An Overview on Cyber Crime and Cyber Security

Authors

  • Bhumika Tuli Department of Computer Science and Engineering, Chandigarh Group of Colleges, Mohali, Punjab, India
  • Santosh Kumar Department of Mechanical Engineering, Chandigarh Group of Colleges, Mohali, Punjab, India
  • Neha Gautam St. Ezra International School, Mohali, Punjab, India

DOI:

https://doi.org/10.51983/ajeat-2022.11.1.3309

Keywords:

Cyber Crimes, Cyber Security, Online Scams

Abstract

Loss of information through online services is called a “footprint of cybercrime”. So the topic that we will discuss is Cyber Crime and Cyber Security. It is an important part of the information technology field. We all know that cyber crime is increasing day by day, and the government also takes measures to stop this, but it’s not dying from it’s root. In this research paper, we will discuss about the different phases of cyber crime in today’s time and the negative effects tolerated by people due to cybercrime. There are so many financial loses hanging over from heavy engagement in cyber crimes that have been discussed below. This paper also consists of topics related to cyber security, which provides safety to users. Overall, this article gives an intensive overview regarding cyber crime, the work of criminals and the cyber security and because of it how to prevent the cybercrime and make it secure, as new technology is there that comes up with new ideas to protect human life.

References

S. Gii and R. L. Shrestha, “Reform of civil service of Nepal with e-government practice,” Journal of Personnel Training Academy, Vol. 6, No. 1, pp. 22-36, 2018.

R. J. Harkneet and J. Stever, “The cyber security triad: Government,private sector partner, and the engaged cybersecurity citizen,”Journal of Homeland Security and Emergency Management, Vol. 6, No. 1, pp. 79, 2009.

A. M. Dario Sgobbi and Marco Paggio, “Intrusion in a MissionCritical Network: A Tutorial on Intrusion Detection Systems and Intrusion Prevention Systems,” Modelling Cyber Security, 2009.

E. C. Chang and J. Xu, “Remote integrity check with dishoneststorage serve,” Proceedings of the 13th European Symposium onResearch in Computer Security, pp. 223-237, 2008. [Online]. Available: http://www.vox.com/2014/5/19/5731696/chinesehackers-cyberespionage-theft-cyber.

Grispos, George, Sorren Hanvey and Bashar Nuseibeh, “Use ofOrganizational Topologies for Forensic Investigations,” pp. 2-5, 2017. [Online]. Available: http://www.theregister.co.uk/2013/03/27/ stuxnet_cyverwar_r.

S. Parto, “Economic activity and institutions: taking stock”, Journal of Economic Issues, Vol. 39, No. 1, 2005. DOI: 10.2202/1547-7355. 1649.

D. Kumar and N. Panchanatham, “A case study on Cyber Security inE-Governance,” International Research Journal of Engineering andTechnology (IRJET), Vol. 2, No. 8, pp. 272-265, 2015. [Online].Available: http://www.europarl.europa.eu/meetdocs/20142019/ documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf.

L. Serena, “A Fuzzy Approach to Security Codes: Cryptographybetween Technological Evolution and Human Perception,” Modeling Cyber Security: Approaches, Methodology, Strategies U. Gori (Ed.)IOS Press, 2009. [Online]. Available: http://www.aseanstats.org.

A. T. Kearney, Cyber security in ASEAN- AN Urgent Call to Action, 2018. [Online]. Available: https://www.cisco.com/c/dam/m/ensg/ cybersecurity/cybersecurity-inasean/files/assets/common/downloads/publication.pdf.

D. K. Mulligan and F. B. Schnelder, “Doctrine for cybersecurity,”Daedalus, Vol. 140, No. 4, pp. 70-92, 2011. [Online]. Available: https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/handbook.pdfcountry-1=TH.

P. Sitbon, “A Cyber Security Approach for Smart Meters at ERDF,”Modeling Cyber Security: Approaches, Methodology, Strategies, U.Gori (Ed.), 2009. [Online]. Available: https://www.gov.uk/ government/uploads/system/uploads/attachment_data/file/60942/Thecost-of-Cyber-Crime-Summary-Final.pdf.

H. J. Mohammed, E. AL-dahneem, A. Hamadi, “A comparativeanalysis for adopting an innovative pedagogical approach of flippedteaching for active classroom learning,” J. Glob. Bus. Soc. Entrep., Vol. 3, No. 5, pp. 86-94, 2016. https://www.mha.gov.sg/Newsroom/ press-releases/Pages/Computer-Misuse-and-Cybersecurity-(Amendment)-Bill-.aspx.

Bagyavati, “Social Engineering in Lech J. Janczewski and AndrewM.Colarik Cyber warfare and cyber terrorism,” Vol. 1, No. 1, pp. 9-15, 2009. [Online]. Available: http://capec.mitre.org/data/ definitions/117.html.

Ravi Sharma, “Study of Latest Emerging Trends on Cyber Securityand its challenges to Society,” International Journal of Scientific &Engineering Research, Vol. 3, pp. 67-75, 2012. [Online]. Available:http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-or-accessory.html.

D. Ahlstrom and G. D. Bruton, “Learning from successful localprivate firms in China: establishing legitimacy,” Academy ofManagement Executive, Vol. 15, No. 4, pp. 72-8, 2001. [Online].Available: http://business.rediff.com/slide-show/2009/aug/20/slide-show-1-india-major-hub-for-cybercrime.html.

D. Denning, “An Intrusion-Detection Model,” IEEE Transactions onSoftware Engineering, Vol. SE-13, No. 2, pp. 222-232, 1987. [Online]. Available: http://www.cyberlawsindia.net.

A. Sreehari, K. J. Abinanth, B. Sujith and P. S. Unnikuttan, “A Studyof Awareness of Cyber Crime Among College Students with SpecialReference to Kochi,” Vol. 119, No. 16, pp. 1353-1360, 2018.[Online]. Available: https://en.wikipedia.org/wiki/Demographics_of_ India.

N. Tan, “Social networking: Danger - Warning for Teens,”International Journal of Internet of Things, Vol. 1, No. 1, pp. 9-15, 2008. [Online]. Available: http://cis-india.org/internet-governance/ cyber-crime-privacy.

J. E. Oxley and B. Yeung, “E-commerce readiness: institutionalenvironment and international competitiveness,” Journal ofInternational Business Studies, Vol. 32, No. 4, pp. 705-723, 2001.[Online]. Available: http://worldwidejournals.com/paripex/file.php? val=March_2016_1458622776_05.pdf.

S. Bistarelli and F. Fioravanti and P. Peretti, “Using CP-nets as aguide for countermeasure selection,” Proceedings of the 2007 ACMSymposium on Applied Computing, pp. 300-304, 2007. [Online].Available: http://www.cs.kent.ac.uk

D. K. Mulligan and F. B. Schnelder, “Doctrine for cybersecurity,”Daedalus, Vol. 140, No. 4, pp. 70-92, 2011. [Online]. Available:http://www.gov.uk.

N. Kshetri and N. Dholakia, “Professional and trade associations in anascent and formative sector of a developing economy: A Case Studyof the NASSCOM effect on the Indian offshoring industry,” Vol. 15, No. 2, pp. 225-239, 2009.

A. M. Dario Sgobbi and Marco Paggio, “Intrusion in a MissionCritical Network: A Tutorial on Intrusion Detection Systems andIntrusion Prevention Systems,” Modelling Cyber Security:Approaches, Methodology, Strategies U. Gori (Ed.), 2009.

H. J. Mohammed, M. M. Kasim, E. A. AL-Dahneem and A. K.Hamadi, “An analytical survey on implementing best practices forintroducing e-learning programs to students,” J. Educ. Soc. Sci., Vol. 5, No. 2, pp. 191-196, 2018. http://taylorandfrancis.com.

R. J. Harkneet and J. Stever, “The cybersecurit triad: Government,private sector partner, and the engaged cybersecurity citizen,”Journal of Homeland Security and Emergency Management, Vol. 6, No. 1, pp. 79, 2009. [Online]. Available: http://www.cs.kent.ac.uk.

I. D. Fianyi, “Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics,” International Journal of ComputerScience Issues, Vol. No. 5, No. 12, 2015. [Online]. Available: http://business.kaspersky.com/threats- in-q2

N. Kshetri, “Positive externality, increasing returns and the rise incybercrimes,” Communications of the ACM, Vol. 52, No. 12, pp. 141-144, 2009. [Online]. Available: freedom-of-expression-amnesty-intl/.

I. D. Fianyi, “Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics,” International Journal of ComputerScience Issues, Vol. No. 5, No. 12, 2015. [Online]. Available: http://business.kaspersky.com/threats- in-q2

S. Back and J. LaPrade, “Cyber-situational crime prevention and thebreadth of cybercrimes among higher education institutions,”International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2, pp. 25-47, 2020, [Online]. Available: http://www.justice.gov.

D. Kumar and N. Panchanatham, “A case study on Cyber Security inE-Governance,” International Research Journal of Engineering andTechnology (IRJET), Vol. 2, No. 8, pp. 272-265, 2015. [Online]. Available: http://securityaffairs.co/wordpress/4631/cyber-crime/ analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

BSA, BSA Global Cloud Computing Scorecard, A Blueprint forEconomic Opportunity, 2013. [Online]. Available: http://arxiv.org/ abs/1106.4692v1.

M. Sharma, H. Jindal, S. Kumar and R. Kumar, “Overview of datasecurity, classification and control measure: A study”, I-managers Journal on Information Technology, Vol. 11, No. 1, pp. 17-34, 2022. [Online]. Available: https://imanagerpublications.com/article/1855 7/13.

R. J. Harkneet and J. Stever, “The cybersecurity triad: Government,private sector partner, and the engaged cybersecurity citizen,”Journal of Homeland Security and Emergency Management, Vol. 6,No. 1, 2009. [Online]. Available: http://securityaffairs.co/wordpress/ 4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

M. D. T. P. Nasution, A. P. U. Siahaan, Y. Rossanty and S. Aryza,“The Phenomenon of Cyber-Crime and Fraud Victimization in Online Shop,” International Journal of Civil Engineering andTechnology (IJCIET), Vol. 9, No. 6, pp. 1583-1592, 2018. [Online].Available: http://securityaffairs.co/wordpress/4631/cyber-crime/ analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

M. D. T. P. Nasution, A. P. U. Siahaan, Y. Rossanty and S. Aryza,“The Phenomenon of Cyber-Crime and Fraud Victimization inOnline Shop,” International Journal of Civil Engineering andTechnology (IJCIET), Vol. 9, No. 6, pp. 1583-1592, 2018. [Online]. Available: http://securityaffairs.co/wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

L. Serena, “A Fuzzy Approach to Security Codes: Cryptographybetween Technological Evolution and Human Perception,” Modeling Cyber Security: Approaches, Methodology, Strategies U. Gori (Ed.), 2009. [Online]. Available: http://www.indiancybersecurity.com.

D. Kumar and N. Panchanatham (2015). A case study on CyberSecurity in E-Governance. International Research Journal ofEngineering and Technology (IRJET), Vol. 2, No. 8, pp. 272-265, http://www.indiancybersecurity.com.

A. M. Dario Sgobbi and Marco Paggio, “Intrusion in a MissionCritical Network: A Tutorial on Intrusion Detection Systems andIntrusion Prevention Systems,” Modelling Cyber Security:Approaches, Methodology, Strategies U. Gori (Ed.), 2009. [Online]. Available: http://www.indiancybersecurity.com.

European Union, “The Convention on Cyber-Crime, a uniqueinstrument for international co-operation,” IJARCET, Vol. 6, 2001. [Online]. Available: http://www.indiancybersecurity.com.

D. Kumar and N. Panchanatham, “A case study on Cyber Security inE-Governance,” International Research Journal of Engineering andTechnology (IRJET), Vol. 2, No. 8, pp. 272-265, 2015. [Online]. Available: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

ITU, “ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia,Meeting Report: ITU Regional Cybersecurity Forum for Eastern andSouthern Africa, Lusaka, Zambia”, pp. 25-28, 2008. [Online]. Available: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

S. Back and J. LaPrade, “Cyber-situational crime prevention and thebreadth of cybercrimes among higher education institutions,”International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2, pp. 25-47, 2020. [Online]. Available: https://cltc.berkeley.edu/scenario-back-matter.

W. Fadzilah, W. Yusoff, and A. B. Sade, “Electronic banking fraud ;The need to enhance security and customer trust in online banking,”International Journal in Advances in Information Sciences andService Sciences, Vol. 3, 2008. [Online]. Available: https://www.bitdegree.org/tutorials/what-is-cyber-security.

M. T. Whitty, “The Online Romance Scam: A Serious Cybercrime,”Cyberpsychology, Behavior, and Social Networking, Vol. 15, No. 3,2011. [Online]. Available: https://www.getgds.com/resources/blog/ cybersecurity/6-cybersecurity-threats-to-watch-out-for-in-2021.

Riccardo Satta, Javier Galbally, and Laurent Beslay “ChildrenGender Recognition Under Unconstrained Conditions Based onContextual Information,” International Conference on Pattern Recognition, pp. 357-362, 2014. [Online]. Available:www.zdnet.com/article/cybercrime-costs-338bn-to-globaleconomy-more-lucrative-than-drugstrade/.

ITU, “ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia,Meeting Report: ITU Regional Cybersecurity Forum for Eastern andSouthern Africa, Lusaka, Zambia”, pp. 25-28, [Online]. Available: www.gov.uk/government/ publications/the-cost-of-cybercrimejoint-government-and-industry-report.

C. Subramanian, “Cyber Security,” International Journal of RecentScientific Research, Vol. 3, No. 3, pp. 197-200, 2012. [Online]. Available: http://veriscommunity.net.

D. K. Mulligan and F. B. Schnelder, “Doctrine for cybersecurity,”Daedalus, Vol. 140, No. 4, pp. 70-92, 2011. [Online]. Available: http://gigaom.com/2011/11/16/thereal-costs-of-cybercrime-infographic.

R. J. Harkneet and J. Stever, “The cybersecurity triad: Government, private sector partner, and the engaged cybersecurity citizen,”Journal of Homeland Security and Emergency Management, Vol. 6,No. 1, 2009. [Online]. Available: www.virusbtn.com/conference/vb 2004/abstracts/sgarfink.xml.

Ying-Chieh Chen, Patrick S. Chen, Jing-Jang Hwang, Larry Korba,Ronggong Song and George Yee, “An analysis of online gamingcrime characteristics”, Internet Research, Vol. 15, No. 3, pp. 246-261, 2005. [Online]. Available: www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/enisathreat-landscape/enisa-threat-landscape.

Grispos, George, Sorren Hanvey, and Bashar Nuseibeh, “Use ofOrganisational Topologies for Forensic Investigations”, Proceedings of the 1st ACM SIGSOFT International Workshop on SoftwareEngineering and Digital Forensics, pp. 2-5, 2017. [Online]. Available: http://www.nccgroup.com/media/169256/origin_of_ hacks

q32012.pdf.

R. Tillman, K. Calavita and H. Pontell, “Criminalizing white-collar misconduct: determinants of prosecution in savings and loan fraudcases,” Crime Law and Social Change, Vol. 26, No. 1, pp. 53-76, 1996. [Online]. Available: http://www.nccgroup.com/media/169256/origin_of_hacks_q3_2012.pdf.

S. Alshathry, “Cyber-attack on saudi aramco,” Int. J. Manag., Vol. 11, No. 5, 2016. [Online]. Available: http://www.nccgroup.com/media/169256/origin_of_hacks_q3_2012.pdf.

S. Zeadally, E. Adi, Z. Baig and I. A. Khan, “Harnessing artificialintelligence capabilities to improve cybersecurity,” IEEE, pp. 23817-23837, 2020. [Online]. Available: http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/adult-media-lit-13/2013_Adult_ML_Tracker.pdf.

A. D. Smith and W. T. Rupp, “Application service providers (ASP):moving downstream to enhance competitive advantage,” Information Management & Computer Security, Vol. 10, No. 2, pp. 64-72, 2002. [Online]. Available: http://discover.ukdatas ervice.ac.uk/catalogue/?sn=5543&type=Data%20catalogue.

indolink.com, India battles against cybercrime, 2012. [Online].Available: http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/adult-media-lit-13/2013_Adult_ML_Tracker.pdf.

R. G. Sarita Sharma, “Comparative Study and Analysis of UniqueIdentification Number and Social Security Number,” International Journal of Scientific Research in Computer Science and Engineering,Vol. 5, No. 1, pp. 27-30, 2017. [Online]. Available: http://www.sophos.com/en-us/security-news-trends/securitytrends/fake-antivirus.aspx.

D. Kumar and N. Panchanatham, “A case study on Cyber Security inE-Governance,” International Research Journal of Engineering andTechnology (IRJET), Vol. 2, No. 8, pp. 272-265, 2015. [Online]. Available: https://www.birminghammail.co.uk/news/midlandsnews/school-meals-coronavirus-text-scam-17975311.

M. Stohl, “Cyber terrorism: a clear and present danger, the sum of allfears, breaking point or patriot games? Crime, law and socialchange,” Vol. 46, No. 4-5, pp. 223-238, 2006. [Online]. Available: https://www.birminghammail.co.uk/news/midlandsnews/school-meals-coronavirus-text-scam-17975311.

R. M. Fishman, K. Josephberg, J. Linn, J. Pollack and J. Victoriano,“Threat of international cyberterrorism on the rise,” Intellectual Property & Technology Law Journal, Vol. 14, No. 10, pp. 23-23, 2002. [Online]. Available: https://www.birminghammail.co.uk/news/midlandsnews/school-meals-coronavirus-text-scam-17975311.

Ying-Chieh Chen, Patrick S. Chen, Jing-Jang Hwang, Larry Korba, Ronggong Song and George Yee, “An analysis of online gamingcrime characteristics”, Internet Research, Vol. 15, No. 3, pp. 246-261, 2005. [Online]. Available: https://www.birminghammail.co.uk/ news/midlandsnews/school-meals-coronavirus-text-scam-17975311.

Grispos, George, Sorren Hanvey and Bashar Nuseibeh, “Use ofOrganisational Topologies for Forensic Investigations”, Proceedingsof the 1st ACM SIGSOFT International Workshop on SoftwareEngineering and Digital Forensics, pp. 2-5, 2017. [Online]. Available: https://www.bleepingcomputer.com/news/security/newcoronavirus-screenlocker-malware-is-extremelyannoying.

S. Back and J. LaPrade, “Cyber-situational crime prevention and thebreadth of cybercrimes among higher education institutions,” International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2, pp. 25-47, 2020. [Online]. Available: https://blog.check point.com/2020/05/12/coronaviruscyber-attacks-update-beware-of-the-phish.

BSA, BSA Global Cloud Computing Scorecard, a Blueprint forEconomic Opportunity, 2013. [Online]. Available: https://www.forbes.com/sites/thomasbrewster/2020/04/22/there-are-now-more-than-40000-high-risk-covid-19–threats-on-the-web.

E. C. Chang and J. Xu, “Remote integrity check with dishonest storage serve, “Proceedings of the 13th European Symposium onResearch in Computer Security: Computer Security, (ESORICS’08), ACM Press, Heidelberg, pp. 223-237, 2008. [Online]. Available: https://www.fda.gov/consumers/health-fraudscams/fraudulent-coronavirus-disease-2019-covid-19-products.

Raymond Dacey and S. Kenneth Gallant, “Crime control andharassment of the innocent,” Journal of Criminal Justice, Elsevier, Vol. 25, No. 4, pp. 325-334, 1997. [Online]. Available: https://ec.europa.eu/anti-fraud/media-corner/news/20-03-2020/olaf-launches-enquiry-fake-covid-19-relatedproductsen.

George Grispos, Sorren Hanvey and Bashar Nuseibeh, “Use ofOrganisational Topologies for Forensic Investigations”, Proceedings of the 1st ACM SIGSOFT International Workshop on SoftwareEngineering and Digital Forensics, pp. 2-5, 2017. [Online].Available: https://www.gov.uk/government/news/uk-medicinesand-medical-devices-regulator-investigating-14-casesof-fake-or-unlicensed-covid-19-medical-products.

S. Mierzwa, S. RamaRao, J. A. Yun and B. G. Jeong, “Proposal forthe development and addition of a cybersecurity assessment sectioninto technology involving global public health,” International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2,pp. 48-61, 2020. [Online]. Available: https://cltc.berkeley.edu/ scenario-back-matter.

Thievery, Embezzlement and Fraud, “New York: Thomas Y. CrowellCompany,” International Journal of Cybersecurity Intelligence andCybercrime, Vol. 3, No. 2, pp. 62-66, [Online]. Available: https://www.bitdegree.org/tutorials/what-is-cyber-security.

S. Back and J. LaPrade, “Cyber-situational crime prevention and thebreadth of cybercrimes among higher education institutions,”International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2, pp. 25-47, 2020. [Online]. Available: http://conventions.coe.int/Treaty/EN/Treaties/Html/185.html.

B. Nodeland, “The effects of self-control on the cybercrime victim-offender overlap,” International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2, pp. 4-24, 2020. [Online]. Available: http://www.afp.gov.au/~/media/afp/pdf/f/fighting-the-invisible.ashx.

BSA, BSA Global Cloud Computing Scorecard, a Blueprint forEconomic Opportunity, 2013. [Online]. Available: https://hmaconsulting.com/projects/kuwait-general-department-of-criminal-investigation.

H. J. Mohammed, E. AL-dahneem and A. Hamadi, “A comparativeanalysis for adopting an innovative pedagogical approach of flippedteaching for active classroom learning,” J. Glob. Bus. Soc. Entrep., Vol. 3, No. 5, pp. 86-94, 2016. [Online]. Available:https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/#Global.

Brenner, “Social networking dangers exposed,” 2009. [Online]. Available: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

Bagyavati, “Social Engineering in Lech J. Janczewski and AndrewM.Colarik Cyber warefare and cyber terrorism, Vol. 1, No. 1, pp. 9-15, 2009. [Online]. Available: http://www.symantec.com.

A. Kumar, “Orkut used in credit card scam to buy airline tickets,” The Deccan Chronicle, Vol. 1, No. 1, pp. 9-15, 2008. [Online]. Available: http://www.symantec.com.

T. Rid, “Think again: cyberwar,” Foreign Policy, Vol. 192, pp. 1-11, 2012. [Online]. Available: http://www.indiancybersecurity.com.

N. Kshetri, “Positive externality, increasing returns and the rise incybercrimes,” Communications of the ACM, Vol. 52, No. 12, pp. 141-144, 2009. [Online]. Available: http://www.frankrubino.com.

S. Bistarelli, F. Fioravanti and P. Peretti, “Using CP-nets as a guidefor countermeasure selection,” Proceedings of the 2007 ACMSymposium on Applied Computing, pp. 300-304, 2007. [Online]. Available: http://arxiv.org/abs/1106.4692v1.

N. Jyoti, “Cyber Security: Protection of Human Rights,” Vol. 3, No.2, pp. 888-895, 2017. [Online]. Available: http://securityaffairs.co/ wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

B. Nussbaum, Book review of Whiteside, Thomas, “ComputerCapers: Tales of Electronic Thievery, Embezzlement, and Fraud. New York: Thomas Y. Crowell Company,” International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2, pp. 62-66, 2020. [Online]. Available: http://arxiv.org/abs/1106.4692v1 .

W. Lifei, H. Zhu, C. Zhenfu and W. Jia, Sec Cloud, “Bridging secure storage and computation in cloud,” Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing SystemsWorkshops, IEEE Xplore Press, Genova, pp. 52-56, June 21-25, 2010. [Online]. Available: http://www.justice.gov.

OECD, Cybersecurity policy making at a turning point: Analysingnew generation of national cybersecurity strategies for the interneteconomy, 2012. [Online]. Available: http://business.kaspersky.com/threats-in-q2-2013.

H. Choi, H. Lee, H. Lee and H. Kim, “Botnet Detection by Monitoring Group Activities in DNS Traffic,” in Proc. 7th IEEE International Conference on Computer and Information Technology(CIT 2007), pp. 715-720, 2007. [Online]. Available: https://en.wikipedia.org/wiki/Demographics_of_India.

S. Back and J. La Prade, “Cyber-situational crime prevention and thebreadth of cybercrimes among higher education institutions,”International Journal of Cybersecurity Intelligence and Cybercrime, Vol. 3, No. 2, pp. 25-47, 2020. [Online]. Available: http://business.rediff.com/slide-show/2009/aug/20/slide-show-1-india-major-hub-for-cybercrime.html.

S. Rani, H. Beenu Jindal, N. Gautam, and S. Kumar, “Importance ofUniversal Human Values for Human life: A Study”, Asian Journal of Science and Applied Technology, Vol. 11, No. 1, pp. 36-48, 2022. DOI: https://doi.org/10.51983/ajsat-2022.11.1.3204.

H. Jindal, Y. Garg, S. Kumar, N. Gautam, and R. Kumar, “Socialmedia in political campaigning: A Study”, I-manager’s Journal on Humanities & Social Sciences, Vol. 16, No. 1, pp. 49-60, 2021. [Online]. Available: https://imanagerpublications.com/article/18266/.

S. Aman Kumar, S. Sharma, and R. Kumar, “Importance of Universal Human Values in Education System: A Critical Review”, I Manager’s Journal of Humanities & Social Science, Vol. 1, No. 2, pp. 45-55, 2020.

Downloads

Published

10-06-2022

How to Cite

Tuli, B., Kumar, S., & Gautam, N. (2022). An Overview on Cyber Crime and Cyber Security. Asian Journal of Engineering and Applied Technology, 11(1), 36–45. https://doi.org/10.51983/ajeat-2022.11.1.3309