Cyber Security Audit of Top Four Technologies- A Short Note

Authors

  • Scott Sawyer MIT, Sydney, Australia

Abstract

Cybersecurity and networking play a major role in todays interconnected world. The ultimate aim of this report is to discuss and provide insight into 4 areas of the cybersecurity and networking realm, from threats such as SQL Injection Attacks, through to technologies such as Load Balancing, Blockchain for the Internet of Things and Cloud Computing. As such, this report will be broken up into 4 sections to address each item individually.

Downloads

Download data is not yet available.

Downloads

Published

2022-12-12

How to Cite

Sawyer, S. (2022). Cyber Security Audit of Top Four Technologies- A Short Note. Australian Journal of Wireless Technologies, Mobility and Security, 1. Retrieved from https://ausjournal.com/index.php/j/article/view/26

Issue

Section

Articles