학술논문
An Examination of Cybersecurity Threats and Authentication Systems
Document Type
Conference
Author
Source
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) Advance Computing and Innovative Technologies in Engineering (ICACITE), 2023 3rd International Conference on. :2727-2731 May, 2023
Subject
Language
Abstract
Each and every nation in the globe has very crucial infrastructures that offer crucial services like internet activity, energy, banking and finance, crucial public services, transportation, and water management. For vital infrastructure based on sectors, each nation has a unique strategy. As IoT-based solutions proliferate, these crucial infrastructures now have network and Internet connectivity. Consequently, these crucial systems that are a part of information networks are equally vulnerable to online attacks. It is crucial to recognise the potential cyber-attack types, devise defence strategies, and implement various preventative measures. In the present day, it is critical to protect potential cyberattacks on these vital infrastructures. The most common attacks on crucial infrastructures are looked at in this study, especially those that have recently happened. Security precautions are also discussed with a view to reducing or preventing IP-based intrusions. The Internet of Things is the next step in machine-to-machine connectivity. IoT has made it possible for anything to be online nowadays. IoT also refers to the networking of uniquely identified, pervasive computing devices that have the ability to transmit data over a network without necessarily requiring or machine-to-human interaction.