scanned with camscanner9) 1-9 -tv ama also callz.cl knob' attackql qbou-e arphound this is a...
TRANSCRIPT
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Scanned with CamScanner
Botnet creation
Botnet SellingBotnet renting
Phishing attacks
spamdexing
Stealing confidential
information
Malware and Adware
installationSpam
attacks
DDoS attacks
Selling internet services and shops
account
Selling personal identity
information
Selling Credit card and bank
account details
Fig: Botnets are used for gainful purpose
The above figure explains how botnets create business and the technical terms are explained
below
CLOUD COMPUTING SERVICE PROVIDERS
CYBER CRIMES AND CLOUD COMPUTING:
Now a days the prime area of risk in cloud computing is protection of user data. The risks
identified in the below table are considered to be key obstacles to adoption of cloud computing
and making it an area of active research across the globe.
TERMINOLOGIES
1. CYBER BULLYING:
2. ZERO DAY ATTACK: