Main Article Content
Cybersecurity and networking play a major role in todays interconnected world. The ultimate aim of this report is to discuss and provide insight into 4 areas of the cybersecurity and networking realm, from threats such as SQL Injection Attacks, through to technologies such as Load Balancing, Blockchain for the Internet of Things and Cloud Computing. As such, this report will be broken up into 4 sections to address each item individually.
© 2011-2019 Australian Journal of Wireless Technologies, Mobility and Security e-ISSN 2200-1883
 S. Gatlan, "Freepik data breach: Hackers stole 8.3M records via SQL injection," BleepingComputer, 21 August 2020. [Online]. Available: https://www.bleepingcomputer.com/news/security/freepik-data-breach-hackers-stole-83m-records-via-sql-injection/. [Accessed 25 September 2021].
 Internet Engineering Task Force, "The Internet of Things at the IETF," [Online]. Available: https://www.ietf.org/topics/iot/. [Accessed 26 September 2021].
 N. Kshetri, "Can Blockchain Strengthen the Internet of Things?," IEEE IT Professional, vol. 19, no. 4, pp. 68-72, 2017.
 C. Kirill Yusov, "Different Types of Cloud Service Models," [Online]. Available: https://jelvix.com/blog/cloud-service-models. [Accessed 26 September 2021].
 D. Taylor, "Azure vs. AWS: What is the Difference Between AWS and Azure," 28 August 2021. [Online]. Available: https://www.guru99.com/azure-vs-aws.html#3. [Accessed 26 September 2021].