Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors

Main Article Content

Manasa R.
A. Jayanthila Devi

Abstract

Purpose: Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do malicious actions on digital systems or networks in order to make a profit. These crimes include hacking computer systems and stealing confidential information from businesses and individuals. A thorough study on the algorithms to detect threats in the virtual world of corporate sectors.


Finding/Result: Researchers are using a wide array of deep learning algorithms to achieve this goal, and the results have been rather impressive. A system like this may provide substandard results because to its limited ability to describe the problem area and the complexity of its modeling of hazardous behaviours. Supervised learning systems often deliver a high level of accuracy because of the large amount of data made available by manually labelled samples.


Originality/Value: Antivirus software is an absolute need for any and all computers. The vast majority of antivirus software is able to identify malicious software such as malware, spyware, ransomware, and harmful email attachments.


Paper Type: Literature Review.

Article Details

How to Cite
Manasa R., & A. Jayanthila Devi. (2023). Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors. International Journal of Case Studies in Business, IT and Education (IJCSBE), 7(2), 90–105. https://doi.org/10.47992/IJCSBE.2581.6942.0261
Section
Articles

Most read articles by the same author(s)

1 2 > >>