Published June 30, 2021 | Version v1
Journal article Open

A Comprehensive Overview on Cybersecurity: Threats and Attacks

  • 1. Department of ISE, B.M.S. College of Engineering, VTU, Bengaluru (Karnataka), India.
  • 2. epartment, department of ISE, B.M.S. College of Engineering, VTU, Bengaluru (Karnataka), India.
  • 1. Publisher

Description

In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. With the increased use of technologies in our life, the cybercrimes have amplified. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. In 2019 around 93.6% of observed malware was polymorphic, which means it changes the code continuously to evade detection. According to FBI and internet crime complaint center 2020crime report has doubled compared to 2019. International Data Corporation predicts that global spending on cybersecurity solutions will reach $133.7 billion by 2022 as cyber threats continue to increase. Governments around the world have acknowledged to growing cyber-attacks by providing directions to organizations implementing efficient cybersecurity practices. Cybersecurity protects computer systems and networks from creating damage to hardware and software, information disclosure, theft and from the interference or misdirection of the services they provide. The need to understand different kinds of cybercrime. In order to develop necessary measures against cybercrime, we need to understand different kinds of cybercrime. Our paper gives you an overview of various types of cyber-crime like malware, phishing, zero-day exploit, Advanced Persistent Threat (APT). The study provides an overview to different preventive existing solutions proposal and methods to detect attack. A strong understanding of such attacks would benefit us to be cautious and develop effective solutions. 

Files

H92420610821.pdf

Files (255.7 kB)

Name Size Download all
md5:5ee51f528adcfbecd0e38b786c61a0dd
255.7 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2278-3075 (ISSN)

Subjects

ISSN
2278-3075
Retrieval Number
100.1/ijitee.H92420610821