0% found this document useful (0 votes)
65 views7 pages

Cyberspace Mitigating Against Cyber Security Threats and Attacks IJERTV11IS110028

The document discusses cyber security threats and attacks and measures to mitigate them. It explores the status of cyber security risks and clarifies existing security measures. The study, through a survey, found that the educated community lacks cyber security awareness and knowledge. Recommendations include focusing on national re-orientation through integrating cyber ethics in school curriculum.

Uploaded by

TABAH RIZKI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views7 pages

Cyberspace Mitigating Against Cyber Security Threats and Attacks IJERTV11IS110028

The document discusses cyber security threats and attacks and measures to mitigate them. It explores the status of cyber security risks and clarifies existing security measures. The study, through a survey, found that the educated community lacks cyber security awareness and knowledge. Recommendations include focusing on national re-orientation through integrating cyber ethics in school curriculum.

Uploaded by

TABAH RIZKI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/366548433

Cyberspace: Mitigating Against Cyber Security Threats and Attacks

Article in International Journal of Engineering Research and · December 2022

CITATION READS

1 1,347

2 authors, including:

Abasiama G. Akpan
Federal University of Technology.
80 PUBLICATIONS 52 CITATIONS

SEE PROFILE

All content following this page was uploaded by Abasiama G. Akpan on 23 December 2022.

The user has requested enhancement of the downloaded file.


Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 11 Issue 11, November-2022

Cyberspace: Mitigating Against Cyber Security


Threats and Attacks
Joshua J. Tom (Ph.D) Abasiama G. Akpan (Ph.D)
(Information Security & Cryptology) (Cyber Physical Systems Group)
Department of Cyber Security, Department of Computer Science
Admirality University of Nigeria, Nigeria Evangel University, Nigeria.

Abstract:- The rapid growth of the internet has led to increase prosecute due to unsigned nature of the cyberspace. Given
in Cyber security threats and attacks that most exploit that attacks against cyber physical infrastructures are very
weaknesses in existing hardware, software, and network eye-catching, it is expected that the number and the
technologies. The desire of a novel and effective defense complexity of cyber attacks will be on the increase. Hence,
services, mechanisms and techniques have been considered as
pressing requisites for the cyberspace. This paper investigates
cyber security threats are malicious act that destroy data,
status of cyber security threats and attacks and clarifies what steal data, and disrupt digital life in general.
security measures are currently in place to minimize existential Cyber security involves defense strategies to curb cyber
security risk. This study is exploratory and uses a survey criminality in the cyberspace. It takes into consideration the
conducted with questionnaires distributed to 635 students, understanding of various attacks and defense strategies that
lecturers and ICT experts. Findings revealed that the educated protect confidentiality, integrity and availability of any
community not only lacks cyber security awareness but also digital technologies and assets [7].
knowledge of what is happening in the arena of the cyberspace. • Confidentiality: It means to prevent the disclosure of
In this research paper, we proposed several recommendations
information to unauthorized individuals or systems.
including the fact that the National Orientation Agency should
focus on the national re – orientation and awakening of the • Integrity: It is means to prevent any modification or
consciousness of the citizens particularly the youths and deletion of data in an unauthorized manner.
parents, towards raising citizens with strong moral training • Availability: It means to guarantee that the systems are
and ethical background through the integration of Cyber responsible for delivering, storing and processing
Ethics in our school curriculum. information accessible when needed and by those who need
them. In the words of Kosutic [8], Cyber security is the
Keywords: Cyber Security, Cyber Attacks, Cyber Threats, technologies, practice, actions, designed to defend networks,
Malware, Counter measures, Vulnerabilities.
computers, systems, application programs and data from an
attack, damage or unauthorized access. In Cyber Security,
I. INTRODUCTION
emerging threats are categorized as malicious attacks,
Our society, economy, and critical infrastructures have
network attacks, or network abuse. Malicious attack is any
become largely dependent on ICT solutions. The internet is
effort to exploit another digital system and infect the system
used to exchange goods and services via various e-
resources through Viruses, Trojan horses, Spywares etc.
commerce transactions. Cyber attacks become attractive and
Network attacks are intended actions meant to cause damage
devastating as the dependence on these technologies
to or disturb the flow of data of a digital system on a
increases. Thus, a secure cyberspace is important to the
network, which causes effects such as Denial of Service
health of the Nigerian economy and to the security of the
(Dos), Session Hijacking, Email Spoofing, etc.[7]. Network
global economy [1]. Cyber criminals have improved their
abuse is fundamentally an exploit to the point of interaction
tactics, techniques and procedures for exploiting the
of a network, and it could be utilized by actions such as
vulnerabilities of different web technologies, servers,
spam, phishing, pharming, etc [8]. Cyber attacks are widely
browsers, etc. to the point where these vulnerabilities have
viewed as criminal action perpetrated through the Internet
become difficult to detect and challenging to investigate and
and web by means of the Web. These exploits can be
remediate [2]. According to Symantec [2], a cyber attack is
directed against an organization’s intellectual property,
any kind of offensive act that targets cyber physical
hijacking online bank transactions, designing and circulating
infrastructures using various methods to steal, alter or
Viruses on different digital systems, hosting secret Business
destroy data or information systems. Cyber attacks become
Data on the Web and even destroying national critical
lucrative business because attacks and threats are cheaper,
network. Internet threats are the highest source of failure to
convenient and less risky [3]. As discussed by Tatum [4],
businesses and revenue loses of most organization [9].
Cyber Attack is an attempt to weaken the functioning of a
Experts consider malicious codes as the key alternative to
computerized system, or an attempt to track the online
carry out malicious intentions to breach cyber security
movements of individuals without their permission. Attacks
efforts on the net [10]. Malicious codes or Malware refers to
of this kind may be unknown to the end user or lead to total
any attacks on the system, without the knowledge of the
disruption of the network infrastructures to the extent that
legitimate user to compromise the system to the benefit of
none of the users can perform any tasks [5].
an adversary. A typical example of malicious codes includes
Cyber criminals are not limited by location and distance;
viruses, worms, Trojan horses, spyware, and bot executables
they so elusive that they are difficult to identity and
[11]. They infect digital systems in many ways;

IJERTV11IS110028 www.ijert.org 327


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 11 Issue 11, November-2022

• Propagation from infected machines B. Top 20 Countries with the highest rate of
• Tricking user to open tainted files, Cybercrime
• Alluring users to visit malware propagating Symantec [2] listed and ranked 20 countries that cause the
websites. most cyber threats and attacks. In compiling such list,
A typical example of malicious codes infection is that it may Symantec was able to put a figure on software code that
load itself onto a USB drive inserted into an infected system, interferes with a computer's normal functions, rank zombie
and then infect every other system into which that system is systems, and observe the number of websites that host
inserted. It may spread from devices and equipments that phishing sites, which are designed to trick computer users
contain embedded systems and computational logic. into disclosing personal data or banking account information
[17]. Symantec was also able to obtain data including the
II NATURE OF CRIME IN THE CYBER SPACE number of bot-infected systems which are those controlled
Cyberspace is the interdependent network of information by cybercriminals, rank countries where cyber attacks
and communication technologies. This component is a initiated and factor in a higher rate of cybercrime in
crucial entity of Nigeria’s and economy in particular, global countries that have more access to broadband connections.
economy and critical infrastructure in general. We use cyber The highest rate of cybercrime was found to be in the United
space to transmit data, exchange information, and enable e- States, which contributes to the broad range of available
commerce transactions across a number of domains or broadband connections, which are those that allow
sectors. The main targets of cybercriminals are data, uninterrupted internet connectivity [18].
network, and access [5, 13]. Cyber crimes under data crimes
consist of data interception, data modification, and data C. Top list of countries with lowest
theft. Data interception is the interception of data on malware infection rates in computers
transmission. Data modification is the change or destruction Sweden-19.88%, Finland-20.65%, Norway-21.63%, Japan-
of data on transmission [14]. Data theft is the taking or 22.24%, Belgium-22.78%, United Kingdom-23.38%,
copying of data, no matter whether it is protected by any Switzerland-23.94%, Germany-24.12%, Denmark-24.34%,
laws or not. Access crimes include unauthorized access and Netherlands-24.86% [18].
virus dissemination can be considered as an example of such D. Corporate security Concerns
attack. Unauthorized access is the hacking or destruction of Denis [19] reported top three computer security concerns.
a network of system [14]. See figure 2.
(a) Embezzlement 30% (92), (b) intrusion or breach of
A. Demography and characteristics of Cyber computer systems 22% (67), and (c) computer viruses and
Criminals denial of service attack 11% (33). These top three computer
In the study of ChiChao et al. [15], the population of security concerns reflect the thinking of 63% of the
cybercriminals is informative as well as alarming and calls organizations reporting.
for resolute effort by all to avoid an impending tragedy. The
report findings indicates that 81.1% were male; 45.5% had Number of Respondents
some senior high school; 63.1% acted independently; 23.7%
0 10 20 30 40 50 60 70 80 90 100
were currently enrolled students; and 29.1% were in the 18-
23 age bracket, which was the majority group. For those
enrolled student cybercrime suspects, the findings show that Embezzlement 92
the percentage of junior high school and senior high school Intrusion/breach
of computer systems 67
student suspects constituted 69.0% (2002), 76.1% (2003)
and 62.7% (2004) of cybercrime suspects in their respective Vandalism/sabotage
years. The high rate of cybercrimes shows that the number (electronics) 51
of currently enrolled students suspected of involvement in Computer viruses and
cybercrime is a cause for concern. The following groups of denial of service 33
people easily fall prey or perpetrate cyber-criminalities are:
• Disgruntled employees Misuse of computers
by employees 25
• Teenagers
• Political hacktivist Theft of proprietary
13
information
• Professional hackers
• Business rivals Other 11
• Ex-boy or Girl friend
• Divorced husbands or wives Fraud 10
• Political enemies Unlicensed use or coping
The victims are gullible, desperados and greedy people, of digital products
developed for resale
5
unskilled and inexperienced and perhaps unlucky people too
can fall victim [16]. Figure 2: Ranking of computer security concerns by organizations [1].

IJERTV11IS110028 www.ijert.org 328


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 11 Issue 11, November-2022

E. Malware as attack tool a real person. Example, a criminal might create a


Malware is used mainly to steal sensitive personal, financial, identity that includes a legitimate physical address
or business information and to target government or but social security number and birth date associated
corporate websites to gather information or to disrupt their with that address might not be legitimate.
operations. In any case, malware is also used against To reduce the risks, ensure that your social security
individuals to gain personal information such as social number, both physical and digital, is safe from
security numbers or credit card numbers. For example, the thieves. Shred old documents that contain personal
greater part of prevalent malware have been designed to take information.
control of user's computers for black market exploitation
such as sending email spam or monitoring user's web
browsing behaviors and displaying unsolicited Fraudster Tax Payer

advertisements [21]. Taxpayer files


legitimate return
3
IRS sends
taxpayer
notice of
with IRS duplicate 4
filling
2
IRS issues ------

III. RESEARCH METHODOLOGY fraudulent refund


to fraudster

5
1
Using a taxpayer’s personal IRS IDT Taxpayer recognizes a
information, a fraudster files
problem and alerts IRS
fraudulent return claiming a

The data for this research were mainly from secondary refund with the internal
Revenue Service (IRS)
of identity theft (IDT)
refund fraud

sources.
• Documents and Records: Thorough review of
documents on crime analysis and mapping were
done for the purpose of updating knowledge. This
is crucial as it gives directions and enhances result.
• Scholarly Articles: The internet was the major Figure 4: Synthetic identities
method used during the collection of data. This
helps greatly in providing the necessary • AI -Powered Cyber attacks: In AI – Powered
information needed in the analysis. The Cyber attacks, hackers are able to create programs
information about cyber threats and attacks were that emulate known human behaviors. This can be
gotten. The data collected, greatly enriched the use to trick people into giving up their personal or
analysis of this study. financial information.
To reduce the risk, machine learning algorithms is
IV. EMERGING CYBER SECURITY THREATS use to learn from historical data and detect errors to
AND ATTACKS enable firms to guide against such cyber threats and
attacks effectively and efficiently.
In this study, we seek to further discussions on some of the
emerging cyber threats and attacks as follows;
• Deepfakes: It occurs when artificial intelligence
technology creates fake images and sounds that Vulnerability
Discovery Exploitation
appear real. Typical examples of deepfakes include
creating a video in which words are manipulated,
making it appear as if the person said something he
DDos Data Theft
never said.
Attacks
AI-Powered
To reduce the risk, have strict verification
procedures enforced. Cyber
Original Decoder A Reconstructed Evasive
Attacks
face A
Encoder
Latent Face A Phishing
Face A Malware
Smart
Botnets

Original
face B Encoder
Latent
Face B Decoder B
Reconstructed
Face B
Figure 5: AI - Powered Cyber attacks

• Poisoning attacks: Artificial intelligence evolves.


In these attacks known as poisoning attacks,
Original
Encoder
Latent
Face A Decoder B
Reconstructed
Face B From A
cybercriminals can inject bad information into AI
face A
program. This bad information can cause the AI
system not to function appropriately. Example,
Figure 3: Deepfakes attack getting around spam detectors. To minimize the
risk, DNS servers are subject to vulnerabilities.
• Synthetic identities: They are kinds of identity Staying on top of the latest patches can safeguard
fraud in which scammers use a mix of real and against attackers looking to exploit these well-
fictitious identification to create false impression of known vulnerabilities.

IJERTV11IS110028 www.ijert.org 329


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 11 Issue 11, November-2022

To reduce the risk, strong perimeter security, such


Content router
as firewalls to prevent malware from uploaded to
your systems.

Router Router • IoT – Based Attacks: It leverages on a victim’s


use of internet – connected smart devices to slip
C l i e n t

Edge router
malware onto a network. To reduce the risk, keep
the firmware for these devices up – to – date, as
this can help resolve vulnerabilities that have been
patched by the developers.
Attacker
Client
• Denial-of-Service (DOS) and Distributed denial-
of-service(DDOS) attacks: A denial-of-service
Content router Content provider
attack overwhelms a system’s resources so that it
cannot respond to service requests. Examples are,
Figure 6: Content poisoning attacks
TCP, SYN flood attack, teardrop attack, smurf
attack, ping-of-death attack and bonets.
Disinformation in Social Media: This is the To reduce the risk, IP addresses that are identified
intentional spreading information that is inaccurate as being part of a DDoS attack are blacklisted.
and designed to persuade electorate to take certain
actions or hold specific views. Examples, social • Man-in-the-middle (MitM) Attack: A MitM
disinformation spread through social media such as attack occurs when a hacker positions itself in
Facebook, twitter, and even Whatsup App. between the communications of a client and a
To reduce the risk, minimize profile information server. Examples are session hijacking, IP
shared. Spoofing and Replay attacks.
To reduce the risk, do not allow employees to use
• Advances in quantum computers pose a threat public networks for any confidential work, or
to cryptographic systems: Quantum technology Implement virtual private networks (VPNs) to
can decipher cryptographic codes that would take secure connections from your business to online
traditional system far longer to crack if they ever applications and enable employees to securely
could. connect to your internal private network from
To reduce the risk, apply strong cryptosystems with remote locations.
encipherment and implement long key spaces.
• Phishing and Spear phishing attacks: It is the
• Autonomous Vehicle Cyberattacks: Vehicular ad methods of sending emails that appear to be from
– hoc network allows cars to be connected to the trusted sources with the goal of gaining personal
internet, the threat of vehicle-based cyber attacks information or influencing users to do something.
rises. Cybercriminals are able to access vehicles via It combines social engineering trickery.
this network to steal personal data, track the
location or driving history of these vehicles, or • Spear phishing: This is a targeted type of phishing
even disable or take over safely functions. activity where attackers’ takes the time to conduct
• To reduce the risk, a risk-based prioritized research into targets and create messages that are
identification and protection process for safety- personal and relevant. To reduce the risk, a security
critical vehicle control systems should be put in policy must be develop that includes, but not
place. limited to password expiration and complexity and
deploy a web filter to block malicious websites.
• Cloud Jacking: Is a kind of cyber attack in which
cybercriminals penetrate programs and system, • Drive-by Attack: Drive by download attacks are
stored in the cloud, and use these resources to mine common method of spreading malware. Hackers
for crypto currency. look for insecure websites and plant a malicious
To reduce the risk, restrict the IP addresses allowed script into HTTP or PHP code on one of the pages.
to access cloud applications. To reduce the risk, one additional security control
for preventing a drive-by virus infection is using
• Ransomaware attacks: The attacker infecting a different Web browsers, and only using vulnerable
victim’s systems with a piece of malware that versions of IE on the specific applications that
encrypts all of the data. The victim is then require it.
presented with an option of either paying the
ransom or loses their data. • SQL Injection attack: SQL injection has become
a common issue with database-driven websites. It
occurs when a malefactor executes a SQL query to

IJERTV11IS110028 www.ijert.org 330


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 11 Issue 11, November-2022

the data base via the input data from the client to To reduce the risk, Malware attacks can be
server SQL commands are inserted into data-plane prevented by using personal firewall and keeping
input (for example, stead of the login or password) antivirus software updated.
in order to run predefined SQL commands.
To reduce the risk, input validation, parameterized A. Security measures in place: Industry
queries, stored procedures, escaping and web security initiatives for the cyber space:
application firewall should be apply.
The followings are some of the Security
• Cross-site scripting (XSS) Attack: XSS attacks measures in Place:
use third-party web resources to run scripts in the Firewalls, Antivirus, Anti-Malware, Pass-
victims’ web browser or scriptable application. Wording, Encryption, Biometric Authentication
Specifically, the attacker injects a play load with Systems, Intrusion Detection and prevention
malicious JavaScript into a website’s database. Systems.
When victim requests a page from the websites, the
web site transmits the page, with the website B. Some Tested Palliative solutions in place:
transmits the page, with the attacker’s play load as
part of the HTML body, to the victim’s browser, If correctly installed, the following solutions can
which executes the malicious script. help to reduce cyber threats and attacks.
To reduce the risk, an effectively preventing XSS
vulnerabilities is likely to involve a combination of • Firewalls: Firewalls are hardware or software
the following measures filter input on arrival, devices that block certain network traffic
encode data on output, content security policy and according to their security policy.
using appropriate response headers. • Software solutions: Software exist to identify and
remove malware and to help manage spam email.
• Eavesdropping Attack: Eavesdropping attacks Many of them must be paid for but free versions are
occur through the interception of network traffic. also available.
By eavesdropping, an attacker can obtain • Authentication: It involves determining that a
passwords, credit card numbers and other particular user is authorized to use a particular
confidential information that a user might be computer. This can include simple mechanisms
sending over the network. such as passwords, to more complex methods using
To reduce the risk, Eavesdropping attacks can be biometric technology.
prevented by using a personal firewall, keeping • Hardware cryptography: It uses computer chips
antivirus software updated, and using a virtual with cryptographic capabilities intended to protect
private network (VPN) against arrange of security threats.
• Patches: They are programs designed by software
• Birthday Attack: Birthday attacks are made manufacturers to fix software security flaws.
against hash algorithms that are used to verify the Patched software are often installed automatically.
integrity of a message software or digital signature. This reduces end-user participation and increases
It also refers to the probability of finding two ease of use
random messages that generate the same MD when
processed by a hash function. VI. CONCLUSION
To reduce the risk, the output length of the hash Cyber crime is real! The internet is the nervous system of
function used for a signature scheme can be chosen world economy. Cybercrime is conducted remotely and
large enough so that the birthday attack becomes anonymously to take advantage of flaws in software code.
computationally infeasible, i.e. about twice as Cyber crime has created major problems and has continued
many bits as are needed to prevent an ordinary to increase at institutions of higher learning. The academia
brute-force attack. is emerging as a particularly vulnerable for internet crime.
Organizations and individuals have suffered losses at the
• Malware Attack-: Malicious software can be hands of cyber-criminals with only nine percent of such
described as unwanted software that is installed in incidents reported to the security operatives. There is need
a system without the owner’s consent. It can attach for consistent training of the Nigerian Police in Cyber Crime
itself to legitimate code and propagate itself; it can Prevention and Forensic science for cyber crime policy and
lurk in useful applications or replicate itself across control. There is urgent need to develop a single national
the internet. Examples are macro viruses, file database to gather and compile cybercrime data. The
infectors, system or boot record infectors, National Assembly should consider enacting legislations
polymorphic viruses, stealth viruses, Trojans, logic that encourages incident reporting while reducing the risks
bombs, worms, droppers, ransomware, adware, associated with reporting and provide policies that provide
spyware. stronger consequences for those found guilty of committing
cybercrimes.

IJERTV11IS110028 www.ijert.org 331


(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by : International Journal of Engineering Research & Technology (IJERT)
http://www.ijert.org ISSN: 2278-0181
Vol. 11 Issue 11, November-2022

[21] McConnel, B. W. (2001). Hearing on Cybercrime, Committee


on legal affairs and Human nights, parliamentary assembly of
REFERENCES
the Council of Europe, Paris, France: McConnelInternational.
[22] E.E. Schultz (2006). Where have the worms and viruses
[1] Akpan, A. G., Mmeah S. and Baah Barida (2018). Cybercrime gone? New trends in malware Computer. Fraud Secure (7)
and Cyber security: A painted scenario of a new type of war. (2006), pp. 4- 8
Journal of Scientific and Engineering Research, 5(10):185-197. [23] Anti-phishing group tech reports:
[2] Watkins K.F. M – Trends 2017: A View from the front lines, http://www.antiphishing.org/phishReports Archive.html
Vol. 4, Premier Outlook 2017. (Accessed August 13th, 2013)
[3] Internet security Threats Report. Symantec,
http://symantec.com/threatreprot/,last accessed: August,
2020.http://www.maawg.org/ last accessed: August, 2020.
[4] Goodman, S. E. and Lin, h. S. (2007). Toward a safer and more
secure Cyberspace.TheNational AcademicsPress.Anti-phishing
group tech
report,http://www.antiphlishing.org/phishreportsAcrhive.html,
last accessed: September, 2020.
[5] Tatum, Malcolm (2010). “What Is a Cyber-attack?”
Available on-line from: http://www.wisegeek.com/what-isa-
cyberattack.htm (Accessed 29th September, 2020).
[6] Alhaji Idi Babate, Maryam Abdullahi Musa, Aliyu Musa
Kida, Musa Kalla Saidu (2015). State of Cyber
Security: Emerging Threats Landscape. International
Journal of Advanced Research in Computer Science
& Technology (IJARCST), Vol. 3, Issue 1, pp.
113 – 119.
[7] Julian jang – Jaccard and Surya Nepal (2014). A survey of
emerging threats in Cyber security. Journal of Computer and
System Sciences. Volume 80, Issue 5, pp. 973 – 993.
[8] Whitney, S. (2004). Trend turns more purchase coverage for
cybercrime. Best’s review, 105(8): 90. Oldwick, NJ: AM. Best
Co. Inc.
[9] Kosutic, D 2007, what is Cyber security and how can ISO
271001 help? Blog. Accessed 5 September,2020
<http://blog. iso27001standard.com/2011/10/25/what-
is- cyber securityand- how-can-iso- 27001- help/#
[10] Williams, P. (2002). Organized crime and cyber crime:
implications for business. Retrieved electronically on
September, 2020.
[11] Canty, D. (2012). Digital Danger Zone: tackling cyber
security. Arabian Oil and Gas,
http://www.arabianoilandgas.com/article- 9868-
digitaldanger-zone-tackling-cyber security/ last
accessed September, 2020.
[12] Justin, M. Rao (2011).The economics of spam email metric
MAAWG report Microsoft research.Available
at:http://www.maawg.org/system/_les/news/ MAAWG 2013
[13] Ponemon, (2012) Cost of Cyber Crime Study: United
Kingdom benchmark Study of UK Organizations,
Ponemon Institute Research Report October.
[14] Australian Parliament the report of the inquiry into Cyber
Crime
http://www.aph.gov.au/house/committee/coms/cybercrime/rep
ort/full_report.pdf
[15] DHSS & TRoadmap for cyber security research, Jan.
2009 http://www.cyber.st.dhs.gov/docs/DHS -
Cybersecurity-Roadmap.pdf(Accessed: September, 2020).
[16] ChiChao Li, Wen Yuan Jen & Weiping Chang, Shihchieh
Chou (2006), Journal of Computers, Vol. 1, No.
6, Sept. 2006, Academicy Publisher, USA.
[17] Osuagwu O.E., Anyanwu E. (2003) Management of
Information Technology at Periods of
Technological Discontinuity, OIPH, Owerri, Nigeria, p.
23.
[18] Top 20 Countries found to have the most Cybercrime:
https://www.enigmasoftware.com/top-20- countries-the-
most-cybercrime/(Accessed September 10th, 2020)
[19] List of countries with lowest malware infection rates in
computers: https://www.cybersecurity-
insiders.com/list-of-countries-which-are- most-vulnerable-
to-cyber-attacks/ (Accessed September 16th, 2020)
[20] Denise Marcia Chatam (2007). The Study on Cybercrime’s
Impact in the Workplace, Campus Technology,
USA.

IJERTV11IS110028 www.ijert.org 332


(This work is licensed under a Creative Commons Attribution 4.0 International License.)

View publication stats

You might also like