{"title":"网络安全及其挑战综述","authors":"N. Rao","doi":"10.21742/IJWMCIS.2019.6.1.03","DOIUrl":null,"url":null,"abstract":"The utilization of various electronic gadgets with data usage had increased a lot in recent days. The mostly used devices are like the mobile phones, laptops and other network-based working devices. As these devices are being used, the internet connectivity for these devices are mandatory and the utilization of internet connectivity to all the applications in those devices is becoming a serious problem. As these applications are connected with internet facility always and the data stored in such devices can be accessed easily by using various secret applications or any other patch files. The breaching of data in those devices or applications in those devices had become easier and can be tapped the data without the knowledge of the users of such devices. These applications and things are providing serious challenges to the users for keeping their devices safe and use those devices safe and secure. In the current article, an attempt had been made to provide the various cyber security challenges being faced by users and the latest trends and challenges being generated and faced by the users are given in detail.","PeriodicalId":284230,"journal":{"name":"International Journal of Wireless and Mobile Communication for Industrial Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Detailed Review on Cyber Security and Its Challenges\",\"authors\":\"N. Rao\",\"doi\":\"10.21742/IJWMCIS.2019.6.1.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The utilization of various electronic gadgets with data usage had increased a lot in recent days. The mostly used devices are like the mobile phones, laptops and other network-based working devices. As these devices are being used, the internet connectivity for these devices are mandatory and the utilization of internet connectivity to all the applications in those devices is becoming a serious problem. As these applications are connected with internet facility always and the data stored in such devices can be accessed easily by using various secret applications or any other patch files. The breaching of data in those devices or applications in those devices had become easier and can be tapped the data without the knowledge of the users of such devices. These applications and things are providing serious challenges to the users for keeping their devices safe and use those devices safe and secure. In the current article, an attempt had been made to provide the various cyber security challenges being faced by users and the latest trends and challenges being generated and faced by the users are given in detail.\",\"PeriodicalId\":284230,\"journal\":{\"name\":\"International Journal of Wireless and Mobile Communication for Industrial Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Wireless and Mobile Communication for Industrial Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21742/IJWMCIS.2019.6.1.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Wireless and Mobile Communication for Industrial Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21742/IJWMCIS.2019.6.1.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Detailed Review on Cyber Security and Its Challenges
The utilization of various electronic gadgets with data usage had increased a lot in recent days. The mostly used devices are like the mobile phones, laptops and other network-based working devices. As these devices are being used, the internet connectivity for these devices are mandatory and the utilization of internet connectivity to all the applications in those devices is becoming a serious problem. As these applications are connected with internet facility always and the data stored in such devices can be accessed easily by using various secret applications or any other patch files. The breaching of data in those devices or applications in those devices had become easier and can be tapped the data without the knowledge of the users of such devices. These applications and things are providing serious challenges to the users for keeping their devices safe and use those devices safe and secure. In the current article, an attempt had been made to provide the various cyber security challenges being faced by users and the latest trends and challenges being generated and faced by the users are given in detail.