User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 15
 Downloands 1
IMPLEMENTATION OF TECHNIQUES TO AVOID CYBER ATTACKS
2023
Journal:  
The Online Journal of Distance Education and e-Learning
Author:  
Abstract:

It has been observed that there is an increase in cyber-attacks in today's world. This attack causes a lot of losses to companies and on a personal level. Several measures need to be taken care of by the user as well while developing the app or website. The practice of defending programs, systems, and networks from online threats is known as cyber security. These assaults typically aim to gain access to, alter, or destroy sensitive data, demand money from users, or obstruct regular business operations. Attacks can take many different forms. Only during the software development process, the method for preventing cyberattacks can be taken into consideration. The present study aims to focus on gathering cyber-attack-related information from software developers who are there in this domain for a long. The information gathered was related to cyber-attacks that the developers were aware of. Special techniques are needed to be considered to avoid cyber-attacks while developing any application or website. The survey focuses on gathering information about the techniques used to avoid cyberattacks, the possibility of prevention of attacks after the implementation of these techniques, the stage of the software development lifecycle in which implementation of such techniques is taken care of, and the effect of implementing these techniques on the performance of the System

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles










The Online Journal of Distance Education and e-Learning

Field :   Sosyal, Beşeri ve İdari Bilimler

Journal Type :   Uluslararası

Metrics
Article : 667
Cite : 194
2023 Impact : 0.025
The Online Journal of Distance Education and e-Learning