Authors :
J. E. Peter; R. I. Nwosu
Volume/Issue :
Volume 7 - 2022, Issue 5 - May
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3bvoy2s
DOI :
https://doi.org/10.5281/zenodo.6734686
Abstract :
The invention of computing devices has
brought higher attainment in professional and personal
lives. Cybersecurity techniques is of growing importance
due to increasing reliance on devices such as computer
systems, smart phones, etc. which attempts to safeguard
the cyber environment of users or organization . Cyber
criminals aim at getting the information between a
client and a server which are mostly in plain text formats
through various means such as spreading malware
inorder to gain unauthorized access. There is a need for
users/organization to be aware of the various cyberattacks and in order to prevent such attacks. This paper
provides the various open source cybersecurity tools
inorder to mitigate the different cyber-attacks.
Keywords :
Open source, cybersecurity, cyber attack, cyber threats.
The invention of computing devices has
brought higher attainment in professional and personal
lives. Cybersecurity techniques is of growing importance
due to increasing reliance on devices such as computer
systems, smart phones, etc. which attempts to safeguard
the cyber environment of users or organization . Cyber
criminals aim at getting the information between a
client and a server which are mostly in plain text formats
through various means such as spreading malware
inorder to gain unauthorized access. There is a need for
users/organization to be aware of the various cyberattacks and in order to prevent such attacks. This paper
provides the various open source cybersecurity tools
inorder to mitigate the different cyber-attacks.
Keywords :
Open source, cybersecurity, cyber attack, cyber threats.