2. Introduction
Cybercrime, also called computer crime, the use of a Computer as an
instrument to further illegal ends, such as committing fraud, hacking,
trafficking of drugs, child, stealing identities, or violating privacy.
Cybercrime, especially through the Internet, has grown in importance
as the computer has become central to commerce, entertainment, and
government.
3. Malware Attack
What is a Malware?
Malware is the collective name for a number of
malicious software variants, including
viruses, ransomware and spyware. Shorthand for
malicious software, malware typically consists of code
developed by cyber attackers, designed to cause
extensive damage to data and systems or to gain
unauthorized access to a network. Malware is
typically delivered in the form of a link or file over
email and requires the user to click on the link or
open the file to execute the malware.
5. Results
Demands $100 in Bit coins to
Decrypt all Data. But if you send them the
$100 even then they Will not Decrypt your
Data. So be Aware while granting permissions
to some apps.
6. How to Avoid from Malware?
Follow these instruction:
Update your Operating System, Browsers and Plugins.
Remove Software(s) you don’t use.
Read Emails with an Eagle Eye.
Use Strong passwords.
Always surf on a Secure Connection URL.
Do not Open Unfamiliar Links.
7. Daniel-of-Service Attack
Mostly Known As DoS Attack
A Denial-of-Service (DoS) attack is an attack meant to shut down
a machine or network, making it inaccessible to its intended users.
DoS attacks accomplish this by flooding the target with traffic, or
sending it information that triggers a crash. In both instances, the
DoS attack deprives legitimate users (i.e. employees, members, or
account holders) of the service or resource they expected.
8. Distributed-Daniel-of-Service Attack
Known As DDoS Attack
An additional type of DoS attack is the Distributed Denial of
Service (DDoS) attack. A DDoS attack occurs when multiple
systems orchestrate a synchronized DoS attack to a single target.
The essential difference is that instead of being attacked from one
location, the target is attacked from many locations at once.
9. AWS DDoS Attack in 2020
February 2020
Amazon Web Services, the 800-pound gorilla of everything cloud
computing, was hit by a Giant DDoS attack in February 2020. This
was the most extreme recent DDoS attack ever and it targeted an
unidentified AWS customer using a technique called
Connectionless Lightweight Directory Access Protocol (CLDAP)
Reflection. This technique relies on vulnerable third-party CLDAP
servers and amplifies the amount of data sent to the victim’s IP
address by 56 to 70 times. The attack lasted for three days and
peaked at an astounding 2.3 terabytes per second.
10. How to Avoid DoS/DDos?
Follow these instructions
Buy more Bandwidth
Build Redundancy into your infrastructure
Configure your network hardware against DDoS attacks
Deploy a DDoS protection appliance