@ 2022 | PUBLISHED BY GJR PUBLICATION, INDIA 1 Global Journal of Research in Engineering & Computer Sciences ISSN: 2583-2727 (Online) Volume 02| Issue 05 | Sept.-Oct. | 2022 Journal homepage: https://gjrpublication.com/gjrecs/ Review Article Online Attacks Types of Data Breach and Cyber-attack Prevention Methods 1* Muhammad Ahmad Baballe, 2 Adamu Hussaini, 3 Mukhtar Ibrahim Bello, 2 Usman Shuaibu Musa 1 Department of Computer Engineering Technology, School of Technology, Kano State Polytechnic, Kano, Nigeria 2 Department of Computer Science and Information Sciences, Towson University, USA 3 Department of Mathematics and Computer Science, Faculty of Science, Chulalongkorn University, Bangkok Thailand DOI: 10.5281/zenodo.7144657 Submission Date: 10 th Sept. 2022 | Published Date: 3 rd Oct. 2022 *Corresponding author: Muhammad Ahmad Baballe ORCID: 0000-0001-9441-7023 INTRODUCTION Internet applications are now essential to almost every part of our life, including education, online commerce, software services, and entertainment. As a result, a specific secure account is in charge of all of the user's important data, including their online banking account [6] . Security in the digital age and online is becoming more and more crucial. Digitalization is quickly becoming the norm in all areas of human endeavor. Science and technology trends analysis reveals a rising reliance on digital tools by people, databases in networks by businesses, digital payments by banks, and computer technology and software by nations to manage strategic weapons. Every day, organized gangs of skilled cybercriminals acquire control of the devices and computers of others, regardless of who owns them, and start a series of destructive programs against websites. ATMs, businesses, phone lines, even the presidential websites of the world's superpowers all stop working in a couple of seconds. The globe has a propensity to pay more attention to information resource management and cybersecurity. Nobody could have foreseen that the financial crisis of 2007 2008, which started with the US housing crisis, bank failures, and declining stock prices, would cause a global economic disaster (also known as the "Great Recession"); this is because it was unforeseeable [1] . The next threat to humanity was a contagious illness that was discovered in humans for the first time in December 2019 in China [2] . An outbreak of the illness led to its spread into a pandemic. The SARS-CoV-2 coronavirus was the disease's primary cause [3, 4] . The illness has had a terrible impact on both human health and the entire global economy. A sizable portion of the global population was compelled by the illness to think about the issue of distant work. Institutions of higher learning have shifted to online instruction. Every day, there are a lot of online conferences, meetings, and business gatherings. Unquestionably, this sparked a tendency toward extending the use of digital technologies. Given the aforementioned, it was impossible to predict the financial crisis and contagious diseases like "black swans" in time to establish effective countermeasures [5] . Therefore, one shouldn't rule out the possibility of devastating, global cyberattacks in the future. The social, economic, and political ramifications of the Internet ceasing, even for a day, are currently impossible to anticipate. It should be mentioned that our digital operations and personal and business computer networks need to be securely protected. Abstract Phishing attacks are a common tactic used by cybercriminals to lure unsuspecting users into providing their private information. The need to look for and develop methods of detecting different threat kinds is determined by the detection of the cybersecurity (CS) state of Internet of Things (IoT) devices. In order to prevent some built-in protective mechanisms from the perspective of a possible intruder, software and hardware modifications are made easier thanks to the unification employed in the mass production of IoT devices. It becomes necessary to provide universal techniques for assessing the degree of device cybersecurity utilizing thorough methods of data analysis from both internal and external information sources. Keywords: Cybersecurity, Cyberattacks, Internets, Cybercrime. Internet of Things.