ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.6, No. 4)

Publication Date:

Authors : ; ; ;

Page : 51-59

Keywords : Iaeme Publication; IAEME; Technology; Engineering; IJARET; Cyber Security; Vulnerabilities; Network Attacks; Malware; Privacy.;

Source : Downloadexternal Find it from : Google Scholarexternal


This is an era of technology and Internet is one o f the them which has changed the world the most in last decades. It is open and so anyone can use it to get information about anything, people have been using it for educational, business, social connections and every day work purposes. But the matter of fact is door open in both directions, bad people with bad intensions stared using this technology for evil intensions. They are stealing personal data, financial information, government secrets and many others are target of those people. In this paper we will discuss about vulnerabilities present currently in the network, some case studies and later recommendations to avoid vulnerabilities and prevent them from exploitations are also discussed.

Last modified: 2016-05-30 15:32:17