Keywords:-

Keywords: Cybercriminals, Malicious links, Internet, Internet of Things, victims

Article Content:-

Abstract

Cybercriminals have become experts in using sophisticated techniques to trick victims into sharing personal or financial information. But the best way to protect ourselves remains the implementation of the rules that we are going to recommend in this article because as much as we seek to protect ourselves as much as hackers are continually seeking to develop malicious attacks that will be difficult to differentiate from real e- genuine emails and communications. Thus through this study, we wanted to inform our readers about the various attacks that are constantly gaining momentum on the global web with the innovative and growing use of the Internet of Things (IoT) and portable devices.

References:-

References

Stern, J. 2011. “The Science of the Secret”, Paris, Odile Jacob,

Atelin, P. 2014. “Modern Cryptography”, Brussels, ENI Edition,.

Salem, O. 2012. “Network protection against attacks”, Paris, 3rd Ed Eyrolles,

Anderson, R. 2018. “Security Engineering: A Guide to Building Dependable Distributed Systems”, London, 2nd Ed. Wiley ,

Martin, U. 2014, “Introduction to cybercrime”, London, Ed. Wiley.

BERRY G. 2010. Why and how is the world going digital?, Paris, Ed. Eyrolles,

Kauffer R. 2018, World History of the Secret Services , Paris, Ed Eyrolles,

Pujolle G. 2019. Security and Cryptography , Paris, 6th Ed . Eyrolles,

Lescop, Y. 2016. Computer attacks , Paris, Ed. Hermès,

Liorens, C. 2008. Network security dashboards , Paris, 2 nd Ed. Eyrolles,

https://www.cisco.com/web/FR/documents/pdfs/solutions/borderless/doc1_internet_threats.pdf , accessed on 04/13/2022 at 9:22 p.m.

https://softwarelab.org/fr/maliciel.html consulted on 03/12/2022 accessed on 04/13/2022 at 4:35 p.m.

https://summarynetworks.com/securite-des-reseaux-informatique-et-telecom/pirater-et-controler-un-telephone-portable-via-metasploit-sous-kali-linux-2020/ consulted on 04/02/ 2022 at 00:22'

Downloads

Citation Tools

How to Cite
Kabuatila, B., MUBADI BAKAJIKA, B., & NYEMBO MPAMPI, A. (2022). Malicious Links and Their Harmful Effects on Internet Users. International Journal Of Mathematics And Computer Research, 10(11), 2956-2960. https://doi.org/10.47191/ijmcr/v10i11.02