IJAIEM

International journal of application or innovation in engineering
and management
ISSN:2319-4847

Abstract

Investigations on Cyber Security Vulnerability using Distribution Analysis

Pashikanti Vaman, Mughala Nithin, Reddi Mahesh Babu ,K.Koteswara Rao

Abstract

Internet communication is used as a mode of engagement by businesses, organizations, and even nations in a variety of contexts. As a result, both the quantity of data produced and the importance of the information that can be derived from it are growing. Multiple safeguards are required in order to ensure that the accessibility, integrity, and confidentiality of company information and assets are maintained. When it comes to protecting the privacy of a company and its reputation, adopting countermeasures and minimizing the damage caused by irreversible cyberattacks are both very crucial. It is possible to utilize both active and passive attack tactics, as well as social engineering tests, to evaluate the weaknesses of a corporation's cyber security. The identification and ranking of vulnerabilities both play an active part in the process of raising the level of corporate awareness, as well as closing shortfalls and enhancing measures. In this investigation, ethics committee repor

IMPORTANT LINKS

Plagiarism

Check Article for

Plagiarism


UPDATES

  • call for paper:
    volume8
  • issue-1 october 2024
  • Submission date:
    22.10.2024

  • publishing date:28.10.2024

INDEXED BY: