There are four parts of cybercrime attack that got to be discussed in this assignment. These included Distributed Denial of Services, identity theft, social engineering and man-in-the middle attack. A topic that will be covered is type of vulnerability, type of attack, the impact of those attack and protection mechanism used to prevent attacks to happen.
2.0 Distributed Denial of Services (DDOS)
2.1 Type of Vulnerability
The first vulnerability that will cause hackers to infect company daily routine is companies that do not deal with any monitoring of the system and setup of a machine that did not take security as prior. Furthermore, no regular audit and upgrade of software will also cause defective in the company and make hackers steal company confidential information more easily. If a company is adapting this kind of working environment, Distributed Denial of Services (DDOS) will often experience by this organization and company will not last long in the market because always be the target of attackers.
2.2 Type of Attacks
While the vulnerability of software not up-to-date and lack of monitoring in systems will lead to attack so called Distributed Denial of Services (DDOS) attack. Different from Denial of Services (DOS), a DDOS is an upgraded version of DOS attack. Both DOS and DDOS is aiming to overload the systems and deny services that providing by servers and make it disconnect from legitimate users. A DDOS is very difficult to shut down and defend because it comes from many computers around the world at once.
According to Arbor Network analysis, DDOS is a global threat that happens on average of 2934 cases per day worldwide and it is now increasing in attack size, speed and complexity. In further research, they said that proportion of attacks that exceed 10 Gbps had increased 41.6% compared with year by 2012. Next, the duration to cause system down and flood had shortened. There are about 86% of attack costs less than one hour to