CFP last date
20 December 2024
Reseach Article

Survey on Cyber Attacks

by Roshni Bhandari, Rathod Swapnil, Tailor Vishwa, Patel Jaydip, Davara Sagar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 23
Year of Publication: 2018
Authors: Roshni Bhandari, Rathod Swapnil, Tailor Vishwa, Patel Jaydip, Davara Sagar
10.5120/ijca2018918010

Roshni Bhandari, Rathod Swapnil, Tailor Vishwa, Patel Jaydip, Davara Sagar . Survey on Cyber Attacks. International Journal of Computer Applications. 181, 23 ( Oct 2018), 30-33. DOI=10.5120/ijca2018918010

@article{ 10.5120/ijca2018918010,
author = { Roshni Bhandari, Rathod Swapnil, Tailor Vishwa, Patel Jaydip, Davara Sagar },
title = { Survey on Cyber Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 181 },
number = { 23 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number23/30027-2018918010/ },
doi = { 10.5120/ijca2018918010 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:49.898027+05:30
%A Roshni Bhandari
%A Rathod Swapnil
%A Tailor Vishwa
%A Patel Jaydip
%A Davara Sagar
%T Survey on Cyber Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 23
%P 30-33
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is not possible to make your business wider without using communication. Communication plays an important role in business. Nowadays computer system having internet makes it easy for communication at any level. There are advantages and disadvantages of any object. E-Communication may have different disadvantages. I.e. theft of data, personal information leaking, etc. The present study is an attempt to reveal the varied cyber-attack techniques adopted by cyber criminals to target the selected banks in India where spoofing, brute force attack are found positively correlated with public and private sector banks. Further, the research shows a positive correlation between Intruder Detection and cyber-attacks, i.e., online identity theft, hacking, malicious code, DOS attack and credit card/ATM frauds as well as online identity theft, DOS attack & credit card/ATM fraud are found positively correlated with System Monitoring.

References
  1. Farhat, Vince, McCarthy, Bridget & Raysman, Richard (Holland & Knight LLP), History of cyber attacks, Published by Practical Law Company on its PLC Intellectual Property and Technology web services.
  2. Energi Group, Fresh01, 2001, History of cyber attacks.
  3. Essay.ws/ History of cyber crime.
  4. Hayder Teymourlouei, 2015, awareness and Restrictionions for home user, World Academy of Science Engineering & Technology.
  5. Coburn, Aw Daffron J, Smith A, Bordeau J, Leverret E, Sweeney S, Harvey T, 2018, Cyber Risk Lookout, University of Cambridge.
  6. Joshua, Indentitytheftkiller, 2018, phishing scam
  7. Jeff Melnick, Netwrix, 2018, 10 most common cyber attacks.
  8. Megan Sullivan, Quickbooks, 2018, types of cyber attacks.
  9. Amarujala Hindi Newspaper , Malware Attack
  10. Neil Dupaul, Veracode, 2012, Common Malware Types.
  11. Checkpoint, 2018, Security Reports.
  12. Waste/awareness and Restrictionion.
  13. Abdullah Saad H. Alqahtani, Mohsin Iftikhar, Semanticsscholar, 2013, Restrictionion Tools
Index Terms

Computer Science
Information Sciences

Keywords

Identity Theft Intruder Detection Spyware.