Download Final ntcc report

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
TERM PAPER
On
TITLE: CYBERSECURITY
SUBMITTED TO
AMITY SCHOOL OF ENGINEERING
AND TECHNOLOGY
GUIDED BY: Mr. STEPHAN THOMPSON
SUBMITTED BY: AYUSH MAMGAIN
ENROLLMENT NO : A2305219687
PROGRAMME: BTECH CSE
SECTION: 11Y
AMITY UNIVERSITY UTTAR PRADESH
GAUTAM BUDDHA NAGAR
DECLARATION BY THE STUDENT
I, Ayush Mamgain student of B.Tech (CSE) hereby declare that the project titled
“Cybersecurity” which is submitted by me to Department of Computer Science,
Amity School of Engineering and Technology, Noida, Amity University Uttar
Pradesh, in partial fulfillment of requirement for the award of the degree of Bachelor
of Technology (CSE), has not been previously formed the basis for the award of any
degree,diploma or other similar title or recognition.
The Author attests that permission has been obtained for the use of any copy righted
material appearing in the report other than brief excerpts requiring only proper
acknowledgement in scholarly writing and all such use is acknowledged.
Signature :
Date:
CERTIFICATE
On the basis of report submitted by Ayush Mamgain, student of B.Tech ( CSE), I
hereby certify that the report on topic “Cybersecurity” which is submitted to
Department of Computer Science, Amity School of Engineering and Technology,
Amity University Uttar Pradesh in partial fulfillment of requirement for the award of
the degree of Bachelor of Technology (CSE) is an original contribution with existing
knowledge and faithful record of work carried out by him under my guidance and
supervision. To the best of my knowledge this work has not been submitted in part or
full for any Degree or Diploma to this University or elsewhere.
Noida
Date:
Name of Guide: Mr Stephan Thompson
Designation:
Department of Computer Science and Engineering
CONTENTS
 ABSTRACT
 INTRODUCTION
 VULNERABILITIES AND ATTACKS
 VIRUSES
 SOME CYBER FRAUDS OF RECENT TIMES
 SECURITYOF IoT
 CONCLUSION AND DISCUSSION
 REFERENCES
ABSTRACT
Cybersecurity is the body of processes, technologies and practices that are designed to protect
networks, device, program and data from attack, damage and unauthorized access from othe
devices. Cybersecurity is becoming important due to increasing dependence on IoT devices,
internet, wireless network and due to growth of “smart devices” like smartphones,televisions
and various devices that constitute the “Internet of Things”.
Cybersecurity help to prevent cyber attacks, data breaches, identity theft and can aid in risk
management. When any organisation has a strong sense of network security and effective
response plan, then they are better able to mitigate cyber attacks.
There are certain vulnerabilities in the devices which make the attacker to easily attack the
system. Some vulnerabilities and type of attack include backdoor, denial of service attack,
phishing, eavesdropping etc. are discussed.
Different types of viruses like trojan horse, worm, spyware etc are explained. Some recent
times cyber threat are also discussed .Protection measure like security by design, firewall,
gateway security,vulnerability management, using websites which are secure etc are explored.
INTRODUCTION
Today is the world where we are surrounded by technology. Technology plays a very
important role in our life, it gives us information about anything, help us in our work,
reduces our effort, etc. Means technology makes our life comfortable and pleasant.
Technology include refrigerator, ac, washing machines, mobile phones, laptops, cars,
etc. Mainly mobile phones have become a part of our life. As it is handy, help to
contact others, gives information etc. If we have to know about something then we just
type in the browser and we get to know about it. So question arises how this is
happening? The answer to this is the internet.
Internet is the global system of computer networks that are interconnected to each
other. Origin of internet occurs in the late 1960s in the United States. In 1969 internetdelivered its first message. In its early time internet is known as ARPANET(Advanced
Research Project Agency Network). Then it evolves to the internet.
There are a large number of devices that are connected to the internet. These devices
give rise to the word 'IoT'(Internet of Things). Means every 'Things'(Devices)
connected 'Internet' comes under IoT. Currently there are about 30 billion IoT devices.
Since the population is increasing all over the world in a large number, so is the
number of IoT. Below graph shows the increase in the number of devices in the
consecutive year
Since IoT devices are connected to a network called internet, so these devices need to
be manage and secure since data travels through this network, by doing some
manipulation third party can gain access to this data. So for protecting IoT devices term
‘Cybersecurity’ comes into play .
Basically Cybersecurity is the protection of IoT devices from theft of stealing valuable
information or harming software , hardware, or its data.
In India there are about 63.05 million smaller scale ventures, 0.33 million little, and
around 5,000 medium endeavors in the nation. The territory of Uttar Pradesh has the
biggest number of assessed MSMEs with a portion of 14.20 percent of the all out
MSMEs in the nation. India was threatened by 1,852 Cyber Attacks per minute in 2019,
with a successful hack occuring every 19 seconds.
If you fall victim to an attack, the direct damage could be in the form of lost data or
a server going down, a huge estimated organization in India loses a normal of $10.3
million every year due to cyberattacks, while a medium sized firm loses a normal of
$11,000 every year. This excludes indirect costs such as lost business due to loss of
customer trust or
service unavailability, which can be steep – 48% of consumers have stopped using
an organisation’s services because of a data breach.
This is happening due lack of managing the systems. Many Small Organisation are
aware of cyber threats but they think that they are not a target. The main thinking
behind that is they consider that they don’t have anything worth stealing. But actually
they have data of their client which is the main target of hackers.
Hackers find loose ends in system to attack them. These loose ends are also known as
vulnerabilities of system. These vulnerabilities also include users.
VULNERABILITIES AND
ATTACKS ON SYSTEM
There are a number of vulnerabilities and types of attacks that are used by malicious
hacker to gain access to devices. Time to time number and types of vulnerabilities and
attacks changes. As if you secure one vulnerability, malicious hacker find other
vulnerability to attack.
VULNERABILITIES

Use of easily guessable and unchanged credentials. It is very common
vulnerability which is create by our careless. To avoid this always use
passwords that contain small case letters, upper case letters, numbers and
characters.

Use of non-encrypted network is also a vulnerability. Unneeded or shaky
system administrations running on the gadget itself, particularly those
presented to the web, that bargain the privacy, respectability/ genuineness,
or accessibility of data or permit unapproved remote control.

Using outdated and insecure software can also make your device insecure.
This incorporates unreliable customization of working framework stages,
and the utilization of outsider programming or equipment segments from an
undermined flexibly chain.

Shaky web, backend API, cloud, or versatile interfaces in the environment
outside of the gadget that permits bargain of the gadget or its related
segments. Regular issues incorporate an absence of confirmation/approval,
lacking or powerless encryption, and an absence of information and yield
sifting.

Absence of encryption or access control of touchy information anyplace
inside the system, including very still, in travel, or during preparing.

Gadgets or frameworks delivered with uncertain default settings or do not
have the capacity to make the framework progressively secure by limiting
administrators from changing setups.

Insufficient privacy protection of device, so that anyone can use the device
and tampered it.

Absence of security support on gadgets conveyed underway, including
resource the board, update the executives, secure decommissioning,
frameworks checking, and reaction abilities.
IoT gadgets might be little, reasonable, and conveyed in enormous
numbers, however that doesn't mean you don't need to oversee them. Truth
be told, it makes overseeing them more significant than any time in recent
memory. Regardless of whether that is not in every case simple, modest, or
advantageous.

Another type of vulnerability is backdoor. These are the secret doors that
are used to bypassing security controls of the device. They may exist for
various reasons, including by real design or from poor configuration. They
may host been added by an approved gathering to permit some real access,
or by an malicious hacker for malevolent reasons; yet paying little mind to
the thought processes in their reality, they make a vulnerability. Secondary
passages can be extremely difficult to recognize, and recognition of indirect
accesses are generally found by somebody who approaches application
source code or personal information on the PC's Operating System.

Biggest vulnerabilities are users. Users are the first line of defence, as they
use system and they have to avoid harmful or malicious links and files.
According to verizon’s 2019 report on data breach configure that 32% of
all breaches include phishing. Means 32% of breaches were caused by user
being tricked by malicious hacker to clicking on harmful links or
downloading malicious files. By the day's end, people are error prone.
What's more, they are particularly untrustworthy when they are caught up
with, performing multiple tasks or diverted. Only one imprudent worker
can cost your they are caught up with, performing multiple tasks or
diverted. Only one imprudent worker can cost your association a great
many pounds, if not more.
TYPES OF ATTACKS:

PHISHING: In this type of attack fake emails and messages are used to
gain sensitive information like username and credentials of users. By
clicking on fake links users are directed to website which look like real
website, and this fake website ask for personal information. This
information are later used to gain access to real accounts. Sometimes it
also happens that they send user a message or email in which it is given
that you have won something, then after clicking the link they provide
users go to the website which demand a transfer of small amount of money
like 1 rupees and if you do this they use youir account information for
doing frauds.

DENIAL OF SERVICE ATTACK: In this type of attack attackers make
the system unavailable to user and demand ransom to leave that system.
This is done by using number of ways like attackers decieve you to
download some files or software and if you run them they act as virus and
stops your services, also they use zombie computers that are run by botnets
to send traffic to your system that will overload the machine or network
and block it.

DIRECT-ACCESS ATTACKS: In this attack attackers get physical access
to your device and copy or modifies your data and manipuate security of
device.

EAVESDROPPING: It is the act of listening private communication in a
network between hosts. Listening stealthily vectors incorporate phone
lines, cell systems, email, and different strategies for private texting. VoIP
interchanges programming is likewise defenseless against electronic
listening stealthily through diseases, for example, trojans.

KEYLOGGING: In this type of attack attacker record the keys that you
press on keyboard. It is basically done to get password and other personal
information. Keylogging can be done by using either hardware or software.
Although Keylogging is legal. Many company us keylogger to see how
their employees are using their systems.

SOCIAL ENGINEERING: Social engineering plans to persuade a client to
unveil insider facts, for example, passwords, card numbers, and so forth
by, for instance, imitating a bank, a contractual worker, or a customer.
Social engineering, with regards to data security, is the mental control of
individuals into performing activities or revealing classified data.

SPOOFING: Spoofing is the demonstration of taking on the appearance of
a substantial element through misrepresentation of information, (for
example, an IP address or username), so as to access data or assets that one
is in any case unapproved to get. There are a few sorts of mocking,
including:

Email spoofing, where an assailant manufactures the sending (From, or
source) address of an email.

IP address spoofing, where an assailant adjusts the source IP address in a
system bundle to shroud their personality or mimic another registering
framework.

Macintosh spoofing, where an aggressor changes the Media Access
Control (MAC) address of their system interface to act like a substantial
client on a system.

Biometric spoofing, where an aggressor delivers a phony biometric test
to act like another client.
VIRUSES:
Viruses are the form of software or code which have ability to replicate itself from one
system to other. This name is given to it as it is used to done malicious activities. So
this is a type of attack to the systems. Some common type of viruses that are used by
attackers are:

TROJAN HORSE: This is a type of virus which come in a form of useful tool
like games or antivirus and if user install it , then it will do its malicious work.
Once introduced in the framework, contingent upon its abilities a Trojan can
then conceivably access and catch everything - logins and passwords,
keystrokes, screen captures, framework data, banking subtleties, and that's just
the beginning - and furtively send everything to the assailants. Now and again
a Trojan can even permit aggressors to adjust information or mood killer
against malware security.
The intensity of Trojan horse makes it a helpful device for everybody from
solo programmers, to groups of hoodlums to state-supported activities taking
part in full-scale undercover work.

WORM: A worm is a type of malware that is intended to spread itself from
framework to framework without activities by the clients of those frameworks.
Worms regularly abuse vulnerabilities in working frameworks or
programming, but at the same time are fit for appropriating themselves by
means of email connections in situations where the worm can access the
contact book on a contaminated machine.

SPYWARE: Spyware is programming that screens the activities completed on
a PC and different gadgets. That may incorporate web perusing history,
applications utilized, or messages sent. Spyware may show up as a trojan
malware or might be downloaded onto gadgets in different manners.
For instance, somebody downloading a toolbar for their internet browser may
discover it comes stuffed with spyware for the motivations behind checking
their web action and PC use, or noxious adverts can subtly drop the code onto
a PC by means of a drive-by download.
At times, spyware is effectively sold as programming intended for purposes,
for example, guardians observing their youngster's web use and is intended to
unequivocally be overlooked by antivirus and security programming. Be that
as it may, there are different examples of such apparatuses being utilized by
bosses to keep an eye on the movement of representatives and individuals
utilizing spyware to keep an eye on their life partners.

RANSOMWARE: This type of virus usually come with phishing emails link.
If you click that link then the whole system gets locked and message for
ransom pop up on the screen.
It might sound simple, but ransomware works: cybercriminals have earned
over $1 billion from ransomware attacks during 2016 alone, and a Europol
report describes it as having "eclipsed" most other global cybercriminal threats
in 2017. A ransomware message look like

WIPER MALWARE: Wiper malware has one straightforward objective: to
totally wreck or eradicate all information from the focused on PC or system.
The cleaning could occur after the aggressors have subtly expelled target
information from the system for themselves, or it could be propelled with the
unadulterated goal of subverting the objective.
One of the primary significant types of wiper malware was Shamoon, which
focused Saudi energy organizations with the point of taking information at that
point cleaning it from the target machine. Later cases of wiper attacks
incorporate StoneDrill and Mamba, the last of which doesn't simply erase
documents, however renders the hard driver unusable.
SOME CYBER FRAUDS OF RECENT
TIMES:
Cyberattacks Target Financial Institutions to Make
Quick Bucks
In many cases, cyberattackers can be seen focusing on finance the executives
organizations and institutional financial specialists, basically on the grounds
that they are associated with the turnover of a colossal measure of cash. A
solitary error may prompt immense monetary misfortunes, as of late occurred
with Norfund and a few different organizations.

In May 2020, the Norwegian sovereign riches finance, Norfund, lost more than
$10 million (£8.2 million) in a digital trick occurrence. The programmers acted
like a money organization situated in Cambodia, distorted data trades, and
afterward fooled the organization representatives into moving assets into a
different record possessed by the programmers.

In March 2019, a phishing effort named "Past the Grave" was watched, that
was intended to change secret information held by the focused on mutual
funds. Dynamic since January 9, 2019, it was focusing on a few prestigious
banking and budgetary establishments, including Elliot Advisors, Capital Fund
Management, AQR, Citadel Baupost, Alliance Bernstein, and Group Marshall
Wace.

In October 2019, assailants had focused on the support investments the board
organization, Arena Investors, sending malevolent phishing messages acting
like a C-suite official.
FUND MANAGING ORGANISATION LEAKING
DATA
Other than direct digital assaults, finance the executives organizations
additionally face the danger of spillage and uncovering their client's touchy
information.

In August 2019, Credia.ge, a Georgia-based microfinance organization,
uncovered individual and advance data for a great many its clients. The 2 GB
of uncovered information contained 142,571 client records, that were left
uncovered in a misconfigured Elasticsearch group.

In December 2019, the Washington-based bookkeeping and riches the
executives organization, Moss Adams, told that a staff member's email account
was gotten to by an obscure outsider, bringing about the presentation of touchy
data including names and Social Security quantities of an undisclosed number
of client and workers.
CORONA RELATED E-ATTACKS:
In month of april and may 2020, almost 4 lakh coronavirus-related digital assaults have
been recorded all around, with programmers mimicking WHO, UN, and utilizing MS
Teams and Google Meet to draw casualties.
Further, in the month of april, just about 20,000 (19,749) new coronavirus-related
domains were enlisted all around, including India, of which 2% (354)are malevolent
and another 15% are esteemed dubious (2,961), a bit of the examination done by
Check Point Research, a worldwide digital danger knowledge supplier headquartered
in Israel.
FACEBOOK CAMBRIDGE ANALYTICA DATA
BREACH:
The Facebook–Cambridge Analytica information penetrate happened in mid 2018
when a large number of Facebook client’s very own information was gathered
without assent by Cambridge Analytica to be transcendently utilized for political
publicizing. This information break was the biggest known hole in Facebook history.
The information was gathered through an application made by Aleksandr Kogan, a
Cambridge scholarly, in 2013 and comprised of a progression of inquiries to fabricate
mental profiles of users. The application not just gathered the individual information
of the users that finished the inquiries, yet additionally of the user’s Facebook friends.
Cambridge Analytica tried to offer the information of American voters to political
battles and at last gave help and examination to the Ted Cruz and Donald Trump
crusades.
The information penetrate was unveiled in 2018 by Christopher Wylie, a previous
Cambridge Analytica representative, in interviews with The Guardian and The New
York Times. Accordingly, Facebook apologized for their job in the information
gathering and their CEO Mark Zuckerberg affirmed before Congress. These
happenings started an online development #DeleteFacebook, which slanted on
Twitter.
WANNACRY RANSOMWARE:
WannaCry is a ransomware worm that spread quickly through over various PC
arranges in May of 2017. Subsequent to tainting a Windows PCs, it scrambles records
on the PC's hard drive, making them unthinkable for clients to get to, at that point
requests a payoff installment in bitcoin so as to unscramble them.This ransomware is
note worthy as this struck many high profile systems like Britain’s National Health
Service, it misused a Windows vulnerability that was suspected to have been first
found by the United States National Security Agency; and it was likely connected by
Symantec and other security scientists to the Lazarus Group, a cybercrime association
that might be associated with the North Korean government.
SECURITY OF IoT:
As the number of IoTs are increasing day by day, so its security become very
important. It is always been a thinking that cybersecurity will be costly, but it is not
always the case. A common user like a one who is using its device in home, small
businesses can secure their devices by following some common measures.
Just you have to make some strategies like:

Any Enterprise can be a target.

Taking a strategic and risk based approach can make security affordable.

People are error prone.

Outer dangers are genuine – yet so is the interior danger.

Cell phones and other IoTs are huge vulnerabilities, as well – not simply your
PCs.
Some common tips for securing IoTs are
Always use password to log in your system. Do not make password which can
be easily guessed, always use combination of alphabets, digits and character to
make passwords.

Never reply or click on link of spam mails. If someone sent you some link
never click on it, always write that link on browser by yourself.

Use websites which are secure. To check that a website is secure, see its url
make sure it starts with https and that there is a padlock sign [
]. Never enter
your personal information on any website which doesn’t contain these two
things.

Use antivirus for your system. Update it and other software time to time.

Always use active operating system.

Numerous IoT gadgets are related with versatile applications. Safety efforts
must reach out to any associated applications. An example is in the entrance
control to an IoT versatile application. Assuming there is any chance of this
happening, set up second-factor confirmation to get to the versatile application.
OWASP, who keep watch on IoT vulnerabilities, likewise suggest guaranteeing
that any versatile application utilizes transport encryption.
Some advanced techniques to secure IoTs SECURITY BY DESIGN: Secure by design, implies that the product has
been planned starting from the earliest stage to be secure.
A portion of the methods in this methodology include:
The standard of least benefit, where each piece of the framework has just the
benefits that are required for its capacity.
Theorem proving to prove correctness of subsystems
Safeguard top to bottom, where the plan is with the end goal that more than
one subsystem should be disregarded to bargain the uprightness of the
framework and the data it holds.
Default secure settings, and structure to "bomb secure" as opposed to "bomb
shaky" (see safeguard for the equal in wellbeing building). In a perfect world,
a protected framework ought to require a purposeful, cognizant, proficient
and free choice with respect to authentic experts so as to make it unreliable.
Review trails following framework action
Total honesty everything being equal, to guarantee that the "window of
helplessness" is kept as short as conceivable when bugs are found.
 PKI AND COMPUTERIZED CERTIFICATES: Open key foundation (PKI)
and 509 computerized certification assume basic jobs in the improvement of
secure IoT gadgets, giving the trust and control expected to circulate and
recognize open encryption keys, secure information trades over systems and
confirm personality.
 API SECURITY: Application Performance Indicator (API) security is basic
to ensure the uprightness of information being sent from IoT gadgets to backend frameworks and guarantee just approved gadgets, designers and
applications speak with APIs.
NETWORK SECURITY: Securing an IoT organize incorporates guaranteeing port
security, incapacitating port sending and never opening ports when not required;
utilizing antimalware, firewalls and interruption location framework/interruption
counteraction framework; blocking unapproved IP addresses; and guaranteeing
frameworks are fixed and state-of-the-art .
 ACCESS CONTROL: In companies employees are provided by that much
of data that they are working on, so if in case a system gets compromised
then it does not result in a serious security breach.
 FIREWALLS: In computing, a firewall is a system security framework that
screens and controls approaching and active system traffic dependent on
predetermined security rules. A firewall normally sets up a boundary
between a confided in inner system and untrusted outer system, for
example, the Internet.
 GATEWAYS SECURITY: Going about as a delegate between IoT gadgets
and the system, security gateways have all the more handling force,
memory and capacities than the IoT gadgets themselves, which gives them
the capacity to execute features, for example, firewalls to guarantee
programmers can't get to the IoT gadgets they associate.
 VULNERABILITY MANAGEMENT: Vulnerability Management is the
pattern of distinguishing, and remediating or moderating vulnerabilities,
particularly in software and firmware. Vulnerability Management is
fundamental to PC security and system security.
Vulnerabilities can be found with a vulnerability scanner, which
investigates a PC framework looking for referred to vulnerabilities, for
example, open ports, uncertain programming arrangement, and
defenselessness to malware. All together for these instruments to be viable,
they should be stayed up with the latest with each new update the
merchants discharge. Regularly, these updates will examine for the new
vulnerabilities that were presented as of late.
Past weakness examining, numerous associations contract outside security
reviewers to run standard entrance tests against their frameworks to
distinguish vulnerabilities. In certain parts, this is a legally binding
prerequisite.
 There are many other security measure that are taken by organisations. As
types of attacks are increasing day by day so is its securing techniques are.
Organisations also train their employees so they get to know dos and
don’ts. Of using system.
CONCLUSION AND DISCUSSION
This whole study show that since the number IoTs are increasing very rapidly so their
security become very important. As we are in the era where we are evolving to a state where
smart devices help us in our every work. All companies and governments have their
confidential data in IoT devices. Money transfer and payments are being done by e-platforms.
Every field is becomig digital in all over the world, so they all need security. Cybersecurity is
the field which provide security to all these.
By becoming aware of common cyberattack anyone can save their devices without having
much knowledge of cybersecurity. By using strategic approach this all could be solved. The
strategic, hazard based methodology additionally guarantees the most genuine dangers are
tended to, while keeping the moderating measures as financially savvy as could be expected
under the circumstances. A strategic methodology additionally permits deterrents –, for
example, a misconception of the genuine idea of the digital scene, an absence of assets or an
absence of the board support – to be recognized and settled at a beginning period.
Cybersecurity is a very vast field and day to day need of cybersecurity expert is increasing.
So cybersecurity is also a evolving field which have a very wide scope .
REFERENCES
1. Know”.Retrieved from world wide web, Margaret Rouse (2016), “What is
Cybersecurity? Everything You Need To
searchsecurity.techtarget.com/definition/cybersecurity.
2. Bullguard (2020), “Hackers, virus writers and internet criminals”. Retrieved from
World Wide Web, https://www.bullguard.com/bullguard-security-center/internetsecurity/internet-threats/hackers-virus-writers-and-internet-criminals.aspx .
3. Hitachi System Security Inc. (2019), “How To Secure The IoT Environment”.
Retrieved from World Wide Web, https://www.hitachi-systemssecurity.com/blog/infographic-how-to-secure-the-iot-environment/ .
4. Gosafeonline (2014), “Distributed Denial of Service Attack”. Retrieved from World
Wide Web, https://www.csa.gov.sg/gosafeonline/go-safe-forbusiness/smes/distributed-denial-of-service-attack .
5. Cyware Social (2020), “Cyberattacks Target Financial Institutions to Make Quick
Bucks”. Retrieved from World Wide Web, https://cyware.com/news/cyberattackstarget-financial-institutions-to-make-quick-bucks-2f3002aa .
6. Outpost 24 (2020), “What Makes IoT so Vulnerable to Attack?”. Retrieved from
World Wide Web, https://outpost24.com/blog/what-makes-the-iot-so-vulnerable-toattack.
7. Fedric Paul (2019), “Top 10 IoT Vulnerabilties”. Retrieved from World Wide Web,
https://www.networkworld.com/article/3332032/top-10-iot-vulnerabilities.html.
8. Verizon (2019), “2019 Data Breach Investigation Report”. Retrieved from World
Wide Web, https://enterprise.verizon.com/resources/reports/dbir/ .
9. Josh Fruhlinger (2020), “Recent ransomware attacks define the malware's new age”.
Retrieved from, https://www.csoonline.com/article/3212260/recent-ransomwareattacks-define-the-malwares-new-age.html.
10. Josh Fruhlinger (2018), “What is WannaCry ransomware, how does it infect, and who
was responsible? . Retrieved from, https://www.csoonline.com/article/3227906/whatis-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html.
11. Danny Palmer(2018), “What is malware? Everything you need to know about viruses,
trojans and malicious software”. Retrieved from, https://www.zdnet.com/article/whatis-malware-everything-you-need-to-know-about-viruses-trojans-and-malicioussoftware/.
Related documents