Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities

Nowadays, every internet user is part of cyber world. In this way, millions of users, knowledge seekers, and service provider organizations are connected to each other, a vast number of common people shifted their everyday activities to cyber world as they can save their time, traffic problem and gets effective and costless services by using various services such as, online banking, social networking sites, government services and cloud services. The use of Cyber services, eBusiness, eCommerce and eGovernance increases the usage of online/cyber services also increased the issue of cyber security. Recently, various cases have been reported in the literature and media about the cyber-attacks and crimes which seriously disrupted governments, businesses and personal lives. From the literature. It is noticed that every cyber user is unaware about privacy and security practices and measures. Therefore, cyber user has provided knowledge and fully aware them from the online services and also about cyber privacy and security. This paper presents a review on the recent cybercrimes, threats and attacks reported in the literature and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has been discussed. At last, a defensive model is also proposed to mitigate cyber-criminal activities.


INTRODUCTION
I n this information age, the internet is an integrated part of our daily life. It is an online source, which provides speedy communication to the whole world, organizations and people are connected through various cyber services such as eBanking, eGovernment services, social media, edutainment and cloud services [1]. These services are available without time and location barriers so the dependence on these services in last few years reported in [3] that the confidential information of south Korean employee have been theft and approximately 80 million credit cards were stolen, these credit cards includes income utilization reports and card numbers. In addition, researchers have dedicated to address the cyber security issues, challenges and providing suggested or recommended solutions for these domains to make them more secure for users, employers, customers, organization and governments.
This paper contributes a review of current cybercrimes and threats which can seriously affect the modern world's essential, interactive and user-friendly cyber services. In addition, it concludes with some recommended suggestions which are suggested by cyber policy maker and emerging technology designing organizations (such as: Microsoft) which can be adopted to minimize the cyberattacks and also increase the awareness among cyber users of this emerging world. Further, this paper is divided into eight sections. Section I discusses about the Introduction, Literature review is discussed in section 2, categories of cyber criminals are illustrated in section 3, cybercrimes, threats and attacks are discussed in section 4, a novel model is proposed in Section 5, cyber protection laws and strategies are discussed in section 6 and conclusion is discussed in section 7.

LITERATURE REVIEW
In cyber era, increasing number of emerging technologies increases the issues concerned with the privacy and security of their offered services [4][5]. Furthermore, it is reported and noticed that US is one of those countries where credit card fraud became daily issue and now reached at 47% of the whole world [6]. These frauds show the failure of government policies because the citizens of US rely on older, malfunctioning technology and the remaining countries have upgraded their technology [4].
These credit cards comprise of magnetic stripes where person's financial and confidential information is programmed [5].

CATEGORIES OF CYBER CRIMINALS
In this section, some of the Cyber-criminals have been categorized as below and shown in Fig. 1 [10][11]: Hacker: Hacker is a special computer operator, who seeks and exploits weaknesses in a computer system or computer network. These individuals explore others' computer systems for education, eCommerce, or information system.

Crackers:
Cracker is a computer literate person, who has broad computer knowledge and aims to breach internet security and get access to information system without paying any cost.
Cyber Terrorists: Cyber terrorist is also a programmer, who breaches computer system security to steal or destroy cyber user information for cyber-terrorism purpose. Smart hacker hacks government websites which is also a form of cyber terrorism.

CYBER THREATS, ATTACKSAND CRIMES
In this section, current cyber threats, attacks have been discussed as under in following sub-sections:

Cyber Threats and Attacks
According to TrapX Security, which is a deceptionbased cyber security defense company reported a hijacking technique named as "MEDJACK" by which medical devices are hijacked [12].

Cyber Attacks Reported
From the report [7], it is reported and illustrated in Fig. 2(a-b)

Crime Report 2016 and 2017
From the report [15], it has been noticed that the economic crime in 2016 varies and effects the economy of the country. More, the reported affected ratio of economy in % have been mentioned as under in  [15] have been illustrated in Fig. 3.

Types of Cyber Crimes
In this sub section, cybercrimes along with their objective and examples are discussed which are shown in Table 2. web securify. The model has an internal working mechanism which may take four steps to process the requested task. In this mechanism, Step-1 loads system requested URL, after that goes for second step which scans URL and analyze the compatibility of applications.

PROPOSED MODEL
In step three and step four monitors the threats, attacks and vulnerabilities after that lists them along with applied actions shown in Fig. 4

CYBER PROTECTION LAWS AND STRATEGIES
In 2015, lawmakers have reintroduced the "Aaron's Law" to decline the increasing number of cyber-attacks and threats [16].