International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Reviewer Referral Program
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 6
November-December 2024
Indexing Partners
Cyber Security - A Case Study of Comodo Security Solutions
Author(s) | ANU VARGHESE, JAGADEESHA S N |
---|---|
Country | India |
Abstract | Background/Purpose: Humans are currently heavily reliant on digital infrastructure and can easily access practically all services. All of these technological advancements have an impact on people, both positively and badly. As risks change in nature, it becomes much more difficult to overcome them. In the digital age, security is crucial. Many firms have serious cybersecurity concerns. We should practice excellent cyber hygiene, double-check our sources, and keep up with official changes if we want to maintain cybersecurity. Xcitium (previously Comodo Security), a cybersecurity-focused organization, runs many tests to improve detection rates. This business specializes in online and computer security. Objective: Design/Methodology/Approach: This paper discusses the technological improvement of Comodo Security products Findings/Results: This company undergoes much research to improve threat detection and thereby it finds its role in the cybersecurity world. They work in the principle that every single digital transaction must have a layer of trust and security. Originality/Value: Journals, annual reports, academic articles, websites, and the internet were some of the secondary sources used in this study to acquire data. Paper Type: Company Analysis Keywords: cyber security, malware, cyber hygiene, comodo solutions |
Keywords | cyber security, malware, cyber hygiene, comodo solutions |
Field | Computer > Network / Security |
Published In | Volume 5, Issue 6, November-December 2023 |
Published On | 2023-12-16 |
Cite This | Cyber Security - A Case Study of Comodo Security Solutions - ANU VARGHESE, JAGADEESHA S N - IJFMR Volume 5, Issue 6, November-December 2023. DOI 10.36948/ijfmr.2023.v05i06.10518 |
DOI | https://doi.org/10.36948/ijfmr.2023.v05i06.10518 |
Short DOI | https://doi.org/gs9k32 |
Share this
E-ISSN 2582-2160
doi
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.