CFP last date
20 December 2024
Reseach Article

Cyber Poison

by Jemima Treesa Thomas, Mukta Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 49
Year of Publication: 2019
Authors: Jemima Treesa Thomas, Mukta Sharma
10.5120/ijca2019918764

Jemima Treesa Thomas, Mukta Sharma . Cyber Poison. International Journal of Computer Applications. 182, 49 ( Apr 2019), 50-54. DOI=10.5120/ijca2019918764

@article{ 10.5120/ijca2019918764,
author = { Jemima Treesa Thomas, Mukta Sharma },
title = { Cyber Poison },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 182 },
number = { 49 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 50-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number49/30532-2019918764/ },
doi = { 10.5120/ijca2019918764 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:14:49.918504+05:30
%A Jemima Treesa Thomas
%A Mukta Sharma
%T Cyber Poison
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 49
%P 50-54
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The cyber-world is developing with each passing second and one needs to know how to protect themselves from cyber-attacks as they are also growing at a much faster pace. This research paper shed light on the recent cyber-threats faced by not only the individuals, corporates, governments but also by the nations globally. The paper focuses on the top attacks which have actually changed the perspective of an attack. The attacks are not just limited to disrupting the functioning of the system, deleting some files, stealing the customers’ identity or breach for monetary benefits rather it is more hazardous as these days attacks are involved in being used as a cyber-weapon. The paper also discusses about one of the most mysterious hackers that lead to the most devastating cyber-attacks in the history of the cyber-world. The authors share how the non-technical organizations are more prone for cyber-attacks and how much badly it could affect their businesses. The author felt the need to share the prevention mechanisms through which the companies can keep them and their data confidential and secure from getting exploited by such attacks.

References
  1. Baezner, M, Robin, P. 2017. Hotspot Analysis: Stuxnet. Retrieved From: https://www.researchgate.net/publication/323199431_Stuxnet
  2. Brandom, R. 2017. UK hospitals hit with massive ransomware attack. Retrieved From: https://www.theverge.com/2017/5/12/15630354/nhs-hospitals-ransomware-hack-wannacry-bitcoin
  3. Denning, D E. 2012. Stuxnet-What has changed. Retrieved From: https://res.mdpi.com/futureinternet/futureinternet-04-00672/article_deploy/futureinternet-04-00672.pdf?filename=&attachment=1/
  4. Dolly, J. 2017. Top 5 cyber security concerns for 2018. Retrieved From: https://www.csoonline.com/article/3241766/top-5-cybersecurity-concerns-for-2018.html
  5. Fruhlinger, J. 2018.What is WannaCry ransomware, how does it infect, and who was responsible? Retrieved From: https://www.csoonline.com/article/3227906/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html
  6. Greenberg, A. 2018. The Untold story of NotPetya, The devastating cyber attack in history. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
  7. Guta, M. 2018. FBI Warns of Hackers Using Remote Desktop Protocol, Is Your Business at Risk? Retrieved From: https://smallbiztrends.com/2018/10/rdp-hacking.html
  8. Inanov, A., Mamedov, O. 2017. ExPetr/Petya/NotPetya is a Wiper, Not Ransomware. Retrieved From: https://securelist.com/expetrpetyanotpetya-is-a-wiper-not-ransomware/78902/
  9. Kushner, D. 2013. The Real Story of Stuxnet. Retrieved From: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
  10. Lin, M. N.A. Cybersecurity: What Every CEO and CFO Should Know. Retrieved From: https://www.toptal.com/finance/finance-directors/cyber-security/
  11. LogRhythm Labs, The Security Intelligence Company. 2017. NotPetya Technical Analysis. Retrieved From: https://logrhythm.com/pdfs/threat-intelligence-reports/notpetya-technical-analysis-threat-intelligence-report.pdf
  12. Mason, J. 2018. 5 Cybersecurity Challenges and Trends: What to Expect in 2018. Retrieved From: https://www.globalsign.com/en-in/blog/cybersecurity-trends-and-challenges-2018/
  13. Newman, L. 2017. The Biggest Cyber Security Disaster of 2017 So Far. Retrieved From https://www.wired.com/story/2017-biggest-hacks-so-far/
  14. Palmer, D. 2018, This is how much the WannaCry ransomware attack cost the NHS. Retrieved From: https://www.zdnet.com/article/this-is-how-much-the-wannacry-ransomware-attack-cost-the-nhs
  15. Palmer, D. 2018. WannaCry ransomware crisis, one year on: Are we ready for the next global cyber attack? Retrieved From: https://www.zdnet.com/article/wannacry-ransomware-crisis-one-year-on-are-we-ready-for-the-next-global-cyber-attack/
  16. Rouse, M. 2018. WannaCry ransomware. Retrieved From: https://searchsecurity.techtarget.com/definition/WannaCry-ransomware
  17. Schneier, B. 2017.Who Are the Shadow Brokers? What is—and isn’t—known about the mysterious hackers leaking National Security Agency secrets. Retrieved From: https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778
  18. Stallings, W. 2005. Cryptography and Network Security Principles and Practices. Prentice Hall. 4th edition. /
Index Terms

Computer Science
Information Sciences

Keywords

Artificial Intelligence (AI) Supervisory Control and Data Acquisition (SCADA) Cyber-weapon