Internet vulnerabilities

Description

Guidelines:

• Introduction that states the problem statement.
• Brief background information on the nature of the problem and how it is addressed.
• List the impacts that the problem can bring in both technical and economic terms.
• Ways (Both in managerial or technical means) or proposed solution to the problem.
• Conclusion: summary of your study and recommendations
• References

use https://ieeexplore.ieee.org/ for the references if possible.