Hackers Without Borders: A Legal Response

Verified

Added on  2023/06/03

|11
|2715
|251
AI Summary
The report explains the concept of DDOS attack and its impact on the Attorney General. It highlights the need for security plans like firewall, antivirus, encryption, cryptography, robust technique and pattern recognition to prevent DDOS attacks.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Hackers without borders: a legal response
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 1
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 2
Contents
Introduction....................................................................................................................................................... 2
How common are cybercrimes................................................................................................................... 2
Overview of DDOS attack.............................................................................................................................. 2
What normally happens in DDOS cases.................................................................................................. 3
How often extradition requests made and what are happens to them......................................3
International cybercrime tribunal............................................................................................................ 4
Conclusion........................................................................................................................................................... 5
References........................................................................................................................................................... 6
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 3
Introduction
In the field of computer, system DDOS is defined as a distributed denial of service
which is a type of cyber-attack. In the last five years, the rate of DDOS in Australia and
NSW is growing very fast due to which much Australian organization lost their personal
information (Alwan, & Younis, 2017). The main objective of this report is to describe the
concept of DDOS attack and other security issues faced by the Attorney General. This is
a very serious problem in Australia because many consumers do not use any security
plans or use very simple password system which can be easily hacked by attackers. US
authorities also faced the issue of hacking and distributed denial of service attack which
is carried out by young individuals of Sydney. This report is divided into four parts for
example, how common are cybercrimes, an overview of DDOS attack, what normally
happens, how often extradition requests made, and international cybercrime tribunal
are.
Overview of DDOS attack
DDOS is a kind of cyber-crime which is the very crucial problem for Attorney
General and it is generally accomplished with the help of the flooding process. In this
type of attack, hackers produce a large number of unwanted signals and traffic and
young people of Sydney learn hacking from YouTube and other online servers after that
they attack Attorney General and other Australian organization. It is investigated that
the main issue with the Attorney General is that they use third-party application and
unauthorized servers which are developed by malware software (Hoque,
Bhattacharyya, & Kalita, 2015). It is a part of the denial of services attack that use
numbers of unique IP address to block the user's peripheral devices. Hackers first send
unwanted and spam emails to employees after that user clicks on unauthorized links
which are developed by botnet or flooding process. With the help of this technique, they
enter into consumers computer networks and block their private data or information.
DDOS attack decreases the efficiency and performance of the Attorney General by using
malicious software and a large number of traffic signals.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 4
How common are cybercrimes in nature with alleged offender in NSW
The Criminal Code Act Division 477-478 states the severe computer crimes, such
as hacking, which may be accused at central level. The Criminal Code Act states an
individual is guilty of the crime if any person causes illegal access to data of computers
or illegal alteration of data of computer. The hacking and DDOS both are very common
types of cybercrimes in Australia and NSW. Information is a very important part for
Attorney General which can be easily blocked by hackers and DDOS attack can affect the
performance of consumer’s computer systems (Bandara, et al., 2016). It is observed that
in the year 2017 the rate of DDOS attack is increased by 34% and around thousands of
computer systems are hacked by attackers. Attorney General is a very largest
organization which provides many IT services to their consumers but the main problem
faced by this organization is a data breach. In a DDOS attack first hackers collect all
relevant information about the Attorney General and after that, they developed
unauthorized signals from malware software and shares with their employees. In the
year 2018 around 1.83 Tbps traffic signals produced by DDOS attack due to which many
consumers lost their personal information like login ID and passwords. It has the
capability to block the private networks of any consumers and many hackers use
malicious and botnet process to encrypt information of the Attorney General (Haider,
Creech, Xie, & Hu, 2016).
What normally happens in DDOS cases
In DDOS attack hackers use malicious software to generate a large number of
traffic signals and they make unauthorized servers with the help of malware. The main
problem occurs with US authorities is that they use third-party applications and
consumers do not use any protection technique by which hackers attack their personal
computers. It is observed that the Attorney General use a public type of cloud-based
services that are developed by the malware software’s and the data or information of
users are controlled by the third party sellers. In this type of cases, the US authorities
can lose their private details like consumer’s data, accounts information, bank details
and credit or debit card numbers. In the year 2016, the DDOS attack block the
thousands of computer systems in the United States and it happens when the
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 5
consumers click on spams emails and fraud links. Due to this type of attacks
organizations can suffer from any financial problem and the privacy of their networks
or servers can be reduced (Modi, & Quadir, 2014).
In the famous Lauri Love case, it is required by Love to appear in hearing on
charge of cyber hacking that might mean a sentence of up to ninety-nine years in
custody. Love is supposed to have hacked into United States agencies involving the
United States army, Nasa, Federal Reserve, defence division, and the Federal Bureau of
Investigation in year 2012 and year 2013. It was the milestone judgement, the High
Court currently denied to permit the extradition of United Kingdom citizen Lauri Love
to United States for offence of cyber robbery, stimulating the forum bar for the first time
since its beginning in year 2003. The judgement delivered by the judges is extremely
critical of the situations Love would have suffered in the prison of United States,
cautioning of the threat of suicide.
The decision of court to block the repatriation of an apparent computer
hacker with Asperger disease highpoints once again the considerate quality of justice of
United States. The high court judges have spared Lauri Love the prospect of long-term
custodial sentence and the penal trial considered as one of the severest in the history. It
was argued by the lawyer that Lauri Love must be tried in Britain for apparently
hacking in the government websites of United States and that Lauri Love will be at the
risk of slaying himself if referred to the United States. Then, it is stated by Lord Chief
Justice that now an appeal is ended, it is expected that Lauri Love will be accused in the
United Kingdom (Iqbal, et al., 2016).
How often extradition requests made and what are happens to them
The DDOS attack is a part of a malware attack that has the ability to block the
computer networks of organizations. Generally, hacker target biggest business
industries and banking sectors to earn a large amount of money. This is a random
process and its dependence upon the size of data sets or networks because hackers first
identify the IP address and type of servers used by Attorney General after that they
make a botnet process to detect the account details of consumers systems. Hackers
mainly send spam emails and messages to employees and produce more traffic to
reduce the performance of computer devices (Pandey, Jain, & Pachouri, 2017). The
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 6
malicious is a type of cyber-threat that has the ability to control and monitor the private
accounts of attorney generals. The young individuals of western Sydney learn hacking
from various online communities and YouTube after that they make their own
algorithms and software to detect the IP address of user’s peripheral devices. However,
these types of cyber-attacks work by producing a system of the process with a request
for data and in which victims share a web server to make more requests that crash the
networks of US authorities. The DDOS attacks do not occur regularly and hackers only
attack biggest organizations to earn more profit and it is investigated that in the year
2017 around 1.32 TBps traffic signals were identified due to which many Australian
users lost their data or information (Soltani, et al., 2016). Information technology
developed many security programmes and plans to avoid the issue of DDOS attacks like
encryption, cryptography, pattern recognition, firewall, and antivirus. With the help of
all these techniques, the security of Attorney General Computers and devices can be
increased. In the year 2016 US authorities provide the protection methods regarding
the DDOS attack and they also improve the security systems but the main issue is that
employees use the unauthorized servers and websites to access their personal accounts.
How an international cybercrime tribunal are
To make an international cybercrime tribunal or forum it is very necessary to
understand the fundamental concept of DDOS attack. First employees identify the
impact of this attack on an organization and steps used by hackers to block the
computer networks (Somani, et al., 2017). People ensure that consumers use only
authentic servers because most of applications and software are developed by the
malicious system. The government of Australian can provide international authority for
cybercrimes and they can produce security programmes to avoid the problem of DDOS
attack. There are main three processes by which the traffic signals and malware can be
identified such as firewall software, robust technology, and cryptography. All these are
advanced techniques which can be adopted by international cybercrime tribunal
because hackers send spam emails if people block all these fraud emails then they can
reduce the cyber-attack by 20%. The US authorities ensure that their computer
software and applications are updated and if any unwanted signals are observed on the
website then communicate with cybercrime tribunals or authorities to address these
kinds of issues immediately (Wang, Zheng, Lou, & Hou, 2015). There are several steps
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 7
and techniques to reduce the problem of DDOS attack and hacking for the Attorney
General:
Identify and control the DDOS attack immediately
Overprovision bandwidth
Protect computer networks and devices by using antivirus and firewall
Communicate with hosting providers
Contact to cyber-crimes authorities to control the DDOS attacks
Produce a playbook for DDOS attacks
Increase the bandwidth
Update computer software on a regular basis
Protect personal servers and data
Create a DDOS action plan
Monitor traffic levels
Conclusion
The security of data is a very complex process for the Attorney General and the
lack of security is one of the common problems. The DDOS attack is very biggest cyber-
attack for an organization and the people of western Sydney make malicious software
and attacks on peripheral devices of US authorities. This report explained the concept of
DDOS attack and impact of this cyber-crime on the Attorney General. It is researched
that most the consumers use third-party applications which are established by malware
and hackers collect all relevant information by controlling their devices. The main
problem of employees is that they use poor password system which can be easily
blocked by attackers. IF they adopt biometric recognition like a fingerprint, iris
techniques then the problem of DDOS can be resolved. People ensure that when any
fraud or spam emails identified in their networks then delete or block that messages
because hacker generates the spam links by using malicious software to detect the
private details like login ID and password.
Press release summary
In the last four years the problem of DDOS attack and hacking has increased by
39% and due to which most of the Australian organization reduced their privacy. In
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 8
which hackers generate the large rate of traffic signals and share on networks of biggest
communities or banks. In the year 2017 around 1TBps unwanted data was identified by
US authorities and they observed that consumers user unauthentic servers for
communication purpose by which they can lose their data. The problem of DDOS and
hacking can be reduced if consumers adopt security plans like firewall, antivirus,
encryption, cryptography, robust technique and pattern recognition.
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 9
References
Alwan, Z. S., & Younis, M. F. (2017). Detection and Prevention of SQL Injection Attack: A
Survey. International Journal of Computer Science and Mobile Computing, 6(8), 5-
17.
Bandara, K. R. W. V., Abeysinghe, T. S., Hijaz, A. J. M., Darshana, D. G. T., Aneez, H.,
Kaluarachchi, S. J., ... & DhishanDhammearatchi, M. (2016). Preventing DDoS
Attack Using Data Mining Algorithms. International Journal of Scientific and
Research Publications, 6(10), 390.
Haider, W., Creech, G., Xie, Y., & Hu, J. (2016). Windows-based data sets for evaluation of
the robustness of host-based intrusion detection systems (IDS) to zero-day and
stealth attacks. Future Internet, 8(3), 29.
Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2015). Botnet in DDoS Attacks: Trends
and Challenges. IEEE Communications Surveys and Tutorials, 17(4), 2242-2270.
Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R.
(2016). On cloud security attacks: A taxonomy and intrusion detection and
prevention as a service. Journal of Network and Computer Applications, 74, 98-
120.
Modi, K., & Quadir, A. (2014). Detection and Prevention of DDoS Attacks on the Cloud
using Double-TCP Mechanism and HMM-based Architecture. International
Journal of Cloud Computing and Services Science, 3(2), 113.
Pandey, P., Jain, M., & Pachouri, R. (2017). DDOS ATTACK ON WIRELESS SENSOR
NETWORK: A REVIEW. International Journal of Advanced Research in Computer
Science, 8(9), 22-24.
Soltani, S., Seno, S. A. H., Nezhadkamali, M., & Budiarto, R. (2014). A survey on real-
world botnets and detection mechanisms. International Journal of Information
and Network Security, 3(2), 116.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 10
Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud
computing: Issues, taxonomy, and future directions. Computer
Communications, 107, 30-48.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of
cloud computing and software-defined networking. Computer Networks, 81, 308-
319.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]