Cyberattacks against Internet Network Security: A Comparative Study

Main Article Content

Dalal Lateef Al-Zuabidi

Abstract

The information network of the Internet is defined as a large group of computer networks connected to each other by different means, such as satellites, cellular phones, optical fibers, or cables, with the aim of exchanging information between individuals and institutions or providing services around the world. The information network is divided into three types, the first type of which is called the Local Area Network (LAN), which is the simplest type of network, as it consists of a group of computers connected to each other wirelessly via a Wi-Fi network, or wired via a cable, and this type of the networks used in one building or several adjacent buildings belonging to one institution, and the second type is called the Medium-Area Network (MAN), and this type of network extends to a larger area than the local network, where information - of any kind - is transferred between two cities The third type is called the Wide−Area Network (WAN), which is the most significant type of network, as it connects computers - or mobile phones - not only between countries, but also between continents, knowing that in order to connect to the information network, it requires the availability of a set of communication requirements, represented by the computer, Internet service subscription, modem, and Internet browser. The information network is used today in most areas of individuals' lives, whether professional or personal, and among these uses we mention e-mail, voice telephone communication, distance learning, file transfer service, banking operations, and others. Despite the vital role that the information network (the Internet) plays in the lives of individuals, it is also not without criminal attacks that may occur on it for various reasons, including the personal motive of the information criminal, or to highlight the challenge and strength in penetrating the information network, or in order to achieve A specific result, such as disrupting the information network, limiting its efficiency, disrupting it, or obstructing it, and other criminal consequences.

Article Details

How to Cite
[1]
“Cyberattacks against Internet Network Security: A Comparative Study”, JUBH, vol. 31, no. 1, pp. 54–72, Jan. 2023, Accessed: May 03, 2025. [Online]. Available: https://www.journalofbabylon.com/index.php/JUBH/article/view/4426
Section
Articles

How to Cite

[1]
“Cyberattacks against Internet Network Security: A Comparative Study”, JUBH, vol. 31, no. 1, pp. 54–72, Jan. 2023, Accessed: May 03, 2025. [Online]. Available: https://www.journalofbabylon.com/index.php/JUBH/article/view/4426