Cyber Crime and Cyber Terrorism


METHODS: PHISHING AND DDoS



Download 5,67 Mb.
Pdf ko'rish
bet114/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   110   111   112   113   114   115   116   117   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

METHODS: PHISHING AND DDoS
The media report on two main methods that the SEA makes use of: Phishing and 
DDoS attacks.
Phishing can involve sending out large numbers of e-mails, which contain a mes-
sage that appears to originate from a legitimate source (i.e., a well-known company 
such as PayPal or Twitter). The aim of the e-mail is to convince the potential victim 
to provide their personal details. Some e-mails can direct readers to an external hoax 
website, which is made to look authentic. The website can also encourage the victim 
to provide their confidential information (bank account details, identifying details, 
social security numbers, passwords, etc.)—which can then be used by the Phisher 
to commit an array of subsequent fraudulent acts. Some more complicated phishing 
campaigns can include harmful malware in the email itself, or on the hoax web-
site—which can directly extract the information it needs from the target's computer, 
without requiring the victim to provide the confidential information directly (see 
Chapter 12 for more detail about Phishing).
DDoS (Distributed Denial of Service) or a denial-of-service (DoS) usually in-
volves a system being overwhelmed by simultaneous online requests. This can result 
in the service becoming unavailable to its users. Distributed denial of service attacks 
are sent by two or more people or bots whereas denial of service attacks are sent by 
one system or person (see Chapter 17 for further information).
WHO HAVE THEY HACKED TO DATE?
The following information is a summary of the information available from media 
sources. The SEA have infiltrated the media across the world however it is not clear 
exactly how many attacks and who have been affected. The following are a number 
of examples which have occurred in 2013 and 2014.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   110   111   112   113   114   115   116   117   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish