Ask a question from expert

Ask now

Case Study on Qatar National bank attack Assignment PDF

8 Pages1805 Words395 Views
   

Added on  2021-05-27

Case Study on Qatar National bank attack Assignment PDF

   Added on 2021-05-27

BookmarkShareRelated Documents
Running head: CYBER CRIME RESEARCHCyber crime researchName of the Student:Name of the University:Author note:
Case Study on Qatar National bank attack Assignment PDF_1
1CYBER CRIME RESEARCHTable of Contents1. Introduction:..............................................................................................................22. Cyber crime case studies:........................................................................................22.1 Case Study 1: DDOS attack 2015-.....................................................................22.2 Case Study 2: QNB Qatar National bank attack-...............................................22.3 Case Study 3: Shamoon attack-.........................................................................32.4 Case Study 4: Sharjah Bank attacked-...............................................................33. Additional measures that can be taken to prevent cyber attacks.............................44. Conclusion:...............................................................................................................45. References:..............................................................................................................5
Case Study on Qatar National bank attack Assignment PDF_2
2CYBER CRIME RESEARCH1. Introduction:In this connected world, cyber crime has gained a strong foothold. The mainpurpose of this report is to study few instances of cyber crime and to reflect on that.The essay will further evaluate number of ways a crime can happen. Finally, it willpropose few steps to mitigate the risk. Firstly, there is a need to know what cybercrime is. It is a type of criminal activity which involves networked device or acomputer. Cyber criminals in order to generate profit carry out cyber crimes andsometimes crimes are not committed only to earn but also defame and damagecorporations or individuals. 2. Cyber crime case studies:2.1 Case Study 1: DDOS attack 2015-An organization or an individual is prone to getting hacked if their networksare not secure. Changes in terms of quality and quantity can be made in a system byhacking. On hacking a bank’s own database a hacker can get access to privateinformation about customers and they may succeed in stealing money. The world’smost dangerous hacking community goes by the name “Anonymous”. In the pastthey broke into several United States websites and also the NASA website.However, this time they tried to play with the oil rich gulf countries (Arab News,2018). They used DDoS (Distributed denial of service) to hamper the bankingoperations in major banks. In such an attack servers are affected thereby disruptingonline and critical operations of the bank. Banking sectors in the UAE werefrightened by the possibility of future attacks. Additionally, it can be observed thatbanks in UAE need a proper security framework to address the challenges posed bycyber attacks. Investment in security framework is a must for mitigating risks. 2.2 Case Study 2: QNB Qatar National bank attack-Phishing is one of the common ways used by entry level hackers to stealinformation. Hackers to swiftly steal critical information without user’s knowledge useSpyware (Khonji, Iraqi & Jones, 2013). Additionally, a modern way of hacking intoone’s computer is by remotely activating certain codes that is done by infectingsomeone’s computer by a virus and then the hacker can activate the codes. This
Case Study on Qatar National bank attack Assignment PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Hacktivism: A New Form of Hacking with Political Motives
|9
|2963
|30

Hackers Without Borders: A Legal Response
|11
|2715
|251

Introduction to Cyber Security
|14
|3209
|388

Cyber Defense in Web Based Attacks Report 2022
|4
|728
|16

CYBER FRAUD. CYBER FRAUD Name of the Student Name of th
|9
|2103
|21

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491