Main Article Content


Cybersecurity and networking play a major role in todays interconnected world. The ultimate aim of this report is to discuss and provide insight into 4 areas of the cybersecurity and networking realm, from threats such as SQL Injection Attacks, through to technologies such as Load Balancing, Blockchain for the Internet of Things and Cloud Computing. As such, this report will be broken up into 4 sections to address each item individually.

Article Details

Author Biography

Scott Sawyer, MIT Sydney Australia

Scott Sawyer is currently pursuing gradute certificate in cyber secuirty at MIT Sydney Australia

How to Cite
S. Sawyer, “Cyber Security Audit of Top Four Technologies- A Short Note”, Ausjournal, vol. 1, no. 1, pp. 12-17, Dec. 2021.


[1] Imperva, "SQL (Structured query language) Injection," [Online]. Available: [Accessed 25 September 2021].
[2] S. Gatlan, "Freepik data breach: Hackers stole 8.3M records via SQL injection," BleepingComputer, 21 August 2020. [Online]. Available: [Accessed 25 September 2021].
[3] Internet Engineering Task Force, "The Internet of Things at the IETF," [Online]. Available: [Accessed 26 September 2021].
[4] N. Kshetri, "Can Blockchain Strengthen the Internet of Things?," IEEE IT Professional, vol. 19, no. 4, pp. 68-72, 2017.
[5] C. Kirill Yusov, "Different Types of Cloud Service Models," [Online]. Available: [Accessed 26 September 2021].
[6] D. Taylor, "Azure vs. AWS: What is the Difference Between AWS and Azure," 28 August 2021. [Online]. Available: [Accessed 26 September 2021].