Recent Information Technology (IT) solutions have undoubtedly brought about societal transformation. Several advancements in IT has facilitated several daily activities such as online transactions and connecting with other people. The heavy dependency on the internet and the rapid growth in the cyberspace has resulted in proliferation of cyberattacks. Attacks such as data breach, privacy invasion, ransomware, malware. Despite several attack prevention mechanisms and resource availability of even big IT firms, cybercriminals still find a way to leverage on vulnerabilities and strike a blow to these organizations. Cyber crime is one associated with the most serious of these issues and even its apparent growth in recent times demonstrates clearly how brand-new technologies create new chances for criminal activity. This article gives a brief overview of cyberattacks stating recent attacks on big organizations while discussing mitigation approaches.
Published In:IJCAT Journal Volume 7, Issue 10
Date of Publication : October 2020
Pages : 161-165
Oluwatobi Akinmerese :
bagged his MSc. in Information Technology in the year 2016. He was also awarded a bachelor's degree in Electrical/Electronics Engineering in 2009. He currently works as a Lecturer in Crawford University, Igbesa, Ogun-state. He is currently on his doctoral studies at Babcock University, Ilishan-Remo, Ogun State. His research interests includes Cyber Security, Computer Networks and Telecommunication.
Olamide Kalesanwo :
is a PhD holder in the field of Artificial
Intelligence. His research interest spans beyond AI and also
covers fields such as information security and Data Science. He
has several publications t his name. He is a member of Nigeria
Computer Society (NCS) and Data Science Nigeria (DSN).
Computer security is not only a technological defense strategy, it is also regarding people. Individual users, private sector as well as federal government needs a basic understanding of cyber threats and how to recognize them. On one hand, advancement in innovation has actually brought a lot greater efficiency: traffic jams eliminated, pollution lowered, more affordable expense of transport and even more. It is indeed a golden age. Then a Computer attack jeopardizes the main network. The systems that co-ordinate all transportation shut down, bringing an entire city to a sudden halt, crucial services stop working, and turmoil ensues. Any organization could be attacked. It is important to always be ahead of cyber attackers so as to avoid losing sensitive information.
 S. Rajeyyagari and A. S. Alotaibi, "A study on cyber-crimes, threats, security and its emerging trends on latest technologies: influence on the Kingdom of Saudi Arabia", International Journal of Engineering & Technology, vol. 7, no. 23, 2018, pp. 54. Available: 10.14419/ijet.v7i2.3.9969.
 "Twitter", Twitter.com, 2020. [Online]. Available: https://twitter.com/TwitterSupport/status/1289000138300563457?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1289000208701878272%7Ctwgr%5E&ref_url=https%3A%2F%2Fwww.theverge.com%2F2020%2F7%2F30%2F21348974%2Ftwitter-spear-phishing-attack-bitcoin-scam. [Accessed: 26- Sep- 2020].
 A. Kovacevic, N. Putnik and O. Toskovic, "Factors Related to Cyber Security Behavior", IEEE Access, vol. 8, 2020, pp.125140-125148. Available: 10.1109/access. 2020.3007867.
 Z. Liu, "A Cyber Crime Investigation Model Based on Case Characteristics", International Journal of Digital Crime and Forensics, vol. 9, no. 4, 2017, pp. 40-47. Available: 10.4018/ijdcf.2017100104.
 M. Watson, "5 Reasons Why Cyber Criminals Attack - IT Governance UK Blog", IT Governance UK Blog, 2020. [Online]. Available: https://www.itgovernance.co.uk/blog/5-reasons-why-cyber-criminals-attack. [Accessed: 26- Sep- 2020].
 "cybercrime | Definition, Statistics, & Examples", Encyclopedia Britannica, 2020. [Online]. Available: https://www.britannica.com/topic/cybercrime. [Accessed: 26- Sep- 2020].
 G. Marco, Understanding cybercrime, 2nd ed. ITU publication, 2012.
 P. Dutta, "5 Biggest Data Breaches of 2020 (So Far) - Security Boulevard", Security Boulevard, 2020. [Online]. Available: https://securityboulevard.com/2020/08/5-biggest-data-breaches-of-2020-so-far/#. [Accessed: 26- Sep- 2020].
 K. Bowen, "Credential Stuffing: the Culprit of Recent Attacks", Infosecurity Magazine, 2020. [Online]. Available: https://www.infosecurity-magazine.com/blogs/credential-stuffing-recent-attacks/. [Accessed: 26- Sep- 2020].
 K.Boyarsky, "The 10 Best Video Meeting Apps", Owllabs.com, 2020. [Online]. Available: https://www.owllabs.com/blog/best-meeting-apps. [Accessed: 26- Sep- 2020].
 J. Wallen, M. Stephens, D. Penna, J. Kelly-Linden, M. Field and A. Gulland, "Hackers obtain Covid-19 patient database in protest at treatment of Indian health workers", The Telegraph, 2020. [Online]. Available: https://www.telegraph.co.uk/global-health/terror-and-security/hackers-obtain-covid-19-patient-database-protest-treatment-indian/. [Accessed: 26- Sep- 2020].
 S. Butler-Hassan, "Motives unclear as cyber attack shuts down RMC network", Kingstonist News - 100% local, independent news in Kingston, ON, 2020. [Online]. Available: https://www.kingstonist.com/news/motives-unclear-as-cyber-attack-shuts-down-rmc-network/. [Accessed: 26- Sep- 2020].
 S. Turner, "386 Million Records from 18 Companies Leaked for Free", Fighting Identity Crimes powered by EZShield, 2020. [Online]. Available: https://www.fightingidentitycrimes.com/18-companies-368-million-records-data-breach/. [Accessed: 26- Sep- 2020].
 S.Gurubaran, "Microsoft's GitHub Account Hacked - 500 GB Of Microsoft Data Exposed", GBHackers On Security, 2020. [Online]. Available: https://gbhackers.com/microsofts-github/. [Accessed: 26- Sep- 2020].
 "Intrusion Detection & Prevention | Systems to Detect & Prevent Attacks | Imperva", Learning Center, 2020. [Online]. Available: https://www.imperva.com/learn/application-security/intrusion-detection-prevention/. [Accessed: 01- Oct- 2020].
All rights reserverd @ IJCAT Journal www.IJCAT.org