SlideShare a Scribd company logo
1 of 2
Our society, economy, and critical infrastructures have become
largely dependent on computer networks and information
technology solutions. Cyber attacks become more attractive and
potentially more disastrous as our dependence on information
technology increases. According to the Symantec cybercrime
report published in April 2012, cyber attacks cost US$114
billion each year. If the time lost by companies trying to
recover from cyber attacks is counted, the total cost of cyber
attacks would reach staggering US $385 billion.
Why cyber attacks flourish? It is because cyber attacks are
cheaper, convenientand less risky than physical attacks Cyber
criminals only require a few expenses beyond a computer and an
Internet connection. They are unconstrained by geography and
distance. They are difficult to identity and prosecute due to
anonymous nature of the Internet. Given that attacks against
information technology systems are very attractive, it is
expected that the number and sophistication of cyber attacks
will keep growing. Many cybersecurity experts believe that
Deception
is the key choice of weapon to carry out malicious intends to
breach cybersecurity efforts in the cyberspace
Assignment :
Select and research one of the many types of
Deceptions
and briefly provide a description, deployment (methods)
and countermeasures.
Denial-of-service attacks
Trojan horses
Phishing
Etc.

More Related Content

Similar to Our society, economy, and critical infrastructures have become large

Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxtumainjoseph
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Harshit Verma
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 

Similar to Our society, economy, and critical infrastructures have become large (20)

CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptx
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 

More from lianaalbee2qly

GoalThe goal of this project is to produce a paper, three to f.docx
GoalThe goal of this project is to produce a paper, three to f.docxGoalThe goal of this project is to produce a paper, three to f.docx
GoalThe goal of this project is to produce a paper, three to f.docxlianaalbee2qly
 
Good morning!Hope all is well. I need urgent help with three fin.docx
Good morning!Hope all is well. I need urgent help with three fin.docxGood morning!Hope all is well. I need urgent help with three fin.docx
Good morning!Hope all is well. I need urgent help with three fin.docxlianaalbee2qly
 
Graded AssignmentMid-Unit Test, Part 2Answer the questions bel.docx
Graded AssignmentMid-Unit Test, Part 2Answer the questions bel.docxGraded AssignmentMid-Unit Test, Part 2Answer the questions bel.docx
Graded AssignmentMid-Unit Test, Part 2Answer the questions bel.docxlianaalbee2qly
 
Government homeworkUnited States VS James 20121. What brough the.docx
Government homeworkUnited States VS James 20121. What brough the.docxGovernment homeworkUnited States VS James 20121. What brough the.docx
Government homeworkUnited States VS James 20121. What brough the.docxlianaalbee2qly
 
Government Internet AccessAfter you have read the chapter Governm.docx
Government Internet AccessAfter you have read the chapter Governm.docxGovernment Internet AccessAfter you have read the chapter Governm.docx
Government Internet AccessAfter you have read the chapter Governm.docxlianaalbee2qly
 
Good morning!Hope all is well. I need assistance with an assignmen.docx
Good morning!Hope all is well. I need assistance with an assignmen.docxGood morning!Hope all is well. I need assistance with an assignmen.docx
Good morning!Hope all is well. I need assistance with an assignmen.docxlianaalbee2qly
 
Good day. I need help on finishing my worksheet (see attached docume.docx
Good day. I need help on finishing my worksheet (see attached docume.docxGood day. I need help on finishing my worksheet (see attached docume.docx
Good day. I need help on finishing my worksheet (see attached docume.docxlianaalbee2qly
 
Go to this link and read first httptechnet.microsoft.comen-usli.docx
Go to this link and read first httptechnet.microsoft.comen-usli.docxGo to this link and read first httptechnet.microsoft.comen-usli.docx
Go to this link and read first httptechnet.microsoft.comen-usli.docxlianaalbee2qly
 
Go to the VA site that has the software for thedemonstation.docx
Go to the VA site that has the software for thedemonstation.docxGo to the VA site that has the software for thedemonstation.docx
Go to the VA site that has the software for thedemonstation.docxlianaalbee2qly
 
Go to theU.S. Equal Employment Opportunity Commission website.docx
Go to theU.S. Equal Employment Opportunity Commission website.docxGo to theU.S. Equal Employment Opportunity Commission website.docx
Go to theU.S. Equal Employment Opportunity Commission website.docxlianaalbee2qly
 
Go to the following website of the Smithsonian httphumanorigins.docx
Go to the following website of the Smithsonian httphumanorigins.docxGo to the following website of the Smithsonian httphumanorigins.docx
Go to the following website of the Smithsonian httphumanorigins.docxlianaalbee2qly
 
Go to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docx
Go to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docxGo to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docx
Go to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docxlianaalbee2qly
 
Go to a public place where people interact (Starbucks, McDonalds, Ta.docx
Go to a public place where people interact (Starbucks, McDonalds, Ta.docxGo to a public place where people interact (Starbucks, McDonalds, Ta.docx
Go to a public place where people interact (Starbucks, McDonalds, Ta.docxlianaalbee2qly
 
go outside (or inside if that works) and find some animals to obse.docx
go outside (or inside if that works) and find some animals to obse.docxgo outside (or inside if that works) and find some animals to obse.docx
go outside (or inside if that works) and find some animals to obse.docxlianaalbee2qly
 
Globalization and Diversity Impact on Healthcare Organizations  Pr.docx
Globalization and Diversity Impact on Healthcare Organizations  Pr.docxGlobalization and Diversity Impact on Healthcare Organizations  Pr.docx
Globalization and Diversity Impact on Healthcare Organizations  Pr.docxlianaalbee2qly
 
Global Health AgendaWhat are some of the opportunities that are av.docx
Global Health AgendaWhat are some of the opportunities that are av.docxGlobal Health AgendaWhat are some of the opportunities that are av.docx
Global Health AgendaWhat are some of the opportunities that are av.docxlianaalbee2qly
 
Global Education and Global Citizenship video and read the article.docx
Global Education and Global Citizenship video and read the article.docxGlobal Education and Global Citizenship video and read the article.docx
Global Education and Global Citizenship video and read the article.docxlianaalbee2qly
 
Given the power of the media, discuss how you would use an opinion e.docx
Given the power of the media, discuss how you would use an opinion e.docxGiven the power of the media, discuss how you would use an opinion e.docx
Given the power of the media, discuss how you would use an opinion e.docxlianaalbee2qly
 
Global Trends for the FutureAfter reading Global Trends 2025 A.docx
Global Trends for the FutureAfter reading Global Trends 2025 A.docxGlobal Trends for the FutureAfter reading Global Trends 2025 A.docx
Global Trends for the FutureAfter reading Global Trends 2025 A.docxlianaalbee2qly
 
Global Capital MarketsRead Closing Case Industrial and Commer.docx
Global Capital MarketsRead Closing Case Industrial and Commer.docxGlobal Capital MarketsRead Closing Case Industrial and Commer.docx
Global Capital MarketsRead Closing Case Industrial and Commer.docxlianaalbee2qly
 

More from lianaalbee2qly (20)

GoalThe goal of this project is to produce a paper, three to f.docx
GoalThe goal of this project is to produce a paper, three to f.docxGoalThe goal of this project is to produce a paper, three to f.docx
GoalThe goal of this project is to produce a paper, three to f.docx
 
Good morning!Hope all is well. I need urgent help with three fin.docx
Good morning!Hope all is well. I need urgent help with three fin.docxGood morning!Hope all is well. I need urgent help with three fin.docx
Good morning!Hope all is well. I need urgent help with three fin.docx
 
Graded AssignmentMid-Unit Test, Part 2Answer the questions bel.docx
Graded AssignmentMid-Unit Test, Part 2Answer the questions bel.docxGraded AssignmentMid-Unit Test, Part 2Answer the questions bel.docx
Graded AssignmentMid-Unit Test, Part 2Answer the questions bel.docx
 
Government homeworkUnited States VS James 20121. What brough the.docx
Government homeworkUnited States VS James 20121. What brough the.docxGovernment homeworkUnited States VS James 20121. What brough the.docx
Government homeworkUnited States VS James 20121. What brough the.docx
 
Government Internet AccessAfter you have read the chapter Governm.docx
Government Internet AccessAfter you have read the chapter Governm.docxGovernment Internet AccessAfter you have read the chapter Governm.docx
Government Internet AccessAfter you have read the chapter Governm.docx
 
Good morning!Hope all is well. I need assistance with an assignmen.docx
Good morning!Hope all is well. I need assistance with an assignmen.docxGood morning!Hope all is well. I need assistance with an assignmen.docx
Good morning!Hope all is well. I need assistance with an assignmen.docx
 
Good day. I need help on finishing my worksheet (see attached docume.docx
Good day. I need help on finishing my worksheet (see attached docume.docxGood day. I need help on finishing my worksheet (see attached docume.docx
Good day. I need help on finishing my worksheet (see attached docume.docx
 
Go to this link and read first httptechnet.microsoft.comen-usli.docx
Go to this link and read first httptechnet.microsoft.comen-usli.docxGo to this link and read first httptechnet.microsoft.comen-usli.docx
Go to this link and read first httptechnet.microsoft.comen-usli.docx
 
Go to the VA site that has the software for thedemonstation.docx
Go to the VA site that has the software for thedemonstation.docxGo to the VA site that has the software for thedemonstation.docx
Go to the VA site that has the software for thedemonstation.docx
 
Go to theU.S. Equal Employment Opportunity Commission website.docx
Go to theU.S. Equal Employment Opportunity Commission website.docxGo to theU.S. Equal Employment Opportunity Commission website.docx
Go to theU.S. Equal Employment Opportunity Commission website.docx
 
Go to the following website of the Smithsonian httphumanorigins.docx
Go to the following website of the Smithsonian httphumanorigins.docxGo to the following website of the Smithsonian httphumanorigins.docx
Go to the following website of the Smithsonian httphumanorigins.docx
 
Go to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docx
Go to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docxGo to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docx
Go to EEOC.GOV. Newsroom. Access a document about a recent lawsuit i.docx
 
Go to a public place where people interact (Starbucks, McDonalds, Ta.docx
Go to a public place where people interact (Starbucks, McDonalds, Ta.docxGo to a public place where people interact (Starbucks, McDonalds, Ta.docx
Go to a public place where people interact (Starbucks, McDonalds, Ta.docx
 
go outside (or inside if that works) and find some animals to obse.docx
go outside (or inside if that works) and find some animals to obse.docxgo outside (or inside if that works) and find some animals to obse.docx
go outside (or inside if that works) and find some animals to obse.docx
 
Globalization and Diversity Impact on Healthcare Organizations  Pr.docx
Globalization and Diversity Impact on Healthcare Organizations  Pr.docxGlobalization and Diversity Impact on Healthcare Organizations  Pr.docx
Globalization and Diversity Impact on Healthcare Organizations  Pr.docx
 
Global Health AgendaWhat are some of the opportunities that are av.docx
Global Health AgendaWhat are some of the opportunities that are av.docxGlobal Health AgendaWhat are some of the opportunities that are av.docx
Global Health AgendaWhat are some of the opportunities that are av.docx
 
Global Education and Global Citizenship video and read the article.docx
Global Education and Global Citizenship video and read the article.docxGlobal Education and Global Citizenship video and read the article.docx
Global Education and Global Citizenship video and read the article.docx
 
Given the power of the media, discuss how you would use an opinion e.docx
Given the power of the media, discuss how you would use an opinion e.docxGiven the power of the media, discuss how you would use an opinion e.docx
Given the power of the media, discuss how you would use an opinion e.docx
 
Global Trends for the FutureAfter reading Global Trends 2025 A.docx
Global Trends for the FutureAfter reading Global Trends 2025 A.docxGlobal Trends for the FutureAfter reading Global Trends 2025 A.docx
Global Trends for the FutureAfter reading Global Trends 2025 A.docx
 
Global Capital MarketsRead Closing Case Industrial and Commer.docx
Global Capital MarketsRead Closing Case Industrial and Commer.docxGlobal Capital MarketsRead Closing Case Industrial and Commer.docx
Global Capital MarketsRead Closing Case Industrial and Commer.docx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Our society, economy, and critical infrastructures have become large

  • 1. Our society, economy, and critical infrastructures have become largely dependent on computer networks and information technology solutions. Cyber attacks become more attractive and potentially more disastrous as our dependence on information technology increases. According to the Symantec cybercrime report published in April 2012, cyber attacks cost US$114 billion each year. If the time lost by companies trying to recover from cyber attacks is counted, the total cost of cyber attacks would reach staggering US $385 billion. Why cyber attacks flourish? It is because cyber attacks are cheaper, convenientand less risky than physical attacks Cyber criminals only require a few expenses beyond a computer and an Internet connection. They are unconstrained by geography and distance. They are difficult to identity and prosecute due to anonymous nature of the Internet. Given that attacks against information technology systems are very attractive, it is expected that the number and sophistication of cyber attacks will keep growing. Many cybersecurity experts believe that Deception is the key choice of weapon to carry out malicious intends to breach cybersecurity efforts in the cyberspace Assignment : Select and research one of the many types of Deceptions and briefly provide a description, deployment (methods) and countermeasures. Denial-of-service attacks Trojan horses