Professional Documents
Culture Documents
NAME
ID
SECTION NO
Table of Contents
1.Introduction......................................................................................................................................3
2.0 Discussion of Attack......................................................................................................................3
2.1 What is Phishing and spear phishing...........................................................................................4
2.2 How they Got in..........................................................................................................................4
2.3 Malware Deployed......................................................................................................................4
2.4 Covering Their Tracks.................................................................................................................5
3. Conclusion........................................................................................................................................5
4. References.........................................................................................................................................6
1.Introduction
Cybercrime basically occurs through the internet or some computer network. Most
cybercrime happened online because of the massive amounts of computers connected
together and they’re able to communicate with each other real-time, which means that any
person in any other internet connected place can connect to and communicate with the
computers in your jurisdiction. Whenever talking about cybercrime there is usually a focus on
the connection between the systems and very often the connection is global e.g Facebook is
hosted in the United States with servers all over the world and you’re connecting to those
countries in real time. So how do these computers actually talk to each other? Well, the
devices over the internet communicate with each other using tcp/ip protocol. A protocol can
basically be described as a language. Each computer using the tcp/ip needs a unique IP
address to communicate to other devices.
When a device is put online anyone in the world can connect to its Ip address, so once you
connect your computer to the internet everyone that’s also connected to the internet can
connect to your computer[ CITATION Ada19 \l 2057 ]. The device’s security setting determines
how the device responds to different connections so it’s important to check if whether if your
device is configured securely; moreover, every program that we run on the computer can
potentially open up a hole that can let connections come in and go out. Attackers can use
these holes to try to gain access inside your local network and hence take advantage of
software vulnerabilities or bad configuration and take over your internal network.
Cybercrimes can come in various forms, the majority of cybercrime is mainly financially
motivated; however, attackers may try to steal your data or information stored on your PC
example hacking into a business and stealing their business secrets or in order to blackmail
someone[ CITATION AVA19 \l 2057 ]. Police are limited by jurisdiction which makes harder to
carry out investigation as cross jurisdiction requires country to country cooperation. Email is
considered to the the top malware carrier, accoriding to Veizon nearly 46% of different frims
have received emails that ended up comntaining malware [ CITATION Ver20 \l 2057 ] not only
does it stop here but the cloud breach that typically involve an email revolve around 73%
[ CITATION Ver20 \l 2057 ].
3. Conclusion
Cyberspace security management has become significant in public safety management.
Future attacks that undermine public safety don't really come from borders, airspace, or sea,
however happen in cyberspace. Insight activities and incognito tasks will progressively be
founded on the Internet. It is significant that organizations are set up to manage this new
danger. Thusly, it is important to form a public cyberspace security policy to characterize
assignments and indicate the duties of different organizations with incorporated engineering.
Terrorists have been utilizing the Internet to execute their destructive tasks. Nations have
exceptionally evolved abilities for dispatching digital fighting. The public authority ought to
likewise observe this stressful advancement and devise a plan to stop it.
4. References
AVAST. (2019 ). What is Cybercrime and. Avast .
Bossler, A. M. (2019, November 18). Introduction: new directions in cybercrime research.
From Tandfonline :
https://www.tandfonline.com/doi/full/10.1080/0735648X.2019.1692426
Verizon. (2020). Data Breach Investigations Report. Verizon .
Vyacheslav Kopeytsev, S. P. (2021). Lazarus targets defense industry. Kaspersky .