SlideShare a Scribd company logo
๏‚žhe IT sector is one of the key drivers of the European economy. It has
been estimated that 60 percent of Europeans use the Internet
regularly. Additionally, 87 percent own or have access to mobile
phones. In 2009, the European broadband market was the largest in
the world. These facts demonstrate the importance of ensuring the
security and safe operation of the Internet for the well-being of the
European econ-omy. The safety and security of the Internet have been
threatened in recent years, as Internet-basedcyber attacks have
become increasingly sophisticated. In 2007, Estonia suffered a
massive cyber attack that affected the government, the banking
system, media, and other services. The attack was performed using a
variety of techniques, ranging from simple individual ping commands
and message flooding to more sophisticated distributed denial of
service(DDoS) attacks. Hackers coordinated the attack by using a
large number of compromised servers organized in a bonnet
distributed around the world
๏‚ž In the term "botnet" as used here, the "bot" is short
for robot. A single bot is a software program that
can, when surreptitiously installed on a person's
computer, execute certain specified commands.
Botnet is a network of autonomous malicious
software agent there are under the control of a bot
commander. The network is created by installing
malware that exploits the vulnerabilities of Web
servers, operating systems, or application to take
control of the infected computers.
๏‚ž The main point of the Digital Agenda of Europe is to define the
key role that information and communication technologies
will play in 2020.The initiative calls of a single, open Europe
digital market. Another goal is that broadband speed of 30Mbps
be available to all European citizen by 2020 in term of security,
the initiative is considering the implementation of measure to
protect privacy and the establishment of a well-functioning
network of CERT to prevent cybercrime and respond effectively
to cyber attacks. The European Commission has proposed a
Digital Agenda. Its main objective is to develop a digital single
market in order to generate smart, sustainable and inclusive
growth in Europe.
๏‚ž What are the obstacles hindering the Digital
Agenda?
๏‚ž fragmented digital markets;
๏‚ž lack of interoperability;
๏‚ž rising cybercrime and risk of low trust in networks;
๏‚ž lack of investment in networks;
๏‚ž insufficient research and innovation efforts;
๏‚ž lack of digital literacy and skills;
๏‚ž missed opportunities in addressing societal
challenges
๏‚ž
๏‚ž There are 3 basic parts to a cyber-attack:
๏‚ž Access: a method to get inside or gain access to a network or
system
๏‚ž Vulnerability: some part of the system that the attacker can take
advantage of or manipulate
๏‚ž Payload: the purpose of the attack, namely, what exactly is the
target and how significant will the damage
๏‚ž There are many other forms cyber-attacks may take.
๏‚ž Denial Of Service attack occurs when โ€œan attacker attempts to
prevent legitimate users from accessing information or
services.โ€ This is typically accomplished when the attacker
overloads a system with requests to view information. This
would be an example of a remote attack.
๏‚ž Spear phishing is another simple method by which an
attack may gain access to a computer system or network.
Once some information about a target is acquired, an
email is sent purporting to be from a legitimate company
asking for information such as usernames and passwords
to banking websites or network logins.
๏‚ž Backdoors, or hooks, are placed inside a computer or
network in order to create a vulnerability that can be
exploited later on.
๏‚ž And tampering with basic electronics is a simple type of
cyber-attack. It is also possible that such software or even
hardware could be installed into electronics by the original
manufacturer
๏‚ž Malware, known as Stuxnet is a shorthand term that
encompasses all types of malicious software. This
includes viruses, worms, Trojan horses, spyware, and all
other types of software that get put onto your computer
without you knowing it. Some of weaknesses of malware is
it hidden in shortcuts to executable programs (files with
extension. Ink) was executed automatically when the
content of an infected USB drive was displayed as the
malware is propagated via USB.

More Related Content

What's hot

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
ย 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
ย 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber TerrorismDeepak Pareek
ย 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
KaustubhPathak11
ย 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
Digicomp Academy AG
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Suyash Shanker
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismAbhay Vijay
ย 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
ย 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
Ganesh DNP
ย 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorismDharani Adusumalli
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismMaria Parra
ย 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
ย 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
ย 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Jim Geovedi
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismYanis Mendez
ย 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
anjalika sinha
ย 

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
ย 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
ย 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
ย 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
ย 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
ย 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
ย 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
ย 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
ย 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
ย 

Viewers also liked

Beautiful
BeautifulBeautiful
Case study 5
Case study 5Case study 5
Case study 5
khaled alsaeh
ย 
Corvias Newsletter pg1
Corvias Newsletter pg1Corvias Newsletter pg1
Corvias Newsletter pg1Kimberly Funk
ย 
Lionmusic(2)
Lionmusic(2)Lionmusic(2)
Lionmusic(2)
Alfredo Rivera
ย 
BCG_Panama_Canal_WP
BCG_Panama_Canal_WPBCG_Panama_Canal_WP
BCG_Panama_Canal_WPBrian Tonn
ย 
ะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะต
ะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะตะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะต
ะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะตvirtualtaganrog
ย 
Case study 8
Case study 8Case study 8
Case study 8
khaled alsaeh
ย 
Microemprendimiento smart atr 2
Microemprendimiento smart atr 2Microemprendimiento smart atr 2
Microemprendimiento smart atr 2
militerrero
ย 
LUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la construction
LUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la constructionLUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la construction
LUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la construction
Vanessa Hansen
ย 
Training Masa Persiapan Pensiun Waskita Karya
Training Masa Persiapan Pensiun Waskita KaryaTraining Masa Persiapan Pensiun Waskita Karya
Training Masa Persiapan Pensiun Waskita Karya
Karier Kedua
ย 
Power Point: The Anthropic Principle
 Power Point: The Anthropic Principle Power Point: The Anthropic Principle
Power Point: The Anthropic Principle
evidenceforchristianity
ย 

Viewers also liked (12)

Beautiful
BeautifulBeautiful
Beautiful
ย 
Case study 5
Case study 5Case study 5
Case study 5
ย 
Corvias Newsletter pg1
Corvias Newsletter pg1Corvias Newsletter pg1
Corvias Newsletter pg1
ย 
Lionmusic(2)
Lionmusic(2)Lionmusic(2)
Lionmusic(2)
ย 
BCG_Panama_Canal_WP
BCG_Panama_Canal_WPBCG_Panama_Canal_WP
BCG_Panama_Canal_WP
ย 
ะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะต
ะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะตะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะต
ะบั‚ะพ ะฒัะตั… ะณะปัƒะฟะตะต
ย 
Case study 8
Case study 8Case study 8
Case study 8
ย 
Microemprendimiento smart atr 2
Microemprendimiento smart atr 2Microemprendimiento smart atr 2
Microemprendimiento smart atr 2
ย 
Exercรญcio de resgate recuperaรงao paralela.
Exercรญcio de resgate   recuperaรงao paralela.Exercรญcio de resgate   recuperaรงao paralela.
Exercรญcio de resgate recuperaรงao paralela.
ย 
LUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la construction
LUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la constructionLUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la construction
LUXEMBOURG CREATIVE 2016 -2 : Le challenge crรฉatif dans la construction
ย 
Training Masa Persiapan Pensiun Waskita Karya
Training Masa Persiapan Pensiun Waskita KaryaTraining Masa Persiapan Pensiun Waskita Karya
Training Masa Persiapan Pensiun Waskita Karya
ย 
Power Point: The Anthropic Principle
 Power Point: The Anthropic Principle Power Point: The Anthropic Principle
Power Point: The Anthropic Principle
ย 

Similar to Case study 13

Presentation1
Presentation1Presentation1
Presentation1Rachel Lasotas
ย 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
Iaetsd Iaetsd
ย 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
ย 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
ย 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
ย 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
ijcsit
ย 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
AIRCC Publishing Corporation
ย 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
IJECEIAES
ย 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
ย 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
ย 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
akshayathetopper
ย 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
ssuser24dae7
ย 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
VivekanandaGN1
ย 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
Praveen362297
ย 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
ย 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
ย 
Hamza
HamzaHamza
Hamza
HamzaBaqee
ย 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
Dr. Hemant Kumar Singh
ย 
Cyber Security โ€“ Indian Perspective.pptx
Cyber Security โ€“ Indian Perspective.pptxCyber Security โ€“ Indian Perspective.pptx
Cyber Security โ€“ Indian Perspective.pptx
SharifulShishir
ย 
Internet
InternetInternet
InternetJodip
ย 

Similar to Case study 13 (20)

Presentation1
Presentation1Presentation1
Presentation1
ย 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
ย 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
ย 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
ย 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
ย 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
ย 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
ย 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
ย 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
ย 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
ย 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
ย 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
ย 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
ย 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
ย 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
ย 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ย 
Hamza
HamzaHamza
Hamza
ย 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
ย 
Cyber Security โ€“ Indian Perspective.pptx
Cyber Security โ€“ Indian Perspective.pptxCyber Security โ€“ Indian Perspective.pptx
Cyber Security โ€“ Indian Perspective.pptx
ย 
Internet
InternetInternet
Internet
ย 

More from khaled alsaeh

Case study 12
Case study 12Case study 12
Case study 12
khaled alsaeh
ย 
Case study 1
Case study 1Case study 1
Case study 1
khaled alsaeh
ย 
Case study 9
Case study 9Case study 9
Case study 9
khaled alsaeh
ย 
Case study 6
Case study 6Case study 6
Case study 6
khaled alsaeh
ย 
Case study 7
Case study 7Case study 7
Case study 7
khaled alsaeh
ย 
Case study 8
Case study 8Case study 8
Case study 8
khaled alsaeh
ย 
Case study 14
Case study 14Case study 14
Case study 14
khaled alsaeh
ย 
Case study 15
Case study 15Case study 15
Case study 15
khaled alsaeh
ย 
Case study 17
Case study 17Case study 17
Case study 17
khaled alsaeh
ย 
Case study 14
Case study 14Case study 14
Case study 14
khaled alsaeh
ย 
Case study 10
Case study 10Case study 10
Case study 10
khaled alsaeh
ย 
Case study 18
Case study 18Case study 18
Case study 18
khaled alsaeh
ย 
Case study 4
Case study 4Case study 4
Case study 4
khaled alsaeh
ย 
Case study 19
Case study 19Case study 19
Case study 19
khaled alsaeh
ย 
Case study 20
Case study 20Case study 20
Case study 20
khaled alsaeh
ย 
Case study 3
Case study 3Case study 3
Case study 3
khaled alsaeh
ย 
Case study 2
Case study 2Case study 2
Case study 2
khaled alsaeh
ย 
Case study 1
Case study 1Case study 1
Case study 1
khaled alsaeh
ย 

More from khaled alsaeh (18)

Case study 12
Case study 12Case study 12
Case study 12
ย 
Case study 1
Case study 1Case study 1
Case study 1
ย 
Case study 9
Case study 9Case study 9
Case study 9
ย 
Case study 6
Case study 6Case study 6
Case study 6
ย 
Case study 7
Case study 7Case study 7
Case study 7
ย 
Case study 8
Case study 8Case study 8
Case study 8
ย 
Case study 14
Case study 14Case study 14
Case study 14
ย 
Case study 15
Case study 15Case study 15
Case study 15
ย 
Case study 17
Case study 17Case study 17
Case study 17
ย 
Case study 14
Case study 14Case study 14
Case study 14
ย 
Case study 10
Case study 10Case study 10
Case study 10
ย 
Case study 18
Case study 18Case study 18
Case study 18
ย 
Case study 4
Case study 4Case study 4
Case study 4
ย 
Case study 19
Case study 19Case study 19
Case study 19
ย 
Case study 20
Case study 20Case study 20
Case study 20
ย 
Case study 3
Case study 3Case study 3
Case study 3
ย 
Case study 2
Case study 2Case study 2
Case study 2
ย 
Case study 1
Case study 1Case study 1
Case study 1
ย 

Recently uploaded

What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
ย 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
ย 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
ย 
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdfSearch Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
ย 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
ย 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
ย 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
ย 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
ย 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
ย 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
ย 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
ย 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
ย 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
ย 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
ย 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
ย 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
ย 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
ย 

Recently uploaded (20)

What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
ย 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
ย 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
ย 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
ย 
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdfSearch Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
Search Disrupted Googleโ€™s Leaked Documents Rock the SEO World.pdf
ย 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
ย 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
ย 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
ย 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
ย 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
ย 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
ย 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
ย 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
ย 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
ย 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
ย 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
ย 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
ย 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
ย 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
ย 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
ย 

Case study 13

  • 1.
  • 2. ๏‚žhe IT sector is one of the key drivers of the European economy. It has been estimated that 60 percent of Europeans use the Internet regularly. Additionally, 87 percent own or have access to mobile phones. In 2009, the European broadband market was the largest in the world. These facts demonstrate the importance of ensuring the security and safe operation of the Internet for the well-being of the European econ-omy. The safety and security of the Internet have been threatened in recent years, as Internet-basedcyber attacks have become increasingly sophisticated. In 2007, Estonia suffered a massive cyber attack that affected the government, the banking system, media, and other services. The attack was performed using a variety of techniques, ranging from simple individual ping commands and message flooding to more sophisticated distributed denial of service(DDoS) attacks. Hackers coordinated the attack by using a large number of compromised servers organized in a bonnet distributed around the world
  • 3. ๏‚ž In the term "botnet" as used here, the "bot" is short for robot. A single bot is a software program that can, when surreptitiously installed on a person's computer, execute certain specified commands. Botnet is a network of autonomous malicious software agent there are under the control of a bot commander. The network is created by installing malware that exploits the vulnerabilities of Web servers, operating systems, or application to take control of the infected computers.
  • 4. ๏‚ž The main point of the Digital Agenda of Europe is to define the key role that information and communication technologies will play in 2020.The initiative calls of a single, open Europe digital market. Another goal is that broadband speed of 30Mbps be available to all European citizen by 2020 in term of security, the initiative is considering the implementation of measure to protect privacy and the establishment of a well-functioning network of CERT to prevent cybercrime and respond effectively to cyber attacks. The European Commission has proposed a Digital Agenda. Its main objective is to develop a digital single market in order to generate smart, sustainable and inclusive growth in Europe.
  • 5. ๏‚ž What are the obstacles hindering the Digital Agenda? ๏‚ž fragmented digital markets; ๏‚ž lack of interoperability; ๏‚ž rising cybercrime and risk of low trust in networks; ๏‚ž lack of investment in networks; ๏‚ž insufficient research and innovation efforts; ๏‚ž lack of digital literacy and skills; ๏‚ž missed opportunities in addressing societal challenges ๏‚ž
  • 6. ๏‚ž There are 3 basic parts to a cyber-attack: ๏‚ž Access: a method to get inside or gain access to a network or system ๏‚ž Vulnerability: some part of the system that the attacker can take advantage of or manipulate ๏‚ž Payload: the purpose of the attack, namely, what exactly is the target and how significant will the damage ๏‚ž There are many other forms cyber-attacks may take. ๏‚ž Denial Of Service attack occurs when โ€œan attacker attempts to prevent legitimate users from accessing information or services.โ€ This is typically accomplished when the attacker overloads a system with requests to view information. This would be an example of a remote attack.
  • 7. ๏‚ž Spear phishing is another simple method by which an attack may gain access to a computer system or network. Once some information about a target is acquired, an email is sent purporting to be from a legitimate company asking for information such as usernames and passwords to banking websites or network logins. ๏‚ž Backdoors, or hooks, are placed inside a computer or network in order to create a vulnerability that can be exploited later on. ๏‚ž And tampering with basic electronics is a simple type of cyber-attack. It is also possible that such software or even hardware could be installed into electronics by the original manufacturer
  • 8. ๏‚ž Malware, known as Stuxnet is a shorthand term that encompasses all types of malicious software. This includes viruses, worms, Trojan horses, spyware, and all other types of software that get put onto your computer without you knowing it. Some of weaknesses of malware is it hidden in shortcuts to executable programs (files with extension. Ink) was executed automatically when the content of an infected USB drive was displayed as the malware is propagated via USB.