An Analysis of Verification Systems and Cybersecurity Dangers

Authors

  • Sunmathi R Bannari Amman Institute of Technology, Erode, Tamil Nadu, India
  • Tharun Teja G Bannari Amman Institute of Technology, Erode, Tamil Nadu, India
  • Lakshmanaprakash S Bannari Amman Institute of Technology, Erode, Tamil Nadu, India
  • Abirami A Bannari Amman Institute of Technology, Erode, Tamil Nadu, India

DOI:

https://doi.org/10.46610/JCSCS.2024.v03i01.004

Keywords:

Cyber-attacks, Defence tactics, Internet of Things (IoT), Security, Vulnerability

Abstract

Global infrastructure provides all nations essential services such as Internet, electricity, banking, finance, public services, transportation, and water management. Each country has a distinct plan for critical infrastructure based on its sector. As IoT-based solutions become more prevalent, critical infrastructures require network and Internet access. As a result, critical systems within information networks are also vulnerable to cyber-attacks. Identifying possible cyber-attacks, developing defence tactics, and implementing preventative measures are critical. Protecting critical infrastructures from cyber-attacks is crucial nowadays. This paper examines current attacks on critical infrastructures. Security steps are addressed to prevent Internet protocol-based innovations. The IoT has enabled online connectivity for almost anything. The Internet of Things (IoT) refers to networked computing devices that may send data without human input. In contrast, the Internet is valuable; it can pose a significant cybersecurity risk to critical infrastructure.

Author Biographies

Sunmathi R, Bannari Amman Institute of Technology, Erode, Tamil Nadu, India

Under Graduate Student, Department of Information Technology

Tharun Teja G, Bannari Amman Institute of Technology, Erode, Tamil Nadu, India

Under Graduate Student, Department of Information Technology

Lakshmanaprakash S, Bannari Amman Institute of Technology, Erode, Tamil Nadu, India

Associate Professor, Department of Information Technology

Abirami A, Bannari Amman Institute of Technology, Erode, Tamil Nadu, India

Assistant Professor, Department of Information Technology

Published

2024-04-29

How to Cite

Sunmathi R, Tharun Teja G, Lakshmanaprakash S, & Abirami A. (2024). An Analysis of Verification Systems and Cybersecurity Dangers. Journal of Cyber Security in Computer System, 3(1), 23–29. https://doi.org/10.46610/JCSCS.2024.v03i01.004

Issue

Section

Articles