Cyber Crime and Security

Authors

  • Nisarg C Joshi  Assistant Professor, Physics(EC) Department, Ratnamani Science College, Becharaji, Mehshana, Gujarat, India
  • Jaydipsinh B Thakor  Computer Lab Assistant, Computer Department, Ratnamani Science College, Becharaji, Mehshana, Gujarat, India

DOI:

https://doi.org//10.32628/CSEIT183834

Keywords:

Cyber Crime, Cyber Security

Abstract

Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries that rely on legal, organizational, and technological approaches. We focus on a case study of fighting cybercrime in India and discuss problems faced. Finally, we propose several recommendations to advance the work of fighting cybercrime. Cybercrime falls into three categories: (1) a computer is the target of criminal activity; (2) the computer is the tool used or is integral to the commission of the crime; and (3) the computer is only an incidental aspect of the crime. Cybercrime is a relatively new phenomenon. Services such as telecommunications, banking and finance, transportation, electrical energy, water supply, emergency services, and government operations rely completely on computers for control, management, and interaction among themselves. Cybercrime would be impossible without the Internet. Most American businesses maintain WWW sites and over half of them conduct electronic commerce on the Internet. The rise in popularity of the Internet for both private persons and businesses has resulted in a corresponding rise in the number of Internet-related crimes.

References

  1. Prof. Briere, E. (1966). Quantity before quality in second language composition. Language Learning 16, 141-151.
  2. Bums, H. & Culp, G. (1980, August). Stimulating invention in English composition through computer Assisted instruction. Educational Technology, 5-10.
  3. Daedalus Integrated writing environment [Computer software). (1994). Austin, TX: The Daedalus Group, Inc.
  4. Keirn, W. (1989). The writing-grammar battle: Adventures of a teacher/administrator. Engllsh Journal, 78, 66-70.
  5. Brewin, B., UPS to spend $127M on tri-mode wireless driver terminals. http://www.computerworld.com
  6. Haskin, D., Motient Files for Chapter 11. http://www.internetnews.com
  7. The switch from CDPD to GPRS. http://www.airlink.com/
  8. ARDIS, DataTac 4000, Software Developers Reference Guide, Revision 2.0
  9. Goldsmith, C., Wireless Local Area Networking for Device Monitoring. University Of Rochester, Rochester NY.
  10. IEEE Std 802-2002, IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, page 1, section 1.2: "Key Concepts", "basic technologies"
  11. Karunakar Pothuganti and Anusha Chitneni “A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, Wi-Fi", Advance in Electronic and Electric Engineering, ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 655-662

Downloads

Published

2018-12-03

Issue

Section

Research Articles

How to Cite

[1]
Nisarg C Joshi, Jaydipsinh B Thakor, " Cyber Crime and Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.143-146, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183834