Ques1 Provide a brief overview of the case study This case study draws on the European Union Agency for Network and Information Security (ENISA) to examine current cyber threats and emerging and the trend of threats to emerging technologies areas. This will be followed by an explanation of the threat, threat agent, technology areas and attack methods. This case study also provides a description of the procedure followed; Also use a few descriptions of cyber threat intelligence use cases. The main commitment of the ETL 2014 lies in recognizable evidence of maximum cyber danger within the reported time frame. As the risk landscape develops, it is the key effort towards identifying cyber threats. This report also examines how most Internet-related problems, such as attacks on spam messages, have malware as their root cause. Today, malware is used by both developers and governments to acquire individual, money-related, or business information. The malware is widely used against government or corporate targets to collect monitored data. Regardless, malware is constantly used against people to obtain information, such as individual unambiguous proof numbers or premium purposes, bank or charge card numbers, and passwords. Left unattended, individual and scheduled PCs can be at considerable risk against these dangers. Since the advent of widespread broadband Internet access, programming has been offered for a more significant portion of the time for convenience purposes. Some malware is used to earn money through false claims, making the PC user believe that they have clicked on an advanced membership to a site, creating a portion from the promoter. In 2012 it was estimated that approximately 60-70% of all elementary malware used some type of misrepresentation and that 22% of all ad clicks were fraudulent. Malware is generally used for criminal purposes, but it can be used to cause harm, often without any direct benefit to the perpetrators. (Kolbitsch, Comparetti, Kruegel, Kirda, Zhou, & Wang, 2016)"Malware" is the general term that covers all different types of dangers to the well-being of the client PC, some classifications of malware are primarily, viruses, software that can recreate it and they spread across different PCs or are modified to damage a PC by deleting records, reformatting the hard drive or consuming PC memory. Second, join, financially supported software showing promotion when customers connect to the Internet. Third, spyware, software that secretly accumulates data and transmits it
tags