International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 5 - Issue 10, November 2016 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Review Of Recent Cyber-Attacks In Fiji

[Full Text]



Neeraj A. Sharma, Arjun Pillay, Mohammed Farik



Cyber-attack, Defacement, Phishing, Scams, Skimming, Spam



Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other, creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing, email scams, website defacement, and skimming. Apart from common preventative methods, some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.



[1] Techopedia.com. "What is a Cyberattack? - Definition from Techopedia.," 31 Aug., 2016; https://www.techopedia.com/definition/24748/cyberattack

[2] Wikipedia. "Cyber-attack," 31 Aug., 2016; https://en.wikipedia.org/wiki/Cyber-attack.

[3] R. Grimes. "The 5 cyber-attacks you're most likely to face. ," 11 Aug, 2016; http://www.infoworld.com/article/2616316/security/the-5-cyber-attacks-you-re-most-likely-to-face.html

[4] Anz.com. "Security alerts & reporting fraud | ANZ.," 31 Aug., 2016; http://www.anz.com/personal/ways-bank/security/online-security/alerts-reporting-fraud/

[5] C. Limited. "Fijivillage | Fiji's Latest News and Sports website.," 31 Aug., 2016; http://fijivillage.com/news/Fiji-Police-RFMF-and-Immigration-Fiji-websites-hacked-s9r52k

[6] About-threats.trendmicro.com. "Gateways to Infection: Exploiting Software Vulnerabilities | Trend Micro Threat Encyclopedia," 11 Aug., 2016; http://about-threats.trendmicro.com/RelatedThreats.aspx?language=tw&name=Gateways+to+Infection%3A+Exploiting+Software+Vulnerabilities.

[7] F. Times, “Skimming in Smuggler's Cove BSP ATM,” Fiji Times, 2015.

[8] US-CERT. "Recognizing and Avoiding Email Scams," 26th Oct., 2016; https://www.us-cert.gov/sites/default/files/publications/emailscams_0905.pdf.

[9] BanffCyber.com. "Best Practices to address the issue of Web Defacement," 26 Oct., 2016; https://www.banffcyber.com/best-practices-to-address-the-issue-of-web-defacement/.

[10] L. Heet. "Ways to protect against ATM skimming," 26th Oct., 2016; http://www.creditcards.com/credit-card-news/8-ways-protect-against-atm-skimming-1282.php.

[11] A. Khanse. "Cyber Attacks - Definition, Types, Prevention.," 25 Aug, 2016; http://www.thewindowsclub.com/cyber-attacks-definition-types-prevention.

[12] S. Leach. "Four ways to defend against DDoS attacks. ," 31 Aug., 2016; http://www.networkworld.com/article/2170051/tech-primers/tech-primers-four-ways-to-defend-against-ddos-attacks.html

[13] M. Farik, and S. Ali, “Analysis Of Default Passwords In Routers Against Brute-Force Attack,” International Journal of Scientific & Technology Research, vol. 4, no. 09, pp. 341-345, 2015.