inner-banner-bg

Journal of Mathematical Techniques and Computational Mathematics(JMTCM)

ISSN: 2834-7706 | DOI: 10.33140/JMTCM

Impact Factor: 1.3

Management of Vulnerabilities in Cyber Security

Abstract

Muhammad Ahmad Baballe, Aminu Yau, Sirina Farouk Ibrahim, Bello Abubakar Imam, Mustapha Aliyu Yusif, Abubakar Sadiq Muhammad, Aliyu Musa Lawan, Abdulmuhamin Muhammad

Cybercriminals frequently use phishing attempts to trick unwary individuals into disclosing their personal information. The detection of the cybersecurity (CS) state of Internet of Things (IoT) devices determines the necessity to search for and create techniques of detecting various threat types. Thanks to the unification used in the mass manufacture of IoT devices, it is simpler to make software and hardware modifications in order to prohibit some built-in protection mechanisms from the standpoint of a potential intruder. It becomes vital to offer standard ways of data analysis from both internal and external information sources in order to evaluate the level of device cybersecurity.

PDF