Published February 28, 2023 | Version CC BY-NC-ND 4.0
Journal article Open

Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks

  • 1. Department of Computer Applications, Baselios Poulose II Catholicos College, Piravom, (Kerala), India.
  • 2. Head of Research and Solutions, ICT Academy of Kerala (Kerala), India

Contributors

Contact person:

  • 1. Department of Computer Applications, Baselios Poulose II Catholicos College, Piravom, (Kerala), India.

Description

Abstract: The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world's total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 million Indians accessed the internet via any device. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. The slogans used to address data privacy are: “Data privacy belongs to you.” Lock it down, protect it, and block hackers. This paper reveals the issues related to categories & impact of cyber crime, basic cyber laws, security threats and protection which are a warning alarm to internet users.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

C94520212323.pdf

Files (576.1 kB)

Name Size Download all
md5:b85c477c625a4b5bdbb89e19f0d23d1d
576.1 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2278-3075 (ISSN)

References

  • David Buil-Gil, Fernando Miro-Llinares "Cyber crime and shifts in opportunities during covid-19: a preliminary analysis in UK" European societies Vol23,2021.
  • Orly Turgeman-Goldschmidt," Meaning that Hackers assign to their being a Hacker", International Journal of Cyber Criminology, vol2 (2) Dec.2008
  • Kristy Phillips, JC Davidson, "Conceptualizing Cybercrime: Definitions, Typologies and taxonomies", Forensic Sciences , April 2022.
  • Lizhen Tang, Qusay H Mahmoud , "A survey of machine learning-based solution for phishing website detection", Machine Learning & knowledge Extraction August 2021.
  • Nashrudin Setiawan, Vita Emia Tarigan, " Impact of Cyber crime in E-Business and Trust", International Journal of Civil Engineering and Technology, Vol 9(7) 2018.
  • Divy Shivpuri, " Cyber crime : Are the law outdated for this type of crime" ,International Journal of Research in Engineering Science and Management, Vol 4 No. 7, 2021.
  • Sumit Badotra, Amit Sundas, "A system review on security of E-Commerce system" , International Journal of Applied Science and Engineering" Vol 18(2) , June 2021.
  • Fairoz Q Kareen & Siddeeq Y Ameen, " SQL injection attacks prevention system Technology: Review", Asia Journal of research in computer Science, 10(3),2021.
  • Iram Tariq, Muddassar Azam sindhu, "Resolving Cross-site Scripting attack through genetic algorithm and reinforcement learning", Expert System with applications Vlo.168 ,April 2021.
  • Lie De Kimpe, Miche Walrave, "What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context" Behavior & Information TechnologyVol.41(8),2022.

Subjects

ISSN: 2278-3075 (Online)
https://portal.issn.org/resource/ISSN/2278-3075#
Retrieval Number: 100.1/ijitee.C94520212323
https://www.ijitee.org/portfolio-item/c94520212323/
Journal Website: www.ijitee.org
https://www.ijitee.org/
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org/