Loading

Cyber security Attacks: Exploiting weaknesses
Lama Alhathally1, Mohammed A. Al Zain2, Jehad Al-Amri3, Mohammed Baz4, Mehedi Masud5

1Lama Alhathally, MSc Cybersecurity, Taif University, Saudi Arabia. Bachelor degree in Computer Science.
2Mohammed A. AlZain, Associate professor, College of Computers and Information Technology at Taif University in Saudi Arabia.
3Jehad Al-Amri, Faculty of Computers and Information Technology at Taif University, Saudi Arabia.
4Mohammed Baz, Computer Engineering Department in College of Computers and Information Technology in Taif University.
5Mehedi Masud, Professor in the Department of Computer Science at the Taif University, Taif, KSA.
Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 906-913 | Volume-8 Issue-5, January 2020. | Retrieval Number: E4876018520/2020©BEIESP | DOI: 10.35940/ijrte.E4876.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Due to the technology growth throw the years, Hackers are evolution a divers and sophistication methods to attack systems security. Mostly these attacks occur to get personal benefits from harming the system physically by steeling and destroying devices that contain precious information or non-physically (logically) by alter and eavesdrop on sensitive data and more than that. This paper surveys aim to discuss the most common cyber security attacks types, what the mechanisms that used in these attacks and how to prevent the system from these threats. In particular, it concentrates on exploiting the system vulnerabilities to steal information and gain benefits from it.
Keywords: Meltdown, spectre, phishing, Ransomware.
Scope of the Article: Plant Cyber security.