A Comprehensive Overview on Cybersecurity: Threats and Attacks

S. Preetha, P. Lalasa, R. Pradeepa
{"title":"A Comprehensive Overview on Cybersecurity: Threats and Attacks","authors":"S. Preetha, P. Lalasa, R. Pradeepa","doi":"10.35940/ijitee.h9242.0610821","DOIUrl":null,"url":null,"abstract":"In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. With the increased use of technologies in our life, the cybercrimes have amplified. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. In 2019 around 93.6% of observed malware was polymorphic, which means it changes the code continuously to evade detection. According to FBI and internet crime complaint center 2020crime report has doubled compared to 2019. International Data Corporation predicts that global spending on cybersecurity solutions will reach $133.7 billion by 2022 as cyber threats continue to increase. Governments around the world have acknowledged to growing cyber-attacks by providing directions to organizations implementing efficient cybersecurity practices. Cybersecurity protects computer systems and networks from creating damage to hardware and software, information disclosure, theft and from the interference or misdirection of the services they provide. The need to understand different kinds of cybercrime. In order to develop necessary measures against cybercrime, we need to understand different kinds of cybercrime. Our paper gives you an overview of various types of cyber-crime like malware, phishing, zero-day exploit, Advanced Persistent Threat (APT). The study provides an overview to different preventive existing solutions proposal and methods to detect attack. A strong understanding of such attacks would benefit us to be cautious and develop effective solutions.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"76 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35940/ijitee.h9242.0610821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. With the increased use of technologies in our life, the cybercrimes have amplified. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. In 2019 around 93.6% of observed malware was polymorphic, which means it changes the code continuously to evade detection. According to FBI and internet crime complaint center 2020crime report has doubled compared to 2019. International Data Corporation predicts that global spending on cybersecurity solutions will reach $133.7 billion by 2022 as cyber threats continue to increase. Governments around the world have acknowledged to growing cyber-attacks by providing directions to organizations implementing efficient cybersecurity practices. Cybersecurity protects computer systems and networks from creating damage to hardware and software, information disclosure, theft and from the interference or misdirection of the services they provide. The need to understand different kinds of cybercrime. In order to develop necessary measures against cybercrime, we need to understand different kinds of cybercrime. Our paper gives you an overview of various types of cyber-crime like malware, phishing, zero-day exploit, Advanced Persistent Threat (APT). The study provides an overview to different preventive existing solutions proposal and methods to detect attack. A strong understanding of such attacks would benefit us to be cautious and develop effective solutions.
网络安全全面概述:威胁与攻击
在技术不断发展的世界里,我们正受到在线交易、人工智能技术和自动化流程的推动。随着我们生活中科技的使用越来越多,网络犯罪也越来越多。各种新的攻击、工具和技术已经开发出来,使攻击者能够访问更复杂和管理良好的系统,造成破坏,甚至无法追踪。关于网络犯罪的统计数据显示,截至2021年1月,谷歌已经注册了大约200万个网络钓鱼网站。2019年,观察到的恶意软件中约有93.6%是多态的,这意味着它会不断更改代码以逃避检测。根据联邦调查局和网络犯罪投诉中心的数据,2020年的犯罪报告比2019年翻了一番。国际数据公司预测,随着网络威胁的持续增加,到2022年,全球在网络安全解决方案上的支出将达到1337亿美元。世界各国政府通过向实施有效网络安全实践的组织提供指导,承认日益增长的网络攻击。网络安全保护计算机系统和网络免受对硬件和软件的破坏、信息泄露、盗窃以及它们所提供的服务的干扰或误导。需要了解不同类型的网络犯罪。为了制定针对网络犯罪的必要措施,我们需要了解不同种类的网络犯罪。我们的论文概述了各种类型的网络犯罪,如恶意软件、网络钓鱼、零日漏洞、高级持续威胁(APT)。本研究概述了现有的各种预防方案、方案和检测攻击的方法。对这种攻击的深刻理解将有利于我们谨慎行事并制定有效的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信