The Creation of a Method to Handle the Cyane Issues Facing Indian Smartphone Users

Authors

  • G Prasad Babu, Dr Ashish Chandra Swami, Dr Sikhakolli Gopi Krishna Author

Abstract

Criminals have the potential to do a broad variety of harm to people, companies, and society as a whole by exploiting vulnerabilities in the security built into the internet and the programs that run on it. Several types of attacks, including Denial of Service (DoS), Distributed Denial of Service (DDoS), Probe, Remote to Local (R2L), User to Root (U2R), HeartBleed, Exploits, Malware, Botnet, and Worms, have made a great number of online services and  applications  very  susceptible  to  attack. A significant problem with the Internet is that it allows bad actors to hide their tracks by faking the IP address of the file that originated from which they obtained the file. 

Downloads

Published

2024-06-19

How to Cite

The Creation of a Method to Handle the Cyane Issues Facing Indian Smartphone Users. (2024). International IT Journal of Research, ISSN: 3007-6706, 2(2), 211-218. https://itjournal.org/index.php/itjournal/article/view/120