Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
111 views23 pages

Group-F Term Paper Fall 22

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 23

Term Paper on

Introduce to Cyber Security

Couse Name: Management Information System


Couse Code: MIS9501/501 Sec: 03

Submitted To
Debdulal Roy
Course Instructor
East West University

Submitted By: - Group-F

Name ID

Md. Sabbir Rahman Joy 2021-2-95-059


Sumaya Binte Zaman 2021-3-95-076
Md. Nurnobi 2022-1-91-039
Md. Rezaul Hasan Shuva 2022-1-91-010
Md. Shah Alam 2022-1-91-007

1|Page
Table of Content
Sl. Content Page No.
1 Acknowledgement 3
3 Executive Summary 4
4 Introduction 5-6
5 About Cyber Security 7
6 Why Cyber Security Awareness 8-9
7 Common threats now a day 10-14
8 How do the threats catch us? 15-17
9 Protection from Cyber Threats 18-20
10 Summary of Bangladesh Cyber Security ACT 21-22
11 Conclusion 22
12 Reference 23

2|Page
Acknowledgement

Working on this Seminar Report on "Cyber Security" was a source of immense


knowledge to our team. We would like to express our sincere gratitude to our course
instructor Mr. Debdulal Roy. Srivastava for his guidance on making this report in the right
way. We acknowledge with a deep sense of gratitude and for the encouragement
received to mould this report.

3|Page
Executive Summary

Cybercrime is one of the major crimes done by computer expert. In this report, need of
cyber security is mentioned and some of the impacts of the cybercrime Cyber security is
combination of processes, technologies and practices. The objective of cyber security is
to protect program, applications, network, computer and data from attack. This need is
even more apparent as systems and applications are being distributed and accessed via
an insecure network, such as the Internet. The Internet itself has become critical for
governments, companies, financial institutions, and millions of everyday users. Networks
of computers support a multitude of activities whose loss would all but cripple these
organizations. As a consequence, cyber security issues have become national security
issues. Protecting the Internet is a difficult task. Cyber security can be obtained only
through systematic development; it cannot be achieved through hazard seat-of-the pants
methods. Applying software engineering techniques to the problem is a step in the right
direction. In this report we introduce about cyber security, why cyber security awareness,
risk in cyber space, common threats, how do the threats catch us, how to be more
protected in cyber space, what to do when things go bad, Bangladesh Cyber Security Act
and so on. Approaches to prevent, detect, and respond to cyber-attacks are also
discussed.

4|Page
Introduction
The internet was born around 1960‟s where its access was limited to few scientist,
researchers and the defense only. Internet user base have evolved expontinanlty. Initially
the computer crime was only confined to making a physical damage to the computer and
related infrastructure. Around 1980‟s the trend changed from causing the physical
damaging to computers to making a computer malfunction using a malicious code called
virus. Till then the effect was not so widespread because internet was only combined to
defense setups, large international companies and research communities. In 1996, when
internet was launched for the public, it immediately became popular among the masses
and they slowly became dependent on it to an extent that it has changed their lifestyle.
The GUIs were written so well that the user don’t have to bother how the internet was
functioning. They have to simply make few click over the hyperlinks or type the desired
information at the desired place without bothering where this data is stored and how it
is sent over the internet or whether the data can have accessed by another person who
is connected to the internet or whether the data packet sent over the internet can be
snoofed and tempered. The focus of the computer crime shifted from merely damaging
the computer or destroying or manipulating data for personal benefit to financial crime.
These computer attacks are increasing at a rapid pace. Every second around 25 computer
became victim to cyber-attack and around 800 million individuals are affected by it till
2013. It is also estimated that around $160 million are lost per year due to cyber security.
This figure is very conservative as most of the cases are never reported.

Before discussing the matter further, let us know what the Cybersecurity & Cybercrime
is?
Cybersecurity is also body of technologies, processes and practices designed to protect
and secure networks, computer systems, various programs and data from cyber-attack,
damage all these things or unauthorized access these. In a computing context, security
includes both cyber security and physical security. A major contributor to internet is that
many computer systems and software applications were

5|Page
not designed with enough attention to security. For instance, the Domain Name System
(DNS) was not designed to be completely secure. Implementing cyber security has
software, hardware and human components. Humans must implement policies such as
using strong passwords and not reveling them, software must be kept up to date with
patches that fix its vulnerabilities. Antivirus software and firewalls can help prevent
unauthorized access to private data.

Cybercrime, or computer-oriented crime, is a crime that involves a computer and a


network. The computer may have been used in the commission of a crime, or it may be
the target. Cybercrime may threaten a person, company or nation’s security and financial
health. Cybercrime also called computer crime, the use of a computer as an instrument
to further illegal ends, such as committing fraud, trafficking in child pornography and
intellectual property, stealing identities, or violating privacy. Cybercrime, especially
through the Internet, has grown in importance as the computer has become central to
commerce, entertainment, and government.

6|Page
About Cyber Security
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks. It's also known as information
technology security or electronic information security. The term applies in a variety of
contexts, from business to mobile computing, and can be divided into a few common
categories.

 Network security is the practice of securing a computer network from intruders,


whether targeted attackers or opportunistic malware.
 Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.
 Information security protects the integrity and privacy of data, both in storage and
in transit.
 Operational security includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network and
the procedures that determine how and where data may be stored or shared all
fall under this umbrella.
 Disaster recovery and business continuity define how an organization responds to
a cyber-security incident or any other event that causes the loss of operations or
data. Disaster recovery policies dictate how the organization restores its operations
and information to return to the same operating capacity as before the event.
Business continuity is the plan the organization falls back on while trying to operate
without certain resources.
 End-user education addresses the most unpredictable cyber-security factor:
people. Anyone can accidentally introduce a virus to an otherwise secure system
by failing to follow good security practices. Teaching users to delete suspicious
email attachments, not plug in unidentified USB drives, and various other
important lessons is vital for the security of any organization.

7|Page
Why Cyber Security Awareness
Cybersecurity awareness is an ongoing process of educating and training employees
about the threats that lurk in cyberspace, how to prevent such threats and what they
must do in the event of a security incident. It also helps to inculcate in them a sense of
proactive responsibility for keeping the company and its assets safe and secure. In simple
terms, cybersecurity awareness is knowing what security threats are and acting
responsibly to avoid potential risks. Cybersecurity awareness includes being aware of the
latest security threats, cybersecurity best practices, the dangers of clicking on a malicious
link or downloading an infected attachment, interacting online, disclosing sensitive
information and so on. Security awareness training programs help to enhance your
organization’s security posture and tighten its processes, thereby paving the way to
building a more resilient business. Cybersecurity awareness must be an organization-wide
initiative for it to be most effective and beneficial. Ispite having best-in-class defense
systems and measures in place, many organizations still experience security breaches.
Unfortunately, it is often human error that has been a major contributing factor behind
many data breaches. According to Verizon’s 2022 Data Breach Investigations Report,
more than 80% of breaches involved the human element, including social engineering
attacks, errors and misuse of stolen credentials. Threat actors look to exploit this
weakness to infiltrate an organization’s networks and systems. This is where
cybersecurity awareness comes in.

Cybersecurity awareness helps educate your employees about malicious methods used
by cybercriminals, how they can be easy targets, how to spot potential threats and what
they can do to avoid falling victim to these insidious threats. It empowers your workforce
with the right knowledge and resources to identify and flag potential threats before they
cause any damage.

Ignoring or not conducting Cybersecurity awareness training regularly can have serious
consequences on your business such as legal penalties, financial loss and cost of
remediation, loss of intellectual property, damaged company reputation, loss of customer

8|Page
trust and so on. After all, your company’s Cybersecurity strategy is only as strong as your
weakest link — your employees.

There are also many awareness here given below:

 A staff well-known in Cybersecurity poses less risk of overall security of a company.


 It prevents security breaches and attacks.
 It builds a culture of Cybersecurity.
 It makes technological defenses more robust.
 Risk in Cyber Space
 Personal reputation damage
 Reputation capitalization
 Financial loss
 Blackmail
 Being victim of others crime
 PC/Laptop slowness, slow internet
 Workplace security hamper

9|Page
Common threats now a day
There is a common misconception that small businesses are rarely a target for hackers
because of their smaller size and lack of valuable data. However, any information stored
on your systems might be interesting to criminals. Here are the current top five cyber
threats that you should be aware of.

1. Backdoors:

A backdoor is any route by which someone can circumvent normal security measures to
access a system. Pieces of software often come with backdoors built into their code so
that engineers and developers can bypass their own defenses to fix problems for their
users.

Backdoor attacks involve cybercriminals using these entry points to gain unauthorized
access to data and systems. These incidents often go undetected, at least at first, because
the hackers didn’t have to disrupt or brute force their way through any of the
cybersecurity systems.

Backdoor attacks can be extremely dangerous because they often involve hackers gaining
an extremely high level of access and privileges within a system or network. If they can
do this without being detected, they can then squat there for months, monitoring user
activity. Here are just some of the dangers posed by backdoor attacks.

 Massive data theft. If the backdoor attack has been successful, the hacker can
ransack databases and steal private information.
 Spear phishing attacks. Hackers could use backdoors to access email accounts or
other internal messaging systems within an organization and then send targeted
phishing emails to the contacts of the compromised account. This may allow them
to spread malware or backdoor trojans to other accounts.

Cyber espionage. Backdoor attacks are the preferred strategy for cyber spies working on
behalf of rival nation states. Unlike other forms of spying, these attacks don’t require

10 | P a g e
physical access, so a successful backdoor hacker can spy on an enemy government from
the other side of the world.

 Cyber Wareface While some hackers might just steal sensitive information, others
could do a lot worse. Backdoor intrusions can allow state-backed hackers or even
lone-wolf terrorists to carry out acts of cyber warfare. Power grids, water filtration
plants, missile systems, and other important infrastructure essential for health and
safety are all potentially vulnerable to backdoor attacks, and disruption in these
areas could be catastrophic.

2. Ransomware:

This is a form of malware (malicious software) that attempts to encrypt (scramble) your
data and then extort a ransom to release an unlock code. Most ransomware is delivered
via malicious emails. Follow these key steps to protect your company.

 Staff awareness: staff should be wary of unsolicited emails, particularly those that
ask for a prompt response.
 Malware protection: install and maintain good anti-virus and malware protection
software.
 Software updates: keep your applications up to date.
 Data backups: a series of well managed data backups will allow you to recover
from an unencrypted version of a file. Make sure you regularly test your backups.

3. Financial Loss:

By financial loss, we mean increased costs or reduced income caused by the threat. We
collect data from various datasets and information from sources. After collecting data, we
analyze the data and create a different chart to identify the growth of cyber-attacks,
cyber security, and cybercrime costs.

4. Identity Loss/Theft:

Online identity theft is the theft of personal information in order to commit fraud. This
can happen through your email account bu0t can also be a result of online purchases or

11 | P a g e
other situations where you give out sensitive information such as your credit card
information.

A related concern is identity spoofing, in which the victim is impersonated on social


networking sites such as Instagram or Twitter. Identity spoofing may also involve
spoofing someone’s Internet Protocol (IP) address (the unique number associated to your
computer as you surf the internet). The purpose of identity spoofing on social networking
sites can range from a simple prank to more serious attacks aimed at shaming or hurting
someone’s social networks. Internet Protocol spoofing is used by hackers to cover their
tracks or to gain access to places normally closed to them.

Risks relating to online shopping can include overspending or receiving items that do not
match their description once you have already paid for them (or not receiving any item
at all). Scammers sometimes offer deals that are too good to be true, selling things that
are counterfeit, stolen, damaged or that just don’t exist. Even a lot of legitimate online
shopping sites have hidden costs that make what you’re buying more expensive than you
thought it would be, like shipping and duty charges.

5. Scams:

Auction fraud

Online auction fraud is common and one of the most complained-about online issues
today. You can run into several different scams when shopping online. While making
purchases on an online auction site such as eBay, for example, you could end up paying
for stolen or counterfeit goods, or for goods that never arrive at all. In addition to this,
sellers can place false bids on their own goods to drive their prices up or could include
disproportionately large or hidden shipping and handling fees

Email/IM phishing scam

The main goal of these scams is to obtain personally identifiable information or to get
access to credit cards or bank accounts. Phishing (mentioned above) is when someone
attempts to lure you into compromising your password information through emails

12 | P a g e
(usually claiming to be from a bank) and Web pages that appear to be legitimate but are
not the realthing.

6. Scareware

Scareware is the term used to refer to online “pop-up” alerts which claim to have detected
a virus or other problem on your computer. These often claim to be from internet security
companies or from law enforcement agencies. Clicking on one of these can have a variety
of negative effects, from downloading malware onto your computer to exposing your
personal information. In some cases, clicking on a scareware pop-up will simply freeze
your computer, after which the scammers will try to extort money from you in exchange
for unlocking it

7. 419 Scam

This scam, also known as the advance fee scam, starts with an email from someone who
claims to need your help moving money out of another country. The catch is that you
must provide some money up front, supposedly to cover a transfer fee, with the promise
of receiving a small fortune when the task is complete. Victims of this fraud typically lose
thousands of dollars

8. Chain letter scams

Chain letter scams involve sending an email to a large list of contacts which prompts
them to forward it to their own contacts and so on. In the email, you are asked to send
a small amount of money to a certain number of contacts and to add your name to the
contact list. This supposedly guarantees that in the end a large amount of money will
come back your way. The problem with this is that it is a modern-day version of a pyramid
scheme: only the original senders ever make any money. Chain letter scams of this nature
are illegal in most countries, including Canada and the U.S.

13 | P a g e
9. Malware:

Malware (short for “malicious software”) is a file or code, typically delivered over a
network, that infects, explores, steals or conducts virtually any behavior an attacker
wants. And because malware comes in so many variants, there are numerous methods
to infect computer systems. Though varied in type and capabilities, malware usually has
one of the following objectives:

 Provide remote control for an attacker to use an infected machine.


 Send spam from the infected machine to unsuspecting targets.
 Investigate the infected user’s local network.
 Steal sensitive data.

10. Adware:

Adware refers to a type of malware hat displays unwanted advertisements on your


computer or device. Adware is commonly activated unknowingly when users are trying
to install legitimate applications that adware is bundled with.

While sometimes, adware can be safe, some pop-up windows intend to not only display
advertisements but also collect data and information in order to target you with
customized adverts. In these cases, adware can direct you to malicious websites and
infected pages through various advert links, putting you at risk of computer viruses.

Adware commonly takes the form of irritating pop-up windows and banners; however, it
can act in many different ways:

 Acting similarly to spyware, some types of adware track your movement and
activities online in order to tailor specific adverts to you.
 Operating as a middle man, adware can redirect your activities through them in
order to share adverts with you.
 Adware uses up your data, with every pop-up download eating away at your
allowance.

14 | P a g e
How do the threats catch us?
Cyber threats are a big deal. Cyber-attacks can cause electrical blackouts, failure of
military equipment, and breaches of national security secrets. They can result in the theft
of valuable, sensitive data like medical records. They can disrupt phone and computer
networks or paralyze systems, making data unavailable. It’s not an exaggeration to say
that cyber threats may affect the functioning of life as we know it.

1. Malicious Link:

A malicious URL is one that was created with the intent to distribute malware like
ransomware. They are often contained within spam, phishing, and spear phishing emails.
Often, they are disguised by URL shortener such as Bit.ly or a modified hyperlink.

2. Email attachment:

A fake attachment is an image embedded in an email that looks like the attached file icon
used in a common mail client like Microsoft Outlook.

3. Fake Facebook page:

A fake profile is a profile where someone is pretending to be something or someone that


doesn't exist. Fake profiles can include profiles for fake or made-up people, pets,
celebrities or organizations.

4. Public Wi-Fi:

In a recent survey, 70% of tablet owners and 53% of smartphone/ mobile phone owners
stated that they use public Wi-Fi hotshots. However, because data sent through public
Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the
security of their personal information, digital identity, and money. Furthermore, if their
device or computer is not protected by an effective security and anti-malware product,
the risks are even greater.

Adult and gambling websites:

15 | P a g e
Online gambling is any kind of gambling conducted on the internet. This includes virtual
poker, casinos and sports betting. People between the ages of 18-24 are at a high risk of
developing gambling problems. At this age, the brain is still developing, and emotion and
logic aren’t fully formed. This means that decision-making ability hasn’t yet matured,
making young adults more likely to take risks or act impulsively.

5. Curiosity on dark web:

There are also many technological threats on the dark web. Malicious software, also
known as malware, is a critical concern and can affect unsuspecting users. Even simply
browsing the dark web out of curiosity can expose you to such threats, like phishing
malware or key-loggers. While an endpoint security program can identify such threats if
they end up on your computer, it’s ideal to avoid them altogether.

Further, if you try to buy something on the dark web — even if it’s not illegal — there’s a
chance you’ll be scammed. Dark web criminals use a variety of tricks to con people. For
example, they may hold money in escrow but then shut down the e-commerce website
and take off with the money. Due to the anonymous nature of the dark web, it’s very
difficult for law enforcement to find such perpetrators.

6. Scam calls and emails:

Cyber criminals may contact you via email, text, phone call or via social media. They will
often pretend to be someone (or an organization) you trust. It used to be easier to spot
scams. They might contain bad spelling or grammar, come from an unusual email
address, or feature imagery or design that feels ‘off’. But scams are getting smarter and
some even fool the experts.

7. Applications from unauthorized websites:

Application from unauthorized websites can be harmful and people get hacked or became
treated from this application.

Gaming websites and smartphone games

16 | P a g e
Malware and viruses. If you try to find cheaper or free versions of your favorite games,
then you risk inadvertently downloading viruses and malware.

We highlight five security issues mobile game developers need to know about and how
app hardening can help prevent them.

 Cheating
 In-app Purchase Bypass and Piracy.
 Ads Patching.
 Bots.
 Player Privacy

8. Social media reconnaissance:

Attackers often use social media accounts during the reconnaissance phase of a social
engineering or phishing attack. Social media can give attackers a platform to impersonate
trusted people and brands or the information they need carry out additional attacks,
including social engineering and phishing.

17 | P a g e
Protection from Cyber Threats

1. Train your staff:

One of the most common ways cyber criminals get access to your data is through your
employees. They’ll send fraudulent emails impersonating someone in your organisation
and will either ask for personal details or for access to certain files. Links often seem
legitimate to an untrained eye and it’s easy to fall into the trap. This is why employee
awareness is vital.

One of the most efficient ways to protect against cyber-attacks and all types of data
breaches is to train your employees on cyber-attack prevention and inform them of
current cyber-attacks.

They need to:

 Check links before clicking them


 Check email addresses from the received email (have a look here on how
to check it)
 Use common sense before sending sensitive information. If a request seems
odd, it probably is. It’s better to

check via a phone call with the person in question before actioning the “request”

Leaf can provide bespoke cyber awareness training for organizations of all sizes. Contact
us to find out more.

2. Keep your software and systems fully up to date:

Often cyber-attacks happen because your systems or software aren’t fully up to date,
leaving weaknesses. So cyber criminals exploit these weaknesses to gain access to your
network. Once they are in – it’s often too late to take preventative action.

To counteract this, it’s smart to invest in a patch management system that will manage
all software and system updates, keeping your system resilient and up to date.

Leaf offer patch management as part of their managed security solution.

18 | P a g e
3. Ensure Endpoint Protection:

Endpoint protection protects networks that are remotely bridged to devices. Mobile
devices, tablets and laptops that are connected to corporate networks give access paths
to security threats. These paths need protected with specific endpoint protection
software.

4. Install a Firewall:

There are so many different types of sophisticated data breaches and new ones surface
every day and even make comebacks

Putting your network behind a firewall is one of the most effective ways to defend yourself
from any cyber-attack. A firewall system will block any brute force attacks made on your
network and/or systems before it can do any damage, something we can help you with.

5. Backup your data:

In the event of a disaster (often a cyber-attack) you must have your data backed up to
avoid serious downtime, loss of data and serious financial loss.

6. Control access to your systems:

Believe it or not, one of the attacks that you can receive on your systems can be physical,
having control over who can access your network is really really important. Somebody
can simply walk into your office or enterprise and plug in a USB key containing infected
files into one of your computers allowing them access to your entire network or infect it.

It’s essential to control who has access to your computers. Having a perimeter security
system installed is a very good way to stop cybercrime as much as break ins!

7. Wifi Security.

Who doesn’t have a wifi enabled device in 2020? And that’s exactly the danger, any device
can get infected by connecting to a network, if this infected device then connects to your
business network your entire system is at serious risk.

19 | P a g e
Securing your wifi networks and hiding them is one of the safest things you can do for
you systems. With wireless technology developing more and more everyday there’s
thousands of devices that can connect to your network and compromise you.

8. Employee personal accounts:

Every employee needs their own login for every application and program. Several users
connecting under the same credentials can put your business at risk. Having separate
logins for each staff member will help you reduce the number of attack fronts. Users only
log in once each day and will only use their own set of logins. Greater security isn’t the
only benefit, you’ll also get improved usability.

9. Access Management:

One of the risks as a business owner and having employees, is them installing software
on business owned devices that could compromise your systems.

Having managed admin rights and blocking your staff installing or even accessing certain
data on your network is beneficial to your security. It’s your business, protect it!

10. Passwords:

Having the same password setup for everything can be dangerous. Once a hacker figures
out your password, they now have access to everything in your system and any
application you use.

Having different passwords setup for every application you use is a real benefit to your
security, and changing them often will maintain a high level of protection against external
and internal threats.

20 | P a g e
Summary of Bangladesh Cyber Security ACT

SL Summary of Offences Punishments

Making any kind of propaganda or campaign


against liberation war, spirit of liberation 10 years jail, or Taka 1 Crore of Fine or
1
war, father of the nation, national anthem Both
or national flag.

Publication, broadcast, etc. of information in


2 website or in any electronic format that 5 years jail, or Taka 10 Lac of Fine or Both
hurts the religious values or sentiment.

Transmission, publication, etc. of offensive,


3 3 years jail, or Taka 3 Lac of Fine or Both
false or threatening data-information.

Publication, transmission, etc. of defamatory


4 3 years jail, or Taka 5 Lac of Fine or Both
information.

Illegal access to computer, digital device,


5 6 months jail, or Taka 2 lac of Fine or Both
computer system, etc.

Digital or electronic forgery, Identity fraud


6 5 years jail, or Taka 5 Lac of Fine or Both
or personation.

Unauthorized collection, use etc. of identity 5 years’ jail, or Taka 5 Lac of Fine or Both
7
information

Holding, transferring data-information


8 5 years jail, or Taka 10 Lac of Fine or Both
illegally, etc.

9 E-transaction without legal authority. 5 years jail, or Taka 5 Lac of Fine or Both

10 Deteriorating law and order, etc. 5 years jail, or Taka 5 Lac of Fine or Both

11 Breaching secrecy of the Government. 14 years jail, or Taka 25 Lac of Fine or Both

21 | P a g e
14 years jail, or Taka 1 Crore of Fine or
12 Committing Hacking or Cyber Terrorism.
Both

Conclusion

Any intelligence device that can pass data to one or more other devices (either through

a network or not) is encompassed within the scope of cyber security that include pretty

much the entire foundation of modern society. All need to be aware of cyber security as

well as cybercrimes and its little seriousness about security regarding online, social and

other activities through which probability of risk is higher. It causes loss of data, modifying

data removing useful information as personal details, passwords of mail accounts or bank

accounts. People may also know about laws against cybercrimes or cyber laws and action

which will be taken and how to fight against crimes.

22 | P a g e
Reference

1 Richard Stiennon, Chief Research Analyst, IT-Harvest,

National Fintech Cybersecurity Summit 2016

2 Internet Users by Country 2016, Internet Life Stats, July 2016

www.internetlivestats.com/internet-users-by-country

3 ‘Cybersecurity Market… Expected To Reach $170 Billion By 2020’, Forbes, Dec 2015

www.forbes.com/sites/stevemorgan/2015/12/20/cybersecurity%E2%80%8B-

%E2%80%8Bmarket-reaches-75-billion-in-2015%E2%80%8B%E2%80%8B-

%E2%80%8Bexpected-to-reach-170-billion-by-2020

4 ‘One in two users click on links from unknown senders’, Fau.eu, August 2016

www.fau.eu/2016/08/25/news/research/one-in-two-users-click-on-links-

from-unknown-senders

5 ‘Biggest cybersecurity threats in 2016’, CNBC, Dec 2015

www.cnbc.com/2015/12/28/biggest-cybersecurity-threats-in-2016.html

6 ‘Hackers remotely kill a jeep on the highway’, Wired, July 2015

www.wired.com/2015/07/hackers-remotely-kill-jeep-highway

7 ‘Hackers can send fatal dose to hospital drug pumps’, Wired, June 2015

www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps

8 ‘Hackers can hijack Wi-Fi Hello Barbie to spy on your children’, The Guardian, November 2015

www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-

barbie-to-spy-on-your-children

9 Simi Bajaj, ‘Cyber Fraud: A Digital Crime’,

www.academia.edu/8353884/cyber_fraud_a_digital_crime

23 | P a g e

You might also like