Analysis of the cyber attacks over the past decade and impact of them on private sector

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-1
Year of Publication : 2015
Authors : Chitra Kaul, Dr. B.M.K Prasad
  10.14445/22312803/IJCTT-V23P108

MLA

Chitra Kaul, Dr. B.M.K Prasad "Analysis of the cyber attacks over the past decade and impact of them on private sector". International Journal of Computer Trends and Technology (IJCTT) V23(1):35-38, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
In the last decade the usage information and communication technology was exceptionally increased due to which the cyber attacks over the years have become both increasingly numerous and sophisticated. According to the survey conducted on the basis of statistics from Computer Emergency Response Team Coordination Center (CERT/CC), since 1999 the cyber attack incident reported increased significantly with the alarming rise to 1.4 lakhs in 2003. The increased cyber attacks affected the private and government sectors also in terms of financially loses. This paper focuses on the analysis of the cyber attacks, their classification and types, and also their impact on the private sector business.

References
1. Lipson HF et al, “Tracking and tracing cyberattacks: technical challenges and global policy issues”, Technical report, CERT Coordination Center; November 2002.
2. Jamal Raiyn, “A survey of Cyber Attack Detection Strategies”, International Journal of Security and Its Applications Vol.8, No.1 (2014), pp.247-256.
3. M. Uma et al, “A Survey on Various Cyber Attacks and their Classification”, International Journal of Network Security, vol. 15, no. 6, (2013), pp. 391-397.
4. S. Singh et al, “A Survey of Cyber Attack Detection Systems”, IJCSNS International of Computer Science and Network Security, vol. 9, no. 5, (2009) May, pp. 1-10.
5. Hold Security, LLC announces Credential Integrity Services. “Hold Security. 25 Feb 2014, Web, 1 Jun 2014. http://www.holdsecurity.com/#!news201 3/c13i.
6. 2013 Cost of Cybercrime Study: Global Report. “Ponemon Institute. Oct 2013, p. 10. Web. 9 Jun 2014. DDoS attacks are comprised of a flood of messages to a system which are intended to knock websites offline by overwhelming them with traffic.
7. Bryan Watkins, “The Impact of Cyber Attacks on the Private Sector”, Briefing Paper, Association for International Affair, August 2014.
8. Net Losses: Estimating the Global Cost of Cybercrime.” Center for Strategic and International Studies. Jun 2014, Web, 18 Jun 2014, p.6. http://www.mcafee.com/us/resources/reports/rpeconomic- impact-cybercrime2.pdf.
9. The Economic Impact of Cybercrime and Cyber Espionage.” McAfee. 2013, p. 5.
10. “Fourth Quarter 2014: State of the Internet.” Akamai. Vol. 6, No. 4. 2014, Web, http://www.akamai.com/dl/akamai/akamai-sotiq413. pdf?WT.mc_id=soti_Q413
11. Gorman, Siobhan. “China Hackers Suspected in Long-Term Nortel Breach.“ Wall Street Journal Online. 14 Feb 2012, Web, http://online.wsj.com/news/articles/SB10001424 052970203363504577187502201577054
12. Beck, David, L.; Siemens, Rene L. “Cyber Insurance—Mitigating Loss from Cyber Attacks.” Pillsbury Law. 2012, Web, http://www.pillsburylaw.com/publications/cyberinsurancemitigating- loss-from-cyber-attacks

Keywords
This paper focuses on the analysis of the cyber attacks, their classification and types, and also their impact on the private sector business.