logo

Hackers Without Borders: A Legal Response

Write a research report on a given topic, using at least ten relevant sources, including five academic articles or reports of scholarly research. Use in-text referencing and provide a conclusion that summarizes the main arguments and evidence.

11 Pages2715 Words251 Views
   

Added on  2023-06-03

About This Document

The report explains the concept of DDOS attack and its impact on the Attorney General. It highlights the need for security plans like firewall, antivirus, encryption, cryptography, robust technique and pattern recognition to prevent DDOS attacks.

Hackers Without Borders: A Legal Response

Write a research report on a given topic, using at least ten relevant sources, including five academic articles or reports of scholarly research. Use in-text referencing and provide a conclusion that summarizes the main arguments and evidence.

   Added on 2023-06-03

ShareRelated Documents
Hackers without borders: a legal response
Hackers Without Borders: A Legal Response_1
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 1
Hackers Without Borders: A Legal Response_2
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 2
Contents
Introduction.......................................................................................................................................................... 2
How common are cybercrimes.....................................................................................................................2
Overview of DDOS attack................................................................................................................................ 2
What normally happens in DDOS cases....................................................................................................3
How often extradition requests made and what are happens to them......................................3
International cybercrime tribunal.............................................................................................................. 4
Conclusion.............................................................................................................................................................. 5
References.............................................................................................................................................................. 6
Hackers Without Borders: A Legal Response_3
HACKERS WITHOUT BORDERS: A LEGAL RESPONSE 3
Introduction
In the field of computer, system DDOS is defined as a distributed denial of service
which is a type of cyber-attack. In the last five years, the rate of DDOS in Australia and
NSW is growing very fast due to which much Australian organization lost their personal
information (Alwan, & Younis, 2017). The main objective of this report is to describe the
concept of DDOS attack and other security issues faced by the Attorney General. This is
a very serious problem in Australia because many consumers do not use any security
plans or use very simple password system which can be easily hacked by attackers. US
authorities also faced the issue of hacking and distributed denial of service attack which
is carried out by young individuals of Sydney. This report is divided into four parts for
example, how common are cybercrimes, an overview of DDOS attack, what normally
happens, how often extradition requests made, and international cybercrime tribunal
are.
Overview of DDOS attack
DDOS is a kind of cyber-crime which is the very crucial problem for Attorney
General and it is generally accomplished with the help of the flooding process. In this
type of attack, hackers produce a large number of unwanted signals and traffic and
young people of Sydney learn hacking from YouTube and other online servers after that
they attack Attorney General and other Australian organization. It is investigated that
the main issue with the Attorney General is that they use third-party application and
unauthorized servers which are developed by malware software (Hoque,
Bhattacharyya, & Kalita, 2015). It is a part of the denial of services attack that use
numbers of unique IP address to block the user's peripheral devices. Hackers first send
unwanted and spam emails to employees after that user clicks on unauthorized links
which are developed by botnet or flooding process. With the help of this technique, they
enter into consumers computer networks and block their private data or information.
DDOS attack decreases the efficiency and performance of the Attorney General by using
malicious software and a large number of traffic signals.
Hackers Without Borders: A Legal Response_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Hackers without borders: A legal response
|10
|2320
|273

Introduction to Cyber Security
|14
|3209
|388

DDOS attack
|5
|1194
|491

Cyber security Attacks | Assessment 1
|7
|1374
|30

Case Study on Qatar National bank attack Assignment PDF
|8
|1805
|395

Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87