A Comprehensive Overview on Cybersecurity: Threats and Attacks
Preetha S1, P. Lalasa2, Pradeepa R3

1Preetha S*, Department of ISE, B.M.S. College of Engineering, VTU, Bengaluru (Karnataka), India.
2P. Lalasa, Department, department of ISE, B.M.S. College of Engineering, VTU, Bengaluru (Karnataka), India.
3Pradeepa R, Department of ISE, B.M.S. College of Engineering, VTU, Bengaluru (Karnataka), India. 

Manuscript received on May 23, 2021. | Revised Manuscript received on May 29, 2021. | Manuscript published on June 30, 2021. | PP: 98-106 | Volume-10, Issue-8, June 2021 | Retrieval Number: 100.1/ijitee.H92420610821 | DOI: 10.35940/ijitee.H9242.0610821
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. With the increased use of technologies in our life, the cybercrimes have amplified. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. In 2019 around 93.6% of observed malware was polymorphic, which means it changes the code continuously to evade detection. According to FBI and internet crime complaint center 2020crime report has doubled compared to 2019. International Data Corporation predicts that global spending on cybersecurity solutions will reach $133.7 billion by 2022 as cyber threats continue to increase. Governments around the world have acknowledged to growing cyber-attacks by providing directions to organizations implementing efficient cybersecurity practices. Cybersecurity protects computer systems and networks from creating damage to hardware and software, information disclosure, theft and from the interference or misdirection of the services they provide. The need to understand different kinds of cybercrime. In order to develop necessary measures against cybercrime, we need to understand different kinds of cybercrime. Our paper gives you an overview of various types of cyber-crime like malware, phishing, zero-day exploit, Advanced Persistent Threat (APT). The study provides an overview to different preventive existing solutions proposal and methods to detect attack. A strong understanding of such attacks would benefit us to be cautious and develop effective solutions. 
Keywords: Attacks, Cybercrime, Cybersecurity, Malware Detection, Preventive.