
Tens of millions of cyber-attacks (Emails, online transactions, live video streaming, online games, and navigation are all examples of fraudulent Internet-based intelligence gathering.) are launched every day against Internet users throughout the world. Various defences have been developed by researchers in response to these attacks. At present, the techniques that cyber attackers use to perpetrate attacks are related to human exploitation. These attacks are more frequent than before, and they are harder to contain. In the area of information management, cybersecurity is essential. In today's world, protecting privacy has been one of the most difficult tasks. "Cyber-crimes" is the first thing that has come to me when I think about cyber security, which are on the rise at an alarming rate. Various governments and corporations are taking various actions to tackle cybercrime. Despite different initiatives, cyber security remains a major issue for many people. Traditional non-confidence counter-measures are unable to prevent violations against individuals. This paper explains the current state of cybersecurity threats, counter-measures and non-confidence tools that are relevant to day-to-day online operations. It offers a valuable cyber-attack taxonomy and classification that aids in the identification of cyber-attacks and cyber-security initiatives.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
