SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 3, March-April 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1978
Cyber Crime and Cyber Security
Gajendra Kumar Malviya
Associate Professor, Sociology, Government PG College, Jhalawar, Rajasthan, India
ABSTRACT
The crime that involves and uses computer devices and Internet, is
known as cybercrime. Cybercrime can be committed against an
individual or a group; it can also be committed against government
and private organizations. It may be intended to harm someone’s
reputation, physical harm, or even mental harm. Cyber security is a
potential activity by which information and other communication
systems are protected from and/or defended against the unauthorized
use or modification or exploitation or even theft. Likewise, cyber
security is a well-designed technique to protect computers, networks,
different programs, personal data, etc., from unauthorized access. All
sorts of data whether it is government, corporate, or personal need
high security; however, some of the data, which belongs to the
government defense system, banks, defense research and
development organization, etc. are highly confidential and even small
amount of negligence to these data may cause great damage to the
whole nation. Therefore, such data need security at a very high level.
KEYWORDS: cyber, crime, security, internet, computer, nation,
government, banks, corporate
How to cite this paper: Gajendra Kumar
Malviya "Cyber Crime and Cyber
Security" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-6 |
Issue-3, April 2022,
pp.1978-1986, URL:
www.ijtsrd.com/papers/ijtsrd49888.pdf
Copyright © 2022 by author (s) and
International Journal of Trend in
Scientific Research
and Development
Journal. This is an
Open Access article distributed under
the terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
Cyber crimes are increasingly becoming social
engineering, where cyber criminals invest resources
and time to gain knowledge about technical and
scientific aspects of cyber security and because of that
the term “cybercrime” is often confused with the term
“cyber security”. Even though the two are extremely
different and belong to different areas of expertise,
yet they are interrelated with each other. Cyber crime
is a crime that involves the use of computer devices
and the Internet. It can be committed against an
individual, a group of people, government and private
organizations. Usually it is intended to harm
someone’s reputation, cause physical or mental harm
or to benefit from it, for example, monetary benefits,
spreading hate and terror etc. As happened in 1998, a
group of Tamil guerrillas, known as Tamil Tigers,
sent over 800 e-mails to Sri Lankan embassies. [1,2]
The mails read “We are the Internet Black Tigers and
we’re doing this to disrupt your communications.”
Intelligence authorities identified it as the first known
attack by terrorists against a country’s computer
systems. The main principle of cyber crime law is
punishing unauthorized access or illegal use of
computer systems and the internet with criminal
intentions, so that damage and alteration of systems
and data on it can be prevented. However, the largest
threat of cybercrime is on the financial security of an
individual as well as the government.[3,4]
IJTSRD49888
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1979
Cyber security is a technique to protect computers, networks, programs, personal data, etc., from unauthorized
access and threats. It is an activity by which information and other communication systems are protected and
defended against the unauthorized use or modification or exploitation of the device. [5,6] Cyber security is also
called information technology security. It includes the techniques of protecting computers, networks, programs
and data from unauthorized access or attacks that can cause damage to them or exploit them in any way.[7,8]
Basically cyber security is a technical approach to secure systems from such attacks. Good cyber security
recognizes all the vulnerabilities and threats a computer system or network contains. It then identifies the cause
of such vulnerabilities and fixes those vulnerabilities and threats and secures the system. Strong cyber security
programs are based on a combination of technological and human elements.[9,10]
There are certain aspects on which cyber crime and cyber security can be differentiated upon, they are:
Types of crimes: In cyber security, the kinds of crimes are where a computer software or hardware or
computer network, is the main target (ransomware, viruses, worms, distributed denial of service attacks etc).
In Cyber crimes, the crimes are where an individual or a group of individuals and their data is the main target.
Governments and organizations can also be the targets of cyber crimes (cyber bullying, hate speech, child
pornography trafficking, trolling).[11,12]
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1980
Victims: Victims in these two fields are also different. In cyber security, victims are governments and
corporations whereas, in cyber crimes, the range of victims is rather broad as victims can extend from
individuals, families, organizations, governments and corporations.
Area of Study: Both these fields are studied in different areas. Cyber security is dealt with under Computer
science, computer engineering, and information technology. Coding, networking and engineering strategies
are used for making networks more secure.
On the other hand, cyber crimes are dealt with under Criminology, psychology, sociology. Basically, it is the
theoretical understanding of how and why crime is committed and how it can be prevented.[13]
For a strong cyber security system certain elements are needed. The elements are as following:
Application security: Applications play an essential role in business ventures; that is whyevery firm needs to
focus on web application security. Web application security is important in order to protect customers, their
information and interests. Application security helps in thwarting any attempts to violate the authorization
limits set by the security policies of the computer system or networks.
Information security: Information includes business records, personal data, customer’s data, intellectual
property etc; hence, it is important for a corporation to have strong cyber security for information to prevent
its leakage.[14,15]
Information security involves safeguarding sensitive information from illegitimate access, usage, or any other
kind of damage. This also ensures that the important data does not get lost when any issue like natural disasters,
malfunction of system, theft or other potentially damaging situation arises. The characteristics defining
information security are confidentiality, integrity and availability. Information security also includes Data
Confidentiality, Data integrity, Data availability, and Data authenticity.
Network Security: Network security consists of protecting the usability and reliability of network and data. A
network penetration test is conducted to assess the vulnerabilities in a system and network.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1981
It refers to broad range security policies for thwarting and monitoring unauthorized access, misuse, damage to a
computer system and other network systems. Network security extends coverage to diverse computer networks,
surrounding private and public communication systems among corporations and organizations.[16,17]
Disaster Recovery/ Business continuity planning: Business continuity planning (BCP), also known as
disaster recovery, is about being prepared for any kind of interference or cyber threat by identifying threats
to the systems on time and analyzing how it may affect the operations and methods to counter that threat.
Operational security (OPSEC): Operations security is used to protect organization functions. It identifies
important information and assets to track down threats and vulnerabilities that exist in the functional method.
End-user education: It is important for an organization to train their employees about cyber security because
human error is one of the major causes of data breaches. Every employee should be aware of the common
cyber threats and should have the knowledge to deal with them.
Training will allow management to accustom themselves with system users and threats to it and user training
will help in eliminating resistance to change and advancements and lead to user scrutinyon a closer level.[18,19]
Leadership commitment: It is important to have leadership commitment in organization and corporations in
order to have a strong cyber security program. Without having the leadership in the team it is complicated to
develop, implement and maintain the cyber security processes.
Discussion
The cyber crimes may be broadly classified into four groups. They are:
Crime against the Individuals
Crimes against the individual refers to those criminal offences which are committed against the will of an
individual to cause certain harm to them like physical or mental harm. For example assault, harassment,
kidnapping, and stalking etc. but in cyber crimes the nature of crimes against individual changes a little bit and
takes the form of cyber stalking, pornography, cyber bulling, child abuse, fraud, cyber threats etc.[20,21] Such as
cyber defamation is committed to cause harm to the reputation of an individual in the eyes of other individuals
through the cyberspace. A few cyber crimes against individuals are:
1. Harassment via electronic mails.
2. Dissemination of obscene material.
3. Cyber-stalking.
4. Defamation.
5. Indecent exposure.
6. Cheating.
7. Unauthorized control/access over computer system.
8. Email spoofing.
9. Fraud.[22,23]
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1982
Crime against Property
The second category of cyber crime is that of cyber crimes against property. With the growth of international
trade, businesses and consumers are increasingly using computer and the internet to create, transmit and store
information in the electronic from instead of traditional form. This has ultimately lead to certain cyber offences
which affect a person’s property. These types of cyber crimes include cyber vandalism to steal information of
other organizations or to steal someone’s bank details, use software to gain access to an organization’s website
etc. This is similar to instances of a criminal illegally possessing an individual’s bank or credit card details. In
cyber crime, the hacker steals a person’s bank details to gain access to funds, make purchases online or run
phishing scams to get people to give away their information. They could also use any kind of malicious software
to gain access to a web page with confidential information. These types of crimes include vandalism of
computers, intellectual property crimes (Copyright, patented, trademark etc), online threatening etc. Cyber
crimes against property include:
1. Computer vandalism.
2. Transmitting virus.
3. Net-trespass.
4. Unauthorized access / control over computer system.
5. Internet thefts.
6. Intellectual Property crimes
7. Software piracy.
8. Copyright infringement.
9. Trademark infringement.
Crime against Governments or Organizations
There are certain cyber crimes committed to threaten the international governments or organizations. These
cyber crimes are mainly committed for the purpose of spreading terror among people of a particular country.
[24,25]
The instigators or perpetrators of such crimes can be governments of enemy nations, terrorist groups or
belligerents etc. Cyber crimes against Government include cyber attack on the government website, military
website or cyber terrorism etc. In these kinds of cyber crime, cyber criminals hack governments or
organization’s websites, government firm, and military websites and then circulate propaganda or threats or
rumors. These cyber crimes are known as cybercrimes against Governments or Organizations. Following are the
few examples of crime against Governments or Organizations:
1. Unauthorized access / control over computer system.
2. Cyber terrorism against the government or organization.
3. Possession of unauthorized information.
4. Distribution of Pirate software.
Crime against Society
Those cyber crimes which affect the society at large are known as cyber crimes against society. These unlawful
acts are committed with the intention of causing harm or such alterations to the cyberspace which will
automatically affect the large number of people of society. The main target of these types of crimes is public at
large and societal interests. [26,27] The cyber crimes against society include the following types of crimes:
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1983
1. Child pornography.
2. Indecent exposure of polluting the youth financial crimes.
3. Sale of illegal articles.
4. Trafficking.
5. Forgery.
6. Online gambling.
7. Web jacking.
Results
Protect Yourself
Taking the right security measures and being alert and aware when connected are key ways to prevent cyber
intrusions and online crimes. Learn how to protect your computer, network, and personal information.
Understand Common Crimes and Risks Online
Business email compromise (BEC) scams exploit the fact that so many of us rely on email to conduct
business—both personal and professional—and it’s one of the most financially damaging online crimes.
Identity theft happens when someone steals your personal information, like your Social Security number,
and uses it to commit theft or fraud.
Ransom ware is a type of malicious software, or malware, that prevents you from accessing your computer
files, systems, or networks and demands you pay a ransom for their return.
Spoofing and phishing are schemes aimed at tricking you into providing sensitive information to scammers.
Online predators are a growing threat to young people.
More common crimes and scams[28]
Our adversaries look to exploit gaps in our intelligence and information security networks. The FBI is committed
to working with our federal counterparts, our foreign partners, and the private sector to close those gaps.
These partnerships allow us to defend networks, attribute malicious activity, sanction bad behavior, and take the
fight to our adversaries overseas. The FBI fosters this team approach through unique hubs where government,
industry, and academia form long-term trusted relationships to combine efforts against cyber threats.
Within government, that hub is the National Cyber Investigative Joint Task Force (NCIJTF). The FBI leads this
task force of more than 30 co-located agencies from the Intelligence Community and law enforcement. The
NCIJTF is organized around mission centers based on key cyber threat areas and led by senior executives from
partner agencies. Through these mission centers, operations and intelligence are integrated for maximum impact
against U.S. adversaries.
Only together can we achieve safety, security, and confidence in a digitally connected world.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1984
Whether through developing innovative investigative techniques, using cutting-edge analytic tools, or forging
new partnerships in our communities, the FBI continues to adapt to meet the challenges posed by the evolving
cyber threat.[29]
The FBI has specially trained cyber squads in each of our 56 field offices, working hand-in-hand with
interagency task force partners. The rapid-response Cyber Action Team can deploy across the country within
hours to respond to major incidents. With cyber assistant legal attachés in embassies across the globe, the FBI
works closely with our international counterparts to seek justice for victims of malicious cyber activity.
The Internet Crime Complaint Center (IC3) collects reports of Internet crime from the public. Using such
complaints, the IC3’s Recovery Asset Team has assisted in freezing hundreds of thousands of dollars for victims
of cyber crime. Cy Watch is the FBI’s 24/7 operations center and watch floor, providing around-the-clock
support to track incidents and communicate with field offices across the country.
Conclusion
Malicious cyber activity threatens the public’s safety and our national and economic security. The FBI’s cyber
strategy is to impose risk and consequences on cyber adversaries.
Our goal is to change the behavior of criminals and
nation-states who believe they can compromise U.S.
networks, steal financial and intellectual property, and
put critical infrastructure at risk without facing risk
themselves. To do this, we use our unique mix of
authorities, capabilities, and partnerships to impose
consequences against our cyber adversaries.
The FBI is the lead federal agency for investigating
cyber attacks and intrusions. We collect and share
intelligence and engage with victims while working
to unmask those committing malicious cyber
activities, wherever they are.
Cyber security can be considered as a set of
guidelines and actions intended and needed to prevent
cybercrime but cyber security is not only limited to
that. The two types of problems differ considerably in
terms of what happens and who the victims are, as
well as the academic areas that studythem. Therefore,
the two, cyber security and cyber crimes, must be
considered as separate issues, with different
safeguards designed to address the different privacy
and security issues of each.
All sorts of data whether it is personal, governmental,
or corporate need high security. Some of the data,
which belongs to the government defense system,
scientific research and developments, banks, defense
research and development organization, etc. are
highly confidential and even small amount of
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1985
negligence to these data may cause great damage to
the whole nation or society at large, therefore, such
data need security at a very high level.
Hence, cyber security is all about protecting
government, organizations and corporate networks,
intending to make it difficult for hackers to find
weaknesses and exploit them or threaten
them. Cybercrime, on the other hand, tends to focus
more on individuals and families online. It is highly
needed that the top leaders of an organization or
government should invest in the cyber security
measures to make it strong and impenetrable. [30]
References
[1] Cyber Crime and Cyber Security; tutorials
point; Date of Access: 30.10.2019
<https://www.tutorialspoint.com/fundamentals_
of_science_and_technology/cyber_crime_and_
cyber_security.htm>
[2] The difference between cyber security and
cybercrime, and why it matters by Roderick S.
Graham; The Conversation; Dated: 19.10.2017;
Date of Access: 30.10.2019 <
https://theconversation.com/the-difference-
between-cybersecurity-and-cybercrime-and-
why-it-matters-85654>
[3] Understanding the Difference between Cyber
Security and Cyber Crime; Privacy
International; Date of Access: 30.10.2019
<https://privacyinternational.org/explainer-
graphic/2273/understanding-difference-
between-cyber-security-and-cyber-crime>
[4] Elements of cyber security by Robert
Roohparvar; InfoGuard Cyber Security; Dated:
02.03.2019; Date of Access: 30.10.2019 <
http://www.infoguardsecurity.com/elements-of-
cybersecurity/>
[5] Elements of Cyber Security; Cross Domain
Solutions; Date of Access: 30.10.2019 <
http://www.crossdomainsolutions.com/cyber-
security/elements/>
[6] Chapter III: Meaning, Concept and
Classification of Cyber Crime; Shodhganga;
<https://shodhganga.inflibnet.ac.in/bitstream/10
603/188293/11/11_cha%5bpter%203.pdf>
[7] Types of cyber crime; Panda Security; Dated:
20.08.2018; Date of Access: 30.10.2019 <
https://www.pandasecurity.com/mediacenter/pa
nda-security/types-of-cybercrime/>
[8] Cyber Crime Vs Cyber Security: What Will
You Choose?; Europol; Date of Access:
30.10.2019
<https://www.europol.europa.eu/activities-
services/public-awareness-and-prevention-
guides/cyber-crime-vs-cyber-security-what-
will-you-choose>
[9] Balkin, J., Grimmelmann, J., Katz, E.,
Kozlovski, N., Wagman, S. & Zarsky, T.
(2006) (eds) Cybercrime: Digital Cops in a
Networked Environment, New York University
Press, New York.
[10] Bowker, Art (2012) "The Cybercrime
Handbook for Community Corrections:
Managing Risk in the 21st Century" Charles C.
Thomas Publishers, Ltd. Springfield.
[11] Brenner, S. (2007) Law in an Era of Smart
Technology, Oxford: Oxford University Press
[12] Broadhurst, R., and Chang, Lennon Y.C.
(2013) "Cybercrime in Asia: trends and
challenges", in B. Hebenton, SY Shou, & J. Liu
(eds), Asian Handbook of Criminology (pp.
49–64). New York: Springer (ISBN 978-1-
4614-5217-1)
[13] Chang, L.Y. C. (2012) Cybercrime in the
Greater China Region: Regulatory Responses
and Crime Prevention across the Taiwan Strait.
Cheltenham: Edward Elgar. (ISBN 978-0-
85793-667-7)
[14] Chang, Lennon Y.C., & Grabosky, P. (2014)
"Cybercrime and establishing a secure cyber
world", in M. Gill (ed) Handbook of Security
(pp. 321–339). NY: Palgrave.
[15] Csonka P. (2000) Internet Crime; the Draft
council of Europe convention on cyber-crime:
A response to the challenge of crime in the age
of the internet? Computer Law & Security
Report Vol.16 no.5.
[16] Easttom, C. (2010) Computer Crime
Investigation and the Law
[17] Fafinski, S. (2009) Computer Misuse:
Response, regulation and the law Cullompton:
Willan
[18] Glenny, M. DarkMarket : cyberthieves,
cybercops, and you, New York, NY : Alfred A.
Knopf, 2011. ISBN 978-0-307-59293-4
[19] Grabosky, P. (2006) Electronic Crime, New
Jersey: Prentice Hall
[20] Halder, D., & Jaishankar, K. (2016). Cyber
Crimes against Women in India. New Delhi:
SAGE Publishing. ISBN 978-9385985775.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1986
[21] Jeremy Bob, Yonah (2021) "Ex-IDF cyber
intel. official reveals secrets behind cyber
offense". The Jerusalem Post
[22] Branch, J. (2020). "What's in a Name?
Metaphors and Cybersecurity." International
Organization.
[23] Costigan, Sean; Hennessy, Michael (2016).
Cybersecurity: A Generic Reference
Curriculum (PDF). NATO. ISBN 978-
9284501960.
[24] Fuller, Christopher J. "The Roots of the United
States’ Cyber (In)Security," Diplomatic History
43:1 (2019): 157–185. online
[25] Kim, Peter (2014). The Hacker Playbook:
Practical Guide To Penetration Testing. Seattle:
CreateSpace Independent Publishing Platform.
ISBN 978-1494932633.
[26] Lee, Newton (2015). Counterterrorism and
Cybersecurity: Total Information Awareness
(2nd ed.). Springer. ISBN 978-3319172439.
[27] Montagnani, Maria Lillà and Cavallo, Mirta
Antonella (26 July 2018). "Cybersecurity and
Liability in a Big Data World". SSRN.
[28] Singer, P. W.; Friedman, Allan (2014).
Cybersecurity and Cyberwar: What Everyone
Needs to Know. Oxford University Press. ISBN
978-0199918119.
[29] Wu, Chwan-Hwa (John); Irwin, J. David
(2013). Introduction to Computer Networks and
Cybersecurity. Boca Raton: CRC Press. ISBN
978-1466572133.
[30] M. Shariati et al. / Procedia Computer Science
3 (2011) 537–543. Enterprise information
security, a review of architectures and
frameworks from interoperability perspective

More Related Content

Similar to Cyber Crime and Cyber Security

A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
Amy Cernava
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
Dolchandra
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
CSCJournals
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
Suleiman55
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
INFOGAIN PUBLICATION
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
Government
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
IJICTJOURNAL
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
sulu98
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
ssuser793b4e
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
windows21
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
CR Group
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
jasonuchiha2
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...
nooriasukmaningtyas
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdf
Arlene Smith
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
bartholomeocoombs
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
Jeewanthi Fernando
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
ijtsrd
 

Similar to Cyber Crime and Cyber Security (20)

A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
Information security threats encountered by Malaysian public sector data cen...
Information security threats encountered by Malaysian public  sector data cen...Information security threats encountered by Malaysian public  sector data cen...
Information security threats encountered by Malaysian public sector data cen...
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdf
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 

Cyber Crime and Cyber Security

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 3, March-April 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1978 Cyber Crime and Cyber Security Gajendra Kumar Malviya Associate Professor, Sociology, Government PG College, Jhalawar, Rajasthan, India ABSTRACT The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cyber security is a potential activity by which information and other communication systems are protected from and/or defended against the unauthorized use or modification or exploitation or even theft. Likewise, cyber security is a well-designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access. All sorts of data whether it is government, corporate, or personal need high security; however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level. KEYWORDS: cyber, crime, security, internet, computer, nation, government, banks, corporate How to cite this paper: Gajendra Kumar Malviya "Cyber Crime and Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-6 | Issue-3, April 2022, pp.1978-1986, URL: www.ijtsrd.com/papers/ijtsrd49888.pdf Copyright © 2022 by author (s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION Cyber crimes are increasingly becoming social engineering, where cyber criminals invest resources and time to gain knowledge about technical and scientific aspects of cyber security and because of that the term “cybercrime” is often confused with the term “cyber security”. Even though the two are extremely different and belong to different areas of expertise, yet they are interrelated with each other. Cyber crime is a crime that involves the use of computer devices and the Internet. It can be committed against an individual, a group of people, government and private organizations. Usually it is intended to harm someone’s reputation, cause physical or mental harm or to benefit from it, for example, monetary benefits, spreading hate and terror etc. As happened in 1998, a group of Tamil guerrillas, known as Tamil Tigers, sent over 800 e-mails to Sri Lankan embassies. [1,2] The mails read “We are the Internet Black Tigers and we’re doing this to disrupt your communications.” Intelligence authorities identified it as the first known attack by terrorists against a country’s computer systems. The main principle of cyber crime law is punishing unauthorized access or illegal use of computer systems and the internet with criminal intentions, so that damage and alteration of systems and data on it can be prevented. However, the largest threat of cybercrime is on the financial security of an individual as well as the government.[3,4] IJTSRD49888
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1979 Cyber security is a technique to protect computers, networks, programs, personal data, etc., from unauthorized access and threats. It is an activity by which information and other communication systems are protected and defended against the unauthorized use or modification or exploitation of the device. [5,6] Cyber security is also called information technology security. It includes the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that can cause damage to them or exploit them in any way.[7,8] Basically cyber security is a technical approach to secure systems from such attacks. Good cyber security recognizes all the vulnerabilities and threats a computer system or network contains. It then identifies the cause of such vulnerabilities and fixes those vulnerabilities and threats and secures the system. Strong cyber security programs are based on a combination of technological and human elements.[9,10] There are certain aspects on which cyber crime and cyber security can be differentiated upon, they are: Types of crimes: In cyber security, the kinds of crimes are where a computer software or hardware or computer network, is the main target (ransomware, viruses, worms, distributed denial of service attacks etc). In Cyber crimes, the crimes are where an individual or a group of individuals and their data is the main target. Governments and organizations can also be the targets of cyber crimes (cyber bullying, hate speech, child pornography trafficking, trolling).[11,12]
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1980 Victims: Victims in these two fields are also different. In cyber security, victims are governments and corporations whereas, in cyber crimes, the range of victims is rather broad as victims can extend from individuals, families, organizations, governments and corporations. Area of Study: Both these fields are studied in different areas. Cyber security is dealt with under Computer science, computer engineering, and information technology. Coding, networking and engineering strategies are used for making networks more secure. On the other hand, cyber crimes are dealt with under Criminology, psychology, sociology. Basically, it is the theoretical understanding of how and why crime is committed and how it can be prevented.[13] For a strong cyber security system certain elements are needed. The elements are as following: Application security: Applications play an essential role in business ventures; that is whyevery firm needs to focus on web application security. Web application security is important in order to protect customers, their information and interests. Application security helps in thwarting any attempts to violate the authorization limits set by the security policies of the computer system or networks. Information security: Information includes business records, personal data, customer’s data, intellectual property etc; hence, it is important for a corporation to have strong cyber security for information to prevent its leakage.[14,15] Information security involves safeguarding sensitive information from illegitimate access, usage, or any other kind of damage. This also ensures that the important data does not get lost when any issue like natural disasters, malfunction of system, theft or other potentially damaging situation arises. The characteristics defining information security are confidentiality, integrity and availability. Information security also includes Data Confidentiality, Data integrity, Data availability, and Data authenticity. Network Security: Network security consists of protecting the usability and reliability of network and data. A network penetration test is conducted to assess the vulnerabilities in a system and network.
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1981 It refers to broad range security policies for thwarting and monitoring unauthorized access, misuse, damage to a computer system and other network systems. Network security extends coverage to diverse computer networks, surrounding private and public communication systems among corporations and organizations.[16,17] Disaster Recovery/ Business continuity planning: Business continuity planning (BCP), also known as disaster recovery, is about being prepared for any kind of interference or cyber threat by identifying threats to the systems on time and analyzing how it may affect the operations and methods to counter that threat. Operational security (OPSEC): Operations security is used to protect organization functions. It identifies important information and assets to track down threats and vulnerabilities that exist in the functional method. End-user education: It is important for an organization to train their employees about cyber security because human error is one of the major causes of data breaches. Every employee should be aware of the common cyber threats and should have the knowledge to deal with them. Training will allow management to accustom themselves with system users and threats to it and user training will help in eliminating resistance to change and advancements and lead to user scrutinyon a closer level.[18,19] Leadership commitment: It is important to have leadership commitment in organization and corporations in order to have a strong cyber security program. Without having the leadership in the team it is complicated to develop, implement and maintain the cyber security processes. Discussion The cyber crimes may be broadly classified into four groups. They are: Crime against the Individuals Crimes against the individual refers to those criminal offences which are committed against the will of an individual to cause certain harm to them like physical or mental harm. For example assault, harassment, kidnapping, and stalking etc. but in cyber crimes the nature of crimes against individual changes a little bit and takes the form of cyber stalking, pornography, cyber bulling, child abuse, fraud, cyber threats etc.[20,21] Such as cyber defamation is committed to cause harm to the reputation of an individual in the eyes of other individuals through the cyberspace. A few cyber crimes against individuals are: 1. Harassment via electronic mails. 2. Dissemination of obscene material. 3. Cyber-stalking. 4. Defamation. 5. Indecent exposure. 6. Cheating. 7. Unauthorized control/access over computer system. 8. Email spoofing. 9. Fraud.[22,23]
  • 5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1982 Crime against Property The second category of cyber crime is that of cyber crimes against property. With the growth of international trade, businesses and consumers are increasingly using computer and the internet to create, transmit and store information in the electronic from instead of traditional form. This has ultimately lead to certain cyber offences which affect a person’s property. These types of cyber crimes include cyber vandalism to steal information of other organizations or to steal someone’s bank details, use software to gain access to an organization’s website etc. This is similar to instances of a criminal illegally possessing an individual’s bank or credit card details. In cyber crime, the hacker steals a person’s bank details to gain access to funds, make purchases online or run phishing scams to get people to give away their information. They could also use any kind of malicious software to gain access to a web page with confidential information. These types of crimes include vandalism of computers, intellectual property crimes (Copyright, patented, trademark etc), online threatening etc. Cyber crimes against property include: 1. Computer vandalism. 2. Transmitting virus. 3. Net-trespass. 4. Unauthorized access / control over computer system. 5. Internet thefts. 6. Intellectual Property crimes 7. Software piracy. 8. Copyright infringement. 9. Trademark infringement. Crime against Governments or Organizations There are certain cyber crimes committed to threaten the international governments or organizations. These cyber crimes are mainly committed for the purpose of spreading terror among people of a particular country. [24,25] The instigators or perpetrators of such crimes can be governments of enemy nations, terrorist groups or belligerents etc. Cyber crimes against Government include cyber attack on the government website, military website or cyber terrorism etc. In these kinds of cyber crime, cyber criminals hack governments or organization’s websites, government firm, and military websites and then circulate propaganda or threats or rumors. These cyber crimes are known as cybercrimes against Governments or Organizations. Following are the few examples of crime against Governments or Organizations: 1. Unauthorized access / control over computer system. 2. Cyber terrorism against the government or organization. 3. Possession of unauthorized information. 4. Distribution of Pirate software. Crime against Society Those cyber crimes which affect the society at large are known as cyber crimes against society. These unlawful acts are committed with the intention of causing harm or such alterations to the cyberspace which will automatically affect the large number of people of society. The main target of these types of crimes is public at large and societal interests. [26,27] The cyber crimes against society include the following types of crimes:
  • 6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1983 1. Child pornography. 2. Indecent exposure of polluting the youth financial crimes. 3. Sale of illegal articles. 4. Trafficking. 5. Forgery. 6. Online gambling. 7. Web jacking. Results Protect Yourself Taking the right security measures and being alert and aware when connected are key ways to prevent cyber intrusions and online crimes. Learn how to protect your computer, network, and personal information. Understand Common Crimes and Risks Online Business email compromise (BEC) scams exploit the fact that so many of us rely on email to conduct business—both personal and professional—and it’s one of the most financially damaging online crimes. Identity theft happens when someone steals your personal information, like your Social Security number, and uses it to commit theft or fraud. Ransom ware is a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Spoofing and phishing are schemes aimed at tricking you into providing sensitive information to scammers. Online predators are a growing threat to young people. More common crimes and scams[28] Our adversaries look to exploit gaps in our intelligence and information security networks. The FBI is committed to working with our federal counterparts, our foreign partners, and the private sector to close those gaps. These partnerships allow us to defend networks, attribute malicious activity, sanction bad behavior, and take the fight to our adversaries overseas. The FBI fosters this team approach through unique hubs where government, industry, and academia form long-term trusted relationships to combine efforts against cyber threats. Within government, that hub is the National Cyber Investigative Joint Task Force (NCIJTF). The FBI leads this task force of more than 30 co-located agencies from the Intelligence Community and law enforcement. The NCIJTF is organized around mission centers based on key cyber threat areas and led by senior executives from partner agencies. Through these mission centers, operations and intelligence are integrated for maximum impact against U.S. adversaries. Only together can we achieve safety, security, and confidence in a digitally connected world.
  • 7. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1984 Whether through developing innovative investigative techniques, using cutting-edge analytic tools, or forging new partnerships in our communities, the FBI continues to adapt to meet the challenges posed by the evolving cyber threat.[29] The FBI has specially trained cyber squads in each of our 56 field offices, working hand-in-hand with interagency task force partners. The rapid-response Cyber Action Team can deploy across the country within hours to respond to major incidents. With cyber assistant legal attachés in embassies across the globe, the FBI works closely with our international counterparts to seek justice for victims of malicious cyber activity. The Internet Crime Complaint Center (IC3) collects reports of Internet crime from the public. Using such complaints, the IC3’s Recovery Asset Team has assisted in freezing hundreds of thousands of dollars for victims of cyber crime. Cy Watch is the FBI’s 24/7 operations center and watch floor, providing around-the-clock support to track incidents and communicate with field offices across the country. Conclusion Malicious cyber activity threatens the public’s safety and our national and economic security. The FBI’s cyber strategy is to impose risk and consequences on cyber adversaries. Our goal is to change the behavior of criminals and nation-states who believe they can compromise U.S. networks, steal financial and intellectual property, and put critical infrastructure at risk without facing risk themselves. To do this, we use our unique mix of authorities, capabilities, and partnerships to impose consequences against our cyber adversaries. The FBI is the lead federal agency for investigating cyber attacks and intrusions. We collect and share intelligence and engage with victims while working to unmask those committing malicious cyber activities, wherever they are. Cyber security can be considered as a set of guidelines and actions intended and needed to prevent cybercrime but cyber security is not only limited to that. The two types of problems differ considerably in terms of what happens and who the victims are, as well as the academic areas that studythem. Therefore, the two, cyber security and cyber crimes, must be considered as separate issues, with different safeguards designed to address the different privacy and security issues of each. All sorts of data whether it is personal, governmental, or corporate need high security. Some of the data, which belongs to the government defense system, scientific research and developments, banks, defense research and development organization, etc. are highly confidential and even small amount of
  • 8. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1985 negligence to these data may cause great damage to the whole nation or society at large, therefore, such data need security at a very high level. Hence, cyber security is all about protecting government, organizations and corporate networks, intending to make it difficult for hackers to find weaknesses and exploit them or threaten them. Cybercrime, on the other hand, tends to focus more on individuals and families online. It is highly needed that the top leaders of an organization or government should invest in the cyber security measures to make it strong and impenetrable. [30] References [1] Cyber Crime and Cyber Security; tutorials point; Date of Access: 30.10.2019 <https://www.tutorialspoint.com/fundamentals_ of_science_and_technology/cyber_crime_and_ cyber_security.htm> [2] The difference between cyber security and cybercrime, and why it matters by Roderick S. Graham; The Conversation; Dated: 19.10.2017; Date of Access: 30.10.2019 < https://theconversation.com/the-difference- between-cybersecurity-and-cybercrime-and- why-it-matters-85654> [3] Understanding the Difference between Cyber Security and Cyber Crime; Privacy International; Date of Access: 30.10.2019 <https://privacyinternational.org/explainer- graphic/2273/understanding-difference- between-cyber-security-and-cyber-crime> [4] Elements of cyber security by Robert Roohparvar; InfoGuard Cyber Security; Dated: 02.03.2019; Date of Access: 30.10.2019 < http://www.infoguardsecurity.com/elements-of- cybersecurity/> [5] Elements of Cyber Security; Cross Domain Solutions; Date of Access: 30.10.2019 < http://www.crossdomainsolutions.com/cyber- security/elements/> [6] Chapter III: Meaning, Concept and Classification of Cyber Crime; Shodhganga; <https://shodhganga.inflibnet.ac.in/bitstream/10 603/188293/11/11_cha%5bpter%203.pdf> [7] Types of cyber crime; Panda Security; Dated: 20.08.2018; Date of Access: 30.10.2019 < https://www.pandasecurity.com/mediacenter/pa nda-security/types-of-cybercrime/> [8] Cyber Crime Vs Cyber Security: What Will You Choose?; Europol; Date of Access: 30.10.2019 <https://www.europol.europa.eu/activities- services/public-awareness-and-prevention- guides/cyber-crime-vs-cyber-security-what- will-you-choose> [9] Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, N., Wagman, S. & Zarsky, T. (2006) (eds) Cybercrime: Digital Cops in a Networked Environment, New York University Press, New York. [10] Bowker, Art (2012) "The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century" Charles C. Thomas Publishers, Ltd. Springfield. [11] Brenner, S. (2007) Law in an Era of Smart Technology, Oxford: Oxford University Press [12] Broadhurst, R., and Chang, Lennon Y.C. (2013) "Cybercrime in Asia: trends and challenges", in B. Hebenton, SY Shou, & J. Liu (eds), Asian Handbook of Criminology (pp. 49–64). New York: Springer (ISBN 978-1- 4614-5217-1) [13] Chang, L.Y. C. (2012) Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention across the Taiwan Strait. Cheltenham: Edward Elgar. (ISBN 978-0- 85793-667-7) [14] Chang, Lennon Y.C., & Grabosky, P. (2014) "Cybercrime and establishing a secure cyber world", in M. Gill (ed) Handbook of Security (pp. 321–339). NY: Palgrave. [15] Csonka P. (2000) Internet Crime; the Draft council of Europe convention on cyber-crime: A response to the challenge of crime in the age of the internet? Computer Law & Security Report Vol.16 no.5. [16] Easttom, C. (2010) Computer Crime Investigation and the Law [17] Fafinski, S. (2009) Computer Misuse: Response, regulation and the law Cullompton: Willan [18] Glenny, M. DarkMarket : cyberthieves, cybercops, and you, New York, NY : Alfred A. Knopf, 2011. ISBN 978-0-307-59293-4 [19] Grabosky, P. (2006) Electronic Crime, New Jersey: Prentice Hall [20] Halder, D., & Jaishankar, K. (2016). Cyber Crimes against Women in India. New Delhi: SAGE Publishing. ISBN 978-9385985775.
  • 9. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD49888 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 1986 [21] Jeremy Bob, Yonah (2021) "Ex-IDF cyber intel. official reveals secrets behind cyber offense". The Jerusalem Post [22] Branch, J. (2020). "What's in a Name? Metaphors and Cybersecurity." International Organization. [23] Costigan, Sean; Hennessy, Michael (2016). Cybersecurity: A Generic Reference Curriculum (PDF). NATO. ISBN 978- 9284501960. [24] Fuller, Christopher J. "The Roots of the United States’ Cyber (In)Security," Diplomatic History 43:1 (2019): 157–185. online [25] Kim, Peter (2014). The Hacker Playbook: Practical Guide To Penetration Testing. Seattle: CreateSpace Independent Publishing Platform. ISBN 978-1494932633. [26] Lee, Newton (2015). Counterterrorism and Cybersecurity: Total Information Awareness (2nd ed.). Springer. ISBN 978-3319172439. [27] Montagnani, Maria Lillà and Cavallo, Mirta Antonella (26 July 2018). "Cybersecurity and Liability in a Big Data World". SSRN. [28] Singer, P. W.; Friedman, Allan (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. ISBN 978-0199918119. [29] Wu, Chwan-Hwa (John); Irwin, J. David (2013). Introduction to Computer Networks and Cybersecurity. Boca Raton: CRC Press. ISBN 978-1466572133. [30] M. Shariati et al. / Procedia Computer Science 3 (2011) 537–543. Enterprise information security, a review of architectures and frameworks from interoperability perspective