The threats from hackers, spies, terrorists, and criminal organizations against our information assets are undeniable. Many individual activities continue to evolve in the cyber space and this increased dependence on cyberspace can escalate vulnerability in one’s information assets. As each and every individual or organization/ institute has gained a greater online presence, cyber security has become a vital topic of concern (Singer & Allan, 2014). Access to the internet by users becomes unavoidable with the advent of technological developments and numerous advantages like easy data sharing, collaborative working style, flexibility, low cost, easy access, availability of different cloud computing models, online storage models, social networking, shopping, browsing publicly available data/information etc.
Studying attackers and their attack techniques will definitely help us in building effective defense posture for our systems and networks in the cyber space.Īs of the most recent reported period, the number of internet users worldwide has increased to 3.58 billion. if you do not know your enemies nor yourself, you will be imperiled in every single battle” was quoted precisely by the famous Chinese military General Sun Tzu (Sun Tzu, 2018). “If you know your enemies and know yourself, you will not be imperiled in a hundred battles.