Submit Search
Upload
Cyber Crime and Cyber Security
•
0 likes
•
36 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i11/IRJET-V4I11152.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Cyber crime and security
Cyber crime and security
Abhishek Baranwal
INTRODUCTION OF CYBER CRIME AND ITS TYPE
INTRODUCTION OF CYBER CRIME AND ITS TYPE
AM Publications
V01 i010413
V01 i010413
IJARBEST JOURNAL
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
Bangladesh Network Operators Group
Ethical Hacking
Ethical Hacking
ijtsrd
Cyber Terrorism
Cyber Terrorism
Shivam Lohiya
Cyber crime ppt
Cyber crime ppt
Bushra22
Cyberterrorism
Cyberterrorism
Gohar Sokhakyan
Recommended
Cyber crime and security
Cyber crime and security
Abhishek Baranwal
INTRODUCTION OF CYBER CRIME AND ITS TYPE
INTRODUCTION OF CYBER CRIME AND ITS TYPE
AM Publications
V01 i010413
V01 i010413
IJARBEST JOURNAL
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
Bangladesh Network Operators Group
Ethical Hacking
Ethical Hacking
ijtsrd
Cyber Terrorism
Cyber Terrorism
Shivam Lohiya
Cyber crime ppt
Cyber crime ppt
Bushra22
Cyberterrorism
Cyberterrorism
Gohar Sokhakyan
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
Mohamed N. El-Guindy
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
Cyber terrorism
Cyber terrorism
Raheela Patel
IRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical Hacking
IRJET Journal
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
Cyber security and threats
Cyber security and threats
Harsh Kumar
Cyberterrorism final
Cyberterrorism final
sudheerreddy59
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
Security troubles in e commerce website
Security troubles in e commerce website
Dr. Raghavendra GS
Symantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
Cyber security meetup from Nepal
Cyber security meetup from Nepal
Chiranjibi Adhikari
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
Analysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crime
Mohammad Husain
cyber terrorism
cyber terrorism
Accenture
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
SurfWatch Labs
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
Cybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
IJERA Editor
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
AM Publications
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
More Related Content
What's hot
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
Mohamed N. El-Guindy
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
Cyber terrorism
Cyber terrorism
Raheela Patel
IRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical Hacking
IRJET Journal
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
Cyber security and threats
Cyber security and threats
Harsh Kumar
Cyberterrorism final
Cyberterrorism final
sudheerreddy59
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
Security troubles in e commerce website
Security troubles in e commerce website
Dr. Raghavendra GS
Symantec Security Refresh Webinar
Symantec Security Refresh Webinar
Arrow ECS UK
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
Cyber security meetup from Nepal
Cyber security meetup from Nepal
Chiranjibi Adhikari
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
Analysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crime
Mohammad Husain
cyber terrorism
cyber terrorism
Accenture
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
SurfWatch Labs
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
Cybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
IJERA Editor
What's hot
(20)
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Cyber terrorism
Cyber terrorism
IRJET- An Overview of Ethical Hacking
IRJET- An Overview of Ethical Hacking
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Cyber security and threats
Cyber security and threats
Cyberterrorism final
Cyberterrorism final
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Security troubles in e commerce website
Security troubles in e commerce website
Symantec Security Refresh Webinar
Symantec Security Refresh Webinar
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Cyber security meetup from Nepal
Cyber security meetup from Nepal
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
Analysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crime
cyber terrorism
cyber terrorism
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Cybercrime in Iraq
Cybercrime in Iraq
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Similar to Cyber Crime and Cyber Security
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
AM Publications
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
IRJET Journal
A Survey On Cyber Crime Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS
Irjet v5 i1268
Irjet v5 i1268
xosap
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge: In India
IRJET Journal
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
Deja Lewis
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
INFOGAIN PUBLICATION
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
Daphne Smith
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
Ganesh DNP
C018131821
C018131821
IOSR Journals
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
IRJET Journal
THE ENVIRONMENT OF FEAR CREATED BY CYBER RISKS.pptx
THE ENVIRONMENT OF FEAR CREATED BY CYBER RISKS.pptx
BackupAccount23
Cyber crime modified
Cyber crime modified
Debabrata Samanta
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
IJECEIAES
Similar to Cyber Crime and Cyber Security
(20)
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
A Survey On Cyber Crime Information Security
A Survey On Cyber Crime Information Security
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
Irjet v5 i1268
Irjet v5 i1268
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge: In India
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
C018131821
C018131821
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
THE ENVIRONMENT OF FEAR CREATED BY CYBER RISKS.pptx
THE ENVIRONMENT OF FEAR CREATED BY CYBER RISKS.pptx
Cyber crime modified
Cyber crime modified
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
Recently uploaded
(20)
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
Cyber Crime and Cyber Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 858 CYBER CRIME AND CYBER SECURITY Soumya Satish Revankar 1 1MBA student , KLS Gogte Institute of Technology, Belagavi (An autonomous Institution under Visvesvaraya technological University, Belagavi) ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The internet is growing very rapidly in India but internet also has many disadvantages i.e. illegal activities committed on internet. Cyber security is refers to the various technologies and various processes which are designed to protect the computer, data from unauthorized access and network. Cybercrime is nothing but it is where the computer used as an object or the subject of crime. Cyber-crime is emerging as very serious threat so this research paper is an effort to educate the people and expose them the clearly idea that it’s not safe anymore to navigate in cyber world without the securities. My paper gives an detailed information regarding the aspects like cyber security including the preventions to deal efficiently and effectively with the cybercrimes, cybercrime, its various types and types of cyber attacks by percentage, cyber threat evolution, and also try to find top ten hacking countries and cybercrimes in various states of India. This report is based on different research done by researcher and organization on cybercrime and cyber security. Key Words: Cyber Security, Cyber Crime, Technology, Computer, Hacking, phishing and cyber stalking 1. INTRODUCTION Cyber security is technique which developed to safeguard information and information systems which are stored on computers. The need or cyber securities are due to the increase in cyber crimes or the online crimes. Cybercrime is committed using internet and computertosteal theperson’s identity or illegal activities. The first cybercrime was recorded in the year 1820. The first spam of email took place in the year 1976 when that was sentoverARPANT.Thevirus was first installed on apple computer in the year 1982 when a high school student named Rich Skrenta developedtheEIK cloner. Cyber crime was started first with the hackers who were trying to break into the computernetworks.Eventually the criminal started to contaminate computer systems with the viruses which were led to breakdown on the personal as well as business computers. Hackingattacksareprojectedto cost of the global economy which is whopping around $400 billion each year. With recent attacks it seems to be like nothing online is completely safe. The United States is scrambling to develop cyber security and put a stop to attacks that could or else it will have major impacts on our national security, the economy, and personal safety. 1.1 Objectives To study cybercrimes in different states in India. To know the higher cybercrime countries in 2016. To know top ten hacking countries. To study different types of cyber attacks. To study the precaution for overcoming the cybercrime. 2. Research Methodology The information throughout my study/analysis is collected through the secondary data. Sources of secondary data: the information (data) which is collected from the source which is earlier published in anyof the form is known as secondary or second hand data. There are two types of sources internalsource and external source. The literature review of any research it is popularly known on secondary data mostly from books, articles and various research papers. Secondary data is also useful formakingthe comparison analysis.The research methodology throughout my study is fully based on secondary data wherein all the information is collected by various sources and by referring various articles, research papers and books.Researchpapers were used like “Cyber Security” by Jummane Rajabu Mtamblike and “Cyber Crime’ by Anshuman Tripati. This is how I collected data (informations) 3. Analysis Figure-1: Cyber Crimes in different states in India As we can see in the above chart that most of the cyber crimes are reported in Maharashtra and Uttar Pradesh. The above chart shows that most of the cyber crime cases
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 859 registered was in the state of Maharashtra i.e. 5935 and among the cases registered 3088 Person’s werearrestedand second highest cases registered were in Uttar Pradesh i.e. 4990 and among these cases 3868 person’s were arrested. The lowest cyber crime cases registered was in Madhya Pradesh i.e. 1162 and lowest person’s arrested were in west Bengal. Fig -2: The higher cyber crime countries in 2016 The above chart shows that the United States has been ranked number one (highest) cyber crime country in 2016 with a percentage of 23.96. In last year it was number two with 18.89% of threats detected globally. The Vietnam has been ranked lowest with number Ten position in cyber crimecountry in 2016 and was responsible for percentage of 2.16 of global threatdetection.Inlastyearit was 0.89%.India has been ranked with number four in cyber crime in 2016 with a percentage of 5.11. Last year it was in number three position Fig -3 : Top Ten Hacking Countries The above chart shows that china has been ranked number one (highest) hacking country in 2016 with a 41 percentage. It is also believed that organized hacker networks are run in china. The Hungary has been ranked lowest with number ten position in hacking country in 2016 with a 1.40 percentage. India has been ranked with number eight in hackingcountry in 2016 with a percentage of 2.30. Fig-4: Different Types Of Cyber Attacks The above chart signifies the different types of cyber crimes. As we can see the highest cyber crime type is virus with 85 percentage. The lowest cyber crime type is financial fraud with 11 percentage. 3.1 precautions for overcoming from cyber crimes Insert firewalls , pop up blocker Uninstall unnecessary software Maintain backup Check security settings Use secure connection Open attachments carefully Use strong passwords, don’t give personal information unless Never give your full name or address to strangers Learn more about Internet privacy. 4. Findings: The highest cybercrime in India was reported in Maharashtra and Uttar Pradesh. The lowest reported was Madhya Pradesh. It was found that the highest cybercrime country in 2016 was The United States. The lowest was Vietnam The highest hacking country was china. Whereas lowest was hacking country was Hungary The different types of cyber attacks found were as follows Viruses, Employee abuse of internet
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 860 Privileges, unauthorized access by outside, denial service etc. Various precautions have been found to overcome cyber-attacks . 5. Conclusions All the way through my research on cybercrimeandsecurity will be helpful to spread the awareness among normal people about emerging security threats. The key is to protecting yourself and being aware there is a whole other world in cyberspace makes sure that your information travels safely. The only system which is truly secured is one which is switched off and unplugged. So only way to be safe is pay attention and act smart. REFERENCES [1] http://www.businessinsider.com/worlds-10- cybercrime-hotspots-in-2016-ranked-symantec-2017- 5?IR=T#10-vietnam-216-1 [2] https://cyware.com/news/top-10-countries-with- most-hackers-in-the-world-42e1c94e [3] https://factly.in/cyber-crimes-in-india-which-state- tops-the-chart/ [4] https://www.google.co.in/ [5] https://www.slideshare.net/bijayguyz/cyber- security-prt [6] https://www.wikipedia.org/ BIOGRAPHIES MBA student ,KLS Gogte Institute of Technology, Belagavi
Download now