The Creation of a Method to Handle the Cyane Issues Facing Indian Smartphone Users
Abstract
Criminals have the potential to do a broad variety of harm to people, companies, and society as a whole by exploiting vulnerabilities in the security built into the internet and the programs that run on it. Several types of attacks, including Denial of Service (DoS), Distributed Denial of Service (DDoS), Probe, Remote to Local (R2L), User to Root (U2R), HeartBleed, Exploits, Malware, Botnet, and Worms, have made a great number of online services and applications very susceptible to attack. A significant problem with the Internet is that it allows bad actors to hide their tracks by faking the IP address of the file that originated from which they obtained the file.
Downloads
Published
2024-06-19
Issue
Section
Articles
How to Cite
The Creation of a Method to Handle the Cyane Issues Facing Indian Smartphone Users. (2024). International IT Journal of Research, ISSN: 3007-6706, 2(2), 211-218. https://itjournal.org/index.php/itjournal/article/view/120


