A Review Of Recent Cyber-Attacks In Fiji
Neeraj A. Sharma, Arjun Pillay, Mohammed Farik
Cyber-attack, Defacement, Phishing, Scams, Skimming, Spam
Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other, creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing, email scams, website defacement, and skimming. Apart from common preventative methods, some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.
 Techopedia.com. "What is a Cyberattack? - Definition from Techopedia.," 31 Aug., 2016; https://www.techopedia.com/definition/24748/cyberattack
 Wikipedia. "Cyber-attack," 31 Aug., 2016; https://en.wikipedia.org/wiki/Cyber-attack.
 R. Grimes. "The 5 cyber-attacks you're most likely to face. ," 11 Aug, 2016; http://www.infoworld.com/article/2616316/security/the-5-cyber-attacks-you-re-most-likely-to-face.html
 Anz.com. "Security alerts & reporting fraud | ANZ.," 31 Aug., 2016; http://www.anz.com/personal/ways-bank/security/online-security/alerts-reporting-fraud/
 C. Limited. "Fijivillage | Fiji's Latest News and Sports website.," 31 Aug., 2016; http://fijivillage.com/news/Fiji-Police-RFMF-and-Immigration-Fiji-websites-hacked-s9r52k
 About-threats.trendmicro.com. "Gateways to Infection: Exploiting Software Vulnerabilities | Trend Micro Threat Encyclopedia," 11 Aug., 2016; http://about-threats.trendmicro.com/RelatedThreats.aspx?language=tw&name=Gateways+to+Infection%3A+Exploiting+Software+Vulnerabilities.
 F. Times, “Skimming in Smuggler's Cove BSP ATM,” Fiji Times, 2015.
 US-CERT. "Recognizing and Avoiding Email Scams," 26th Oct., 2016; https://www.us-cert.gov/sites/default/files/publications/emailscams_0905.pdf.
 BanffCyber.com. "Best Practices to address the issue of Web Defacement," 26 Oct., 2016; https://www.banffcyber.com/best-practices-to-address-the-issue-of-web-defacement/.
 L. Heet. "Ways to protect against ATM skimming," 26th Oct., 2016; http://www.creditcards.com/credit-card-news/8-ways-protect-against-atm-skimming-1282.php.
 A. Khanse. "Cyber Attacks - Definition, Types, Prevention.," 25 Aug, 2016; http://www.thewindowsclub.com/cyber-attacks-definition-types-prevention.
 S. Leach. "Four ways to defend against DDoS attacks. ," 31 Aug., 2016; http://www.networkworld.com/article/2170051/tech-primers/tech-primers-four-ways-to-defend-against-ddos-attacks.html
 M. Farik, and S. Ali, “Analysis Of Default Passwords In Routers Against Brute-Force Attack,” International Journal of Scientific & Technology Research, vol. 4, no. 09, pp. 341-345, 2015.