Cyber Law Week 13

 Cyber Law Week 13

A Taxonomy for Cybercrime Attack in the Public Cloud

  • Public cloud users interact online or offline using natural language. While the language used could be in Xhosa, English, Afrikaans, Zulu or Ndebele, the core component is communication. Therefore, natural language is the language that people speak, listen to and understand. This is the same language that a public cloud user, uses to interact with another human and/or machine components of the public cloud. Meanwhile the same natural language is sometimes used by cybercrime attackers to achieve their aims when targeting users of the public cloud. The targeting of the users could be attributed to the user’s basic knowledge of the public cloud when seeking information or relationship formation, thereby unintentionally revealing points of vulnerabilities that often expose them to cybercrime attacks. A challenge to traditional digital forensic processes in the public cloud environment is the inability to retrieve an inactive cloud instance due to its volatile nature. Because of the variety of cybercrime attacks which are based on natural language, this research has developed a taxonomy for cybercrime attacks in the public cloud that is based on natural language.
Cyber Attacks in the Era of Covid-19 and Possible Solution Domains
  • In this COVID-19 pandemic, the use and dependency on Internet have grown exponentially. The number of people doing online activities such as e-learning, remote working, online shopping and others have increased. This has also led to increased vulnerability to cybercrimes. Cyber security attacks have become a serious problem. The common types of cyber security attacks are phishing, malware, ransomware, social engineering, identity theft and denial-of-service. The attackers target the victims in order to get their credential information or financial benefits. Those people who are doing online activities are vulnerable to cyber threats. This is because the network is not safe. The attackers can code according to the weaknesses of the Internet. Once the attackers hack into the devices, they have root access and can do whatever they want to do with the device.

Comments

Popular posts from this blog

Cyber Law Week 11

Cyber Law Week 10