strategies. https://flylib.com/books/en/4.213.1.25/1/
9. Imperva. (2021). What Is SQL Injection: SQL (Structured query language) Injection. https://www.imperva.com/learn/application-security/sql-injection-sqli/
10. Lifars. (2020). Motivations behind cyber-attacks. LIFARS, a Security Scorecard company. Retrieved September 18, 2022, from https://www.lifars.com/2020/03/motivations-behind-cyber-attacks/
11. McCoy M. (2019). Negative effects of hacking. https://itstillworks.com/negative-effects-hacking-12040354.html
12. Owasp. (n.d). Repudiation attack. https://owasp.org/www-community/attacks/Repudiation_Attack#:~:text=A%20repudiation%20attack%20happens%20when,the%20identification%20of%20new%20actions.
13. Smith, T.E. (2013). A conceptual review and exploratory evaluation of the motivations for cybercrime, p13, 19.
14. Watering, J.V (n.d). The Origin of Cybercrime. https://goosevpn.com/blog/origin-cybercrime.
Published
2022-09-21
How to Cite
Joseph, U. G., & E. , U. M. (2022). Cyber Attacks and Preventive Measures on Network Applications. International Journal of Human Computing Studies, 4(9), 12-33. https://doi.org/10.31149/ijhcs.v4i9.3481
Section
Articles