The report explains the concept of DDOS attack and its impact on the Attorney General. It highlights the need for security plans like firewall, antivirus, encryption, cryptography, robust technique and pattern recognition to prevent DDOS attacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Hackers without borders: a legal response
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE2 Contents Introduction.......................................................................................................................................................2 How common are cybercrimes...................................................................................................................2 Overview of DDOS attack..............................................................................................................................2 What normally happens in DDOS cases..................................................................................................3 How often extradition requests made and what are happens to them......................................3 International cybercrime tribunal............................................................................................................4 Conclusion...........................................................................................................................................................5 References...........................................................................................................................................................6
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE3 Introduction In the field of computer, system DDOS is defined as a distributed denial of service which is a type of cyber-attack. In the last five years, the rate of DDOS in Australia and NSW is growing very fast due to which much Australian organization lost their personal information (Alwan, & Younis, 2017).The main objective of this report is to describe the concept of DDOS attack and other security issues faced by the Attorney General. This is a very serious problem in Australia because many consumers do not use any security plans or use very simple password system which can be easily hacked by attackers. US authorities also faced the issue of hacking and distributed denial of service attack which is carried out by young individuals of Sydney. This report is divided into four parts for example, how common are cybercrimes, an overview of DDOS attack, what normally happens, how often extradition requests made, and international cybercrime tribunal are. Overview of DDOS attack DDOS is a kind of cyber-crime which is the very crucial problem for Attorney General and it is generally accomplished with the help of the flooding process. In this type of attack, hackers produce a large number of unwanted signals and traffic and young people of Sydney learn hacking from YouTube and other online servers after that they attack Attorney General and other Australian organization. It is investigated that the main issue with the Attorney General is that they use third-party application and unauthorized servers which are developed by malware software (Hoque, Bhattacharyya, & Kalita, 2015).It is a part of the denial of services attack that use numbers of unique IP address to block the user's peripheral devices. Hackers first send unwanted and spam emails to employees after that user clicks on unauthorized links which are developed by botnet or flooding process. With the help of this technique, they enter into consumers computer networks and block their private data or information. DDOS attack decreases the efficiency and performance of the Attorney General by using malicious software and a large number of traffic signals.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE4 How common are cybercrimes in nature with alleged offender in NSW TheCriminal Code ActDivision 477-478 states the severe computer crimes, such as hacking, which may be accused at central level.TheCriminal Code Actstates an individual is guilty of the crime if any person causes illegal access to data of computers or illegal alteration of data of computer.The hacking and DDOS bothare very common types of cybercrimes in Australia and NSW. Information is a very important part for Attorney General which can be easily blocked by hackers and DDOS attack can affect the performance of consumer’s computer systems (Bandara, et al., 2016).It is observed that in the year 2017 the rate of DDOS attack is increased by 34% and around thousands of computer systems are hacked by attackers. Attorney General is a very largest organization which provides many IT services to their consumers but the main problem faced by this organization is a data breach. In a DDOS attack first hackers collect all relevant information about the Attorney General and after that, they developed unauthorized signals from malware software and shares with their employees. In the year 2018 around 1.83 Tbps traffic signals produced by DDOS attack due to which many consumers lost their personal information like login ID and passwords. It has the capability to block the private networks of any consumers and many hackers use malicious and botnet process to encrypt information of the Attorney General (Haider, Creech, Xie, & Hu, 2016). What normally happens in DDOS cases In DDOS attack hackers use malicious software to generate a large number of traffic signals and they make unauthorized servers with the help of malware. The main problem occurs with US authorities is that they use third-party applications and consumers do not use any protection technique by which hackers attack their personal computers. It is observed that the Attorney General use a public type of cloud-based services that are developed by the malware software’s and the data or information of users are controlled by the third party sellers. In this type of cases, the US authorities can lose their private details like consumer’s data, accounts information, bank details and credit or debit card numbers. In the year 2016, the DDOS attack block the thousands of computer systems in the United States and it happens when the
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE5 consumers click on spams emails and fraud links. Due to this type of attacks organizations can suffer from any financial problem and the privacy of their networks or servers can be reduced (Modi, & Quadir, 2014). In the famous Lauri Love case, it is required by Love to appear in hearing on charge of cyber hacking that might mean a sentence of up to ninety-nine years in custody. Love is supposed to have hacked into United States agencies involving the United States army, Nasa, Federal Reserve, defence division, and the Federal Bureau of Investigation in year 2012 and year 2013. It was the milestone judgement, the High Court currently denied to permit the extradition of United Kingdom citizen Lauri Love to United States for offence of cyber robbery, stimulating the forum bar for the first time since its beginning in year 2003. The judgement delivered by the judges is extremely critical of the situations Love would have suffered in the prison of United States, cautioning of the threat of suicide. The decision of court toblock the repatriation of an apparent computer hackerwith Asperger disease highpoints once again the considerate quality of justice of United States. The high court judges have spared Lauri Love the prospect of long-term custodial sentence and the penal trial considered as one of the severest in the history. It was argued by the lawyer that Lauri Love must be tried in Britain for apparently hacking in the government websites of United States and that Lauri Love will be at the risk of slaying himself if referred to the United States. Then, it is stated by Lord Chief Justice that now an appeal is ended, it is expected that Lauri Love will be accused in the United Kingdom (Iqbal, et al., 2016). How often extradition requests made and what are happens to them The DDOS attack is a part of a malware attack that has the ability to block the computer networks of organizations. Generally, hacker target biggest business industries and banking sectors to earn a large amount of money. This is a random process and its dependence upon the size of data sets or networks because hackers first identify the IP address and type of servers used by Attorney General after that they make a botnet process to detect the account details of consumers systems. Hackers mainly send spam emails and messages to employees and produce more traffic to reduce the performance of computer devices (Pandey, Jain, & Pachouri, 2017).The
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE6 malicious is a type of cyber-threat that has the ability to control and monitor the private accounts of attorney generals. The young individuals of western Sydney learn hacking from various online communities and YouTube after that they make their own algorithms and software to detect the IP address of user’s peripheral devices. However, these types of cyber-attacks work by producing a system of the process with a request for data and in which victims share a web server to make more requests that crash the networks of US authorities. The DDOS attacks do not occur regularly and hackers only attack biggest organizations to earn more profit and it is investigated that in the year 2017 around 1.32 TBps traffic signals were identified due to which many Australian users lost their data or information (Soltani, et al., 2016).Information technology developed many security programmes and plans to avoid the issue of DDOS attacks like encryption, cryptography, pattern recognition, firewall, and antivirus. With the help of all these techniques, the security of Attorney General Computers and devices can be increased. In the year 2016 US authorities provide the protection methods regarding the DDOS attack and they also improve the security systems but the main issue is that employees use the unauthorized servers and websites to access their personal accounts. How an international cybercrime tribunal are To make an international cybercrime tribunal or forum it is very necessary to understand the fundamental concept of DDOS attack. First employees identify the impact of this attack on an organization and steps used by hackers to block the computer networks (Somani, et al., 2017).People ensure that consumers use only authentic servers because most of applications and software are developed by the malicious system. The government of Australian can provide international authority for cybercrimes and they can produce security programmes to avoid the problem of DDOS attack. There are main three processes by which the traffic signals and malware can be identified such as firewall software, robust technology, and cryptography. All these are advanced techniques which can be adopted by international cybercrime tribunal because hackers send spam emails if people block all these fraud emails then they can reduce the cyber-attack by 20%. The US authorities ensure that their computer software and applications are updated and if any unwanted signals are observed on the website then communicate with cybercrime tribunals or authorities to address these kinds of issues immediately (Wang, Zheng, Lou, & Hou, 2015).There are several steps
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE7 and techniques to reduce the problem of DDOS attack and hacking for the Attorney General: ï‚·Identify and control the DDOS attack immediately ï‚·Overprovision bandwidth ï‚·Protect computer networks and devices by using antivirus and firewall ï‚·Communicate with hosting providers ï‚·Contact to cyber-crimes authorities to control the DDOS attacks ï‚·Produce a playbook for DDOS attacks ï‚·Increase the bandwidth ï‚·Update computer software on a regular basis ï‚·Protect personal servers and data ï‚·Create a DDOS action plan ï‚·Monitor traffic levels Conclusion The security of data is a very complex process for the Attorney General and the lack of security is one of the common problems. The DDOS attack is very biggest cyber- attack for an organization and the people of western Sydney make malicious software and attacks on peripheral devices of US authorities. This report explained the concept of DDOS attack and impact of this cyber-crime on the Attorney General. It is researched that most the consumers use third-party applications which are established by malware and hackers collect all relevant information by controlling their devices. The main problem of employees is that they use poor password system which can be easily blocked by attackers. IF they adopt biometric recognition like a fingerprint, iris techniques then the problem of DDOS can be resolved. People ensure that when any fraud or spam emails identified in their networks then delete or block that messages because hacker generates the spam links by using malicious software to detect the private details like login ID and password. Press release summary In the last four years the problem of DDOS attack and hacking has increased by 39% and due to which most of the Australian organization reduced their privacy. In
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE8 which hackers generate the large rate of traffic signals and share on networks of biggest communities or banks. In the year 2017 around 1TBps unwanted data was identified by US authorities and they observed that consumers user unauthentic servers for communication purpose by which they can lose their data. The problem of DDOS and hacking can be reduced if consumers adopt security plans like firewall, antivirus, encryption, cryptography, robust technique and pattern recognition.
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE9 References Alwan, Z. S., & Younis, M. F. (2017). Detection and Prevention of SQL Injection Attack: A Survey.International Journal of Computer Science and Mobile Computing,6(8), 5- 17. Bandara, K. R. W. V., Abeysinghe, T. S., Hijaz, A. J. M., Darshana, D. G. T., Aneez, H., Kaluarachchi, S. J., ... & DhishanDhammearatchi, M. (2016). Preventing DDoS Attack Using Data Mining Algorithms.International Journal of Scientific and Research Publications,6(10), 390. Haider, W., Creech, G., Xie, Y., & Hu, J. (2016). Windows-based data sets for evaluation of the robustness of host-based intrusion detection systems (IDS) to zero-day and stealth attacks.Future Internet,8(3), 29. Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2015). Botnet in DDoS Attacks: Trends and Challenges.IEEE Communications Surveys and Tutorials,17(4), 2242-2270. Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.Journal of Network and Computer Applications,74, 98- 120. Modi, K., & Quadir, A. (2014). Detection and Prevention of DDoS Attacks on the Cloud using Double-TCP Mechanism and HMM-based Architecture.International Journal of Cloud Computing and Services Science,3(2), 113. Pandey, P., Jain, M., & Pachouri, R. (2017). DDOS ATTACK ON WIRELESS SENSOR NETWORK: A REVIEW.International Journal of Advanced Research in Computer Science,8(9), 22-24. Soltani, S., Seno, S. A. H., Nezhadkamali, M., & Budiarto, R. (2014). A survey on real- world botnets and detection mechanisms.International Journal of Information and Network Security,3(2), 116.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE10 Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions.Computer Communications,107, 30-48. Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking.Computer Networks,81, 308- 319.