IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 5 - Issue 12, December 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Information Security - Recent Attacks In Fiji

[Full Text]

 

AUTHOR(S)

Shaneel Deo, Mohammed Farik

 

KEYWORDS

Attacks, data, exploits, Fiji, information security, threats, vulnerabilities

 

ABSTRACT

Information technology (IT) plays a vital role in Fiji’s economy as businesses strive for competitive advantage. However, IT has also become a tool for attackers. Hence, it is important that all IT users invest in better information security technologies and practices to safeguard against all possible attacks and threats that emerge in the horizon. In this paper, we review recent information security attacks that have taken place in Fiji and recommend countermeasures to safeguard against such attacks in the future.

 

REFERENCES

[1] M. Rouse, "http://www.techtarget.com/network," TechTarget, January 2016. [Online]. Available: http://searchsecurity.techtarget.com/definition/information-security-infosec. [Accessed 3 October 2016].

[2] M. Whitman and H. Mattord, Principles of Information Security, Boston: Cengage, Boston: Cengage, 2014. .

[3] n. delaibatiki, "http://fijisun.com.fj/," Fijisun, 15 December 2015. [Online]. Available: http://fijisun.com.fj/2015/12/13/fijian-firms-lose-thousands-of-dollars-through-cyber-crime/. [Accessed 7 October 2016].

[4] S. Pandey, N. Shah, A. Sharma and M. Farik, "Cybersecurity Situation In Fiji," International Journal of Scientific & Technology Research, vol. V, no. 7, pp. 215-219, 2016.

[5] D. O’Brien, "www.symantec.com," 16 feb 2016. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/dridex-financial-trojan.pdf. [Accessed 7 october 2016].

[6] Emberton, "computerhope.com," [Online]. Available: http://www.computerhope.com/jargon/u/unethical-hack.htm. [Accessed 15 October 2016].

[7] N. Swami, "Fijitimes.com," Fiji Times, 26 May 2015. [Online]. Available: http://www.fijitimes.com/story.aspx?id=307220. [Accessed 15 October 2016].

[8] E. Turagaiviu, "www.fbc.com.fj/," Fiji broadcasting company, 19 september 2013. [Online]. Available: http://www.fbc.com.fj/fiji/13807/man-wanted-for-identity-theft. [Accessed 15 October 2016].

[9] Newswire, "5 government websites attacked by Kurdish hacker," Newswire, 11 March 2016. [Online]. Available: https://www.newswire.com.fj/national/government-websites-attacked-by-kurdish-hacker-restored/. [Accessed 16 October 2016].

[10] Ekurd, "http://ekurd.net/," ekurd, october 2015. [Online]. Available: http://ekurd.net/kurdish-hacker-targets-dell-2016-06-14. [Accessed 2 october 2016].

[11] Cisco, "A Cisco Guide to Defending Aganist Distributed Denial of Service Attacks," Cisco, [Online]. Available: http://www.cisco.com/c/en/us/about/security-center/guide-ddos-defense.html#_Toc374453078. [Accessed 2 October 2016].

[12] Trend Micro, "Ransomware," Trend Micro, [Online]. Available: http://www.trendmicro.com/vinfo/us/security/definition/ransomware. [Accessed 13 September 2016].