Professional Documents
Culture Documents
Attack Concept ”
Group Members:
Ayesha Yousuf (CR-22004)
Abdullah Khalid (CR-22027)
Maryam Khan (CR-22021)
Sheheryar Amir (CR-22008)
Contents :
• Introduction
• Problem Statement
• Literature Review
• Research Methodology
• Results Based Findings
• Recommendations
• Conclusion
Introduction:
What Is A Cyber Attack?
A cyber attack is a deliberate attempt to compromise computer
systems, networks, or devices with the intent of stealing, or
destroying data.
1. Phishing:
- Definition: Tricking victims into revealing sensitive information via text, phone, or email.
- Example: Cybercriminals impersonate authorized representatives to obtain data like
passwords and credit card numbers, leading to identity theft or financial losses.
2. Malware:
- Definition: Malicious software designed to harm networks or exploit devices for data
extraction.
- Example: Viruses, worms, Trojan horses, ransomware, and spyware are forms of
malware. Precautions include using antivirus software and being cautious with email
attachments.
4. Social Engineering:
Objective:
- Understand the current state of cybercrime globally.
Methodology:
- Examine international literature on legal aspects.
- Analyze major cybercrime events from the previous year.
Focus:
- Study global cyber-attacks, their operations, and potential
impacts on individuals and companies.
- Concentrate on attacks identified and monitored over the past
three years.
Data Sources:
- Limited information from businesses, so reliance on
- News reports.
- Attack histories.
- Reports and surveys by global security consulting and anti-
malware services.
Results:
- Key Findings:
- The study shows how different types of cyber-attacks target specific industries.
- Cyber espionage mainly focuses on government, media, and law enforcement, while cybercrime affects all business
sectors.
- Unauthorized access is shifting from physical to logical, and internal factors play a role in these attacks.
- Mobile attacks are increasing due to widespread smartphone use, posing risks with stored personal information.
- The results highlight changing trends in cyber threats.
6. Individual Logins:
- Have separate logins for each employee to reduce the chance of attacks.
7. Strong Passwords:
- Use a variety of strong, changing passwords for better security.
Conclusion:
- **Significant Challenge:**
Dealing with Cybercrime is a Big Problem for the Whole World.
- **Global Awareness:**
-It's really important for people and companies to know about
cybercrime all around the world so that they can fight against it
effectively
- **Shared Responsibility:**
- Every individual, company, or authority must establish and
maintain personalized security.
THANK YOU!