top of page

Profile

Join date: Feb 6, 2026

Posts (3)

May 1, 20263 min
Social Engineering
AttacksHacking humans instead of systems Article Written By: Iyithihya Prakasan Article Designed by: Iyithihya Prakasan and Natasha Gumpula What is Social Engineering? Social engineering (IBM) attacks work their way to orchestrate individuals to part with information that they are not supposed to share, install software that they are not supposed to install, open web pages that they are not supposed to visit, send money to criminals, or commit other errors that jeopardize their personal or...

6
0
Apr 9, 20263 min
Cybersecurity Requirements for Remote Operations (6G & Tele-surgery)
Protection of Patients Safety and Data Integrity in Next-Generation Medical Netw Article Written By: Iyithihya Prakasan Article Designed by: Iyithihya Prakasan and Natasha Gumpula With the technological development of remote surgery , a physician can soon remotely control robotic tools with super-speedy networks such as 6G . To ensure this works safely, then we can use good cybersecurity to ensure protection of patients, doctors and the complete system at large. Image from Pinterest The...

9
0
1
Feb 6, 20263 min
Cyber Security for Cardiac Devices
Article Written By: Iyithihya Prakasan Article Designed By: Iyithihya Prakasan & Sanvi Desai Ever wondered about the possibilities of a pacemaker being a threat? What is the purpose of a pacemaker in the human body? A pacemaker is a device that helps you regulate the timing and sequence of your heartbeat. It cannot exactly replace your heart but can help regulate your heartbeat artificially. Image from verywell health Functioning of pacemakers Once installed, the pacemaker monitors your...

70
2
8
Iyithihya Prakasan

Iyithihya Prakasan

Writer
More actions
bottom of page