scanned with camscanner9) 1-9 -tv ama also callz.cl knob' attackql qbou-e arphound this is a...

Post on 27-Sep-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Scanned with CamScanner

Botnet creation

Botnet SellingBotnet renting

Phishing attacks

spamdexing

Stealing confidential

information

Malware and Adware

installationSpam

attacks

DDoS attacks

Selling internet services and shops

account

Selling personal identity

information

Selling Credit card and bank

account details

Fig: Botnets are used for gainful purpose

The above figure explains how botnets create business and the technical terms are explained

below

CLOUD COMPUTING SERVICE PROVIDERS

CYBER CRIMES AND CLOUD COMPUTING:

Now a days the prime area of risk in cloud computing is protection of user data. The risks

identified in the below table are considered to be key obstacles to adoption of cloud computing

and making it an area of active research across the globe.

TERMINOLOGIES

1. CYBER BULLYING:

2. ZERO DAY ATTACK:

top related