An Overview on Cyber Crime and Cyber Security

Authors

  • Bhumika Tuli Department of Computer Science and Engineering, Chandigarh Group of Colleges, Mohali, Punjab, India
  • Santosh Kumar Department of Mechanical Engineering, Chandigarh Group of Colleges, Mohali, Punjab, India
  • Neha Gautam St. Ezra International School, Mohali, Punjab, India

DOI:

https://doi.org/10.51983/ajeat-2022.11.1.3309

Keywords:

Cyber Crimes, Cyber Security, Online Scams

Abstract

Loss of information through online services is called a “footprint of cybercrime”. So the topic that we will discuss is Cyber Crime and Cyber Security. It is an important part of the information technology field. We all know that cyber crime is increasing day by day, and the government also takes measures to stop this, but it’s not dying from it’s root. In this research paper, we will discuss about the different phases of cyber crime in today’s time and the negative effects tolerated by people due to cybercrime. There are so many financial loses hanging over from heavy engagement in cyber crimes that have been discussed below. This paper also consists of topics related to cyber security, which provides safety to users. Overall, this article gives an intensive overview regarding cyber crime, the work of criminals and the cyber security and because of it how to prevent the cybercrime and make it secure, as new technology is there that comes up with new ideas to protect human life.

References

S. Gii and R. L. Shrestha, "Reform of civil service of Nepal with e-government practice," Journal of Personnel Training Academy, vol. 6, no. 1, pp. 22-36, 2018.

R. J. Harkneet and J. Stever, "The cyber security triad: Government, private sector partner, and the engaged cybersecurity citizen," Journal of Homeland Security and Emergency Management, vol. 6, no. 1, pp. 79, 2009.

A. M. Dario Sgobbi and Marco Paggio, "Intrusion in a Mission-Critical Network: A Tutorial on Intrusion Detection Systems and Intrusion Prevention Systems," Modelling Cyber Security, 2009.

E. C. Chang and J. Xu, "Remote integrity check with dishonest storage serve," Proceedings of the 13th European Symposium on Research in Computer Security, pp. 223-237, 2008. [Online]. Available: http://www.vox.com/2014/5/19/5731696/chinese-hackers-cyberespionage-theft-cyber.

G. Grispos, S. Hanvey, and B. Nuseibeh, "Use of Organizational Topologies for Forensic Investigations," pp. 2-5, 2017. [Online]. Available: http://www.theregister.co.uk/2013/03/27/stuxnet_cyverwar_r.

S. Parto, "Economic activity and institutions: taking stock," Journal of Economic Issues, vol. 39, no. 1, 2005. DOI: 10.2202/1547-7355.1649.

D. Kumar and N. Panchanatham, "A case study on Cyber Security in E-Governance," International Research Journal of Engineering and Technology (IRJET), vol. 2, no. 8, pp. 272-265, 2015. [Online]. Available: http://www.europarl.europa.eu/meetdocs/20142019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf

L. Serena, "A Fuzzy Approach to Security Codes: Cryptography between Technological Evolution and Human Perception," Modeling Cyber Security: Approaches, Methodology, Strategies, U. Gori (Ed.), IOS Press, 2009. [Online]. Available: http://www.aseanstats.org.

A. T. Kearney, "Cyber security in ASEAN- AN Urgent Call to Action," 2018. [Online]. Available: https://www.cisco.com/c/dam/m/ensg/cybersecurity/cybersecurity-inasean/files/assets/common/downloads/publication.pdf.

D. K. Mulligan and F. B. Schneider, "Doctrine for cybersecurity," Daedalus, vol. 140, no. 4, pp. 70-92, 2011. [Online]. Available: https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/handbook.pdfcountry-1=TH.

P. Sitbon, "A Cyber Security Approach for Smart Meters at ERDF," Modeling Cyber Security: Approaches, Methodology, Strategies, U. Gori (Ed.), 2009. [Online]. Available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/Thecost-of-Cyber-Crime-Summary-Final.pdf.

H. J. Mohammed, E. AL-dahneem, A. Hamadi, "A comparative analysis for adopting an innovative pedagogical approach of flipped teaching for active classroom learning," J. Glob. Bus. Soc. Entrep., vol. 3, no. 5, pp. 86-94, 2016. [Online]. Available: https://www.mha.gov.sg/Newsroom/press-releases/Pages/Computer-Misuse-and-Cybersecurity-(Amendment)-Bill-.aspx.

Bagyavati, "Social Engineering in Lech J. Janczewski and Andrew M.Colarik Cyber warfare and cyber terrorism," vol. 1, no. 1, pp. 9-15, 2009. [Online]. Available: http://capec.mitre.org/data/definitions/117.html.

R. Sharma, "Study of Latest Emerging Trends on Cyber Security and its challenges to Society," International Journal of Scientific & Engineering Research, vol. 3, pp. 67-75, 2012. [Online]. Available: http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-or-accessory.html.

D. Ahlstrom and G. D. Bruton, "Learning from successful local private firms in China: establishing legitimacy," Academy of Management Executive, vol. 15, no. 4, pp. 72-8, 2001. [Online]. Available: http://business.rediff.com/slide-show/2009/aug/20/slide-show-1-india-major-hub-for-cybercrime.html.

D. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, 1987. [Online]. Available: http://www.cyberlawsindia.net.

A. Sreehari, K. J. Abinanth, B. Sujith, and P. S. Unnikuttan, "A Study of Awareness of Cyber Crime Among College Students with Special Reference to Kochi," vol. 119, no. 16, pp. 1353-1360, 2018. [Online]. Available: https://en.wikipedia.org/wiki/Demographics_of_India.

N. Tan, "Social networking: Danger - Warning for Teens," International Journal of Internet of Things, vol. 1, no. 1, pp. 9-15, 2008. [Online]. Available: http://cis-india.org/internet-governance/cyber-crime-privacy.

J. E. Oxley and B. Yeung, "E-commerce readiness: institutional environment and international competitiveness," Journal of International Business Studies, vol. 32, no. 4, pp. 705-723, 2001. [Online]. Available: http://worldwidejournals.com/paripex/file.php?val=March_2016_1458622776_05.pdf.

S. Bistarelli, F. Fioravanti, and P. Peretti, "Using CP-nets as a guide for countermeasure selection," Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 300-304, 2007. [Online]. Available: http://www.cs.kent.ac.uk.

D. K. Mulligan and F. B. Schneider, "Doctrine for cybersecurity," Daedalus, vol. 140, no. 4, pp. 70-92, 2011. [Online]. Available: http://www.gov.uk.

N. Kshetri and N. Dholakia, "Professional and trade associations in an ascent and formative sector of a developing economy: A Case Study of the NASSCOM effect on the Indian offshoring industry," vol. 15, no. 2, pp. 225-239, 2009.

A. M. Dario Sgobbi and Marco Paggio, "Intrusion in a Mission-Critical Network: A Tutorial on Intrusion Detection Systems and Intrusion Prevention Systems," Modelling Cyber Security: Approaches, Methodology, Strategies, U. Gori (Ed.), 2009.

H. J. Mohammed, M. M. Kasim, E. A. AL-Dahneem, and A. K. Hamadi, "An analytical survey on implementing best practices for introducing e-learning programs to students," J. Educ. Soc. Sci., vol. 5, no. 2, pp. 191-196, 2018. [Online]. Available: http://taylorandfrancis.com.

R. J. Harkneet and J. Stever, "The cybersecurity triad: Government, private sector partner, and the engaged cybersecurity citizen," Journal of Homeland Security and Emergency Management, vol. 6, no. 1, pp. 79, 2009. [Online]. Available: http://www.cs.kent.ac.uk.

I. D. Fianyi, "Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics," International Journal of Computer Science Issues, vol. No. 5, no. 12, 2015. [Online]. Available: http://business.kaspersky.com/threats-in-q2.

N. Kshetri, "Positive externality, increasing returns and the rise in cybercrimes," Communications of the ACM, vol. 52, no. 12, pp. 141-144, 2009. [Online]. Available: freedom-of-expression-amnesty-intl/.

I. D. Fianyi, "Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics," International Journal of Computer Science Issues, vol. No. 5, no. 12, 2015. [Online]. Available: http://business.kaspersky.com/threats-in-q2.

S. Back and J. LaPrade, "Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions," International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 25-47, 2020. [Online]. Available: http://www.justice.gov.

D. Kumar and N. Panchanatham, "A case study on Cyber Security in E-Governance," International Research Journal of Engineering and Technology (IRJET), vol. 2, no. 8, pp. 272-265, 2015. [Online]. Available: http://securityaffairs.co/wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

BSA, "BSA Global Cloud Computing Scorecard, A Blueprint for Economic Opportunity," 2013. [Online]. Available: http://arxiv.org/abs/1106.4692v1.

M. Sharma, H. Jindal, S. Kumar, and R. Kumar, "Overview of data security, classification and control measure: A study," I-managers Journal on Information Technology, vol. 11, no. 1, pp. 17-34, 2022. [Online]. Available: https://imanagerpublications.com/article/18557/13.

R. J. Harkneet and J. Stever, "The cybersecurity triad: Government, private sector partner, and the engaged cybersecurity citizen," Journal of Homeland Security and Emergency Management, vol. 6, no. 1, 2009. [Online]. Available: http://securityaffairs.co/wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

M. D. T. P. Nasution, A. P. U. Siahaan, Y. Rossanty, and S. Aryza, "The Phenomenon of Cyber-Crime and Fraud Victimization in Online Shop," International Journal of Civil Engineering and Technology (IJCIET), vol. 9, no. 6, pp. 1583-1592, 2018. [Online]. Available: http://securityaffairs.co/wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

L. Serena, "A Fuzzy Approach to Security Codes: Cryptography between Technological Evolution and Human Perception," Modeling Cyber Security: Approaches, Methodology, Strategies U. Gori (Ed.), 2009. [Online]. Available: http://www.indiancybersecurity.com.

D. Kumar and N. Panchanatham, "A case study on Cyber Security in E-Governance," International Research Journal of Engineering and Technology (IRJET), vol. 2, no. 8, pp. 272-265, 2015. [Online]. Available: http://www.indiancybersecurity.com.

A. M. Dario Sgobbi and Marco Paggio, "Intrusion in a Mission-Critical Network: A Tutorial on Intrusion Detection Systems and Intrusion Prevention Systems," Modelling Cyber Security: Approaches, Methodology, Strategies U. Gori (Ed.), 2009. [Online]. Available: http://www.indiancybersecurity.com.

European Union, "The Convention on Cyber-Crime, a unique instrument for international co-operation," IJARCET, vol. 6, 2001. [Online]. Available: http://www.indiancybersecurity.com.

D. Kumar and N. Panchanatham, "A case study on Cyber Security in E-Governance," International Research Journal of Engineering and Technology (IRJET), vol. 2, no. 8, pp. 272-265, 2015. [Online]. Available: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

ITU, "ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia, Meeting Report: ITU Regional Cybersecurity Forum for Eastern and Southern Africa, Lusaka, Zambia," pp. 25-28, 2008. [Online]. Available: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

S. Back and J. LaPrade, "Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions," International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 25-47, 2020. [Online]. Available: http://www.justice.gov.

W. Fadzilah, W. Yusoff, and A. B. Sade, "Electronic banking fraud; The need to enhance security and customer trust in online banking," International Journal in Advances in Information Sciences and Service Sciences, vol. 3, 2008. [Online]. Available: https://www.bitdegree.org/tutorials/what-is-cyber-security.

M. T. Whitty, "The Online Romance Scam: A Serious Cybercrime," Cyberpsychology, Behavior, and Social Networking, vol. 15, no. 3, 2011. [Online]. Available: https://www.getgds.com/resources/blog/cybersecurity/6-cybersecurity-threats-to-watch-out-for-in-2021.

Riccardo Satta, Javier Galbally, and Laurent Beslay, "Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information," International Conference on Pattern Recognition, pp. 357-362, 2014. [Online]. Available: www.zdnet.com/article/cybercrime-costs-338bn-to-global-economy-more-lucrative-than-drugstrade/.

ITU, "ITU Regional Cybersecurity Forum 2008 Lusaka, Zambia, Meeting Report: ITU Regional Cybersecurity Forum for Eastern and Southern Africa, Lusaka, Zambia," pp. 25-28. [Online]. Available: www.gov.uk/government/publications/the-cost-of-cybercrime-joint-government-and-industry-report.

C. Subramanian, "Cyber Security," International Journal of Recent Scientific Research, vol. 3, no. 3, pp. 197-200, 2012. [Online]. Available: http://veriscommunity.net.

D. K. Mulligan and F. B. Schnelder, "Doctrine for cybersecurity," Daedalus, vol. 140, no. 4, pp. 70-92, 2011. [Online]. Available: http://gigaom.com/2011/11/16/the-real-costs-of-cybercrime-infographic.

R. J. Harkneet and J. Stever, "The cybersecurity triad: Government, private sector partner, and the engaged cybersecurity citizen," Journal of Homeland Security and Emergency Management, vol. 6, no. 1, 2009. [Online]. Available: www.virusbtn.com/conference/vb2004/abstracts/sgarfink.xml.

Ying-Chieh Chen, Patrick S. Chen, Jing-Jang Hwang, Larry Korba, Ronggong Song, and George Yee, "An analysis of online gaming crime characteristics," Internet Research, vol. 15, no. 3, pp. 246-261, 2005. [Online]. Available: www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/enisa-threat-landscape/enisa-threat-landscape.

Grispos, George, Sorren Hanvey, and Bashar Nuseibeh, "Use of Organisational Topologies for Forensic Investigations," Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, pp. 2-5, 2017. [Online]. Available: http://www.nccgroup.com/media/169256/origin_of_hacksq32012.pdf.

R. Tillman, K. Calavita and H. Pontell, "Criminalizing white-collar misconduct: determinants of prosecution in savings and loan fraud cases," Crime Law and Social Change, vol. 26, no. 1, pp. 53-76, 1996. [Online]. Available: http://www.nccgroup.com/media/169256/origin_of_hacks_q3_2012.pdf.

S. Alshathry, "Cyber-attack on saudi aramco," Int. J. Manag., vol. 11, no. 5, 2016. [Online]. Available: http://www.nccgroup.com/media/169256/origin_of_hacks_q3_2012.pdf.

S. Zeadally, E. Adi, Z. Baig and I. A. Khan, "Harnessing artificial intelligence capabilities to improve cybersecurity," IEEE, pp. 23817-23837, 2020. [Online]. Available: http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/adult-media-lit-13/2013_Adult_ML_Tracker.pdf.

A. D. Smith and W. T. Rupp, "Application service providers (ASP): moving downstream to enhance competitive advantage," Information Management & Computer Security, vol. 10, no. 2, pp. 64-72, 2002. [Online]. Available: http://discover.ukdataservice.ac.uk/catalogue/?sn=5543&type=Data%20catalogue.

indolink.com, "India battles against cybercrime," 2012. [Online]. Available: http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/adult-media-lit-13/2013_Adult_ML_Tracker.pdf.

R. G. Sarita Sharma, "Comparative Study and Analysis of Unique Identification Number and Social Security Number," International Journal of Scientific Research in Computer Science and Engineering, vol. 5, no. 1, pp. 27-30, 2017. [Online]. Available: http://www.sophos.com/en-us/security-news-trends/security-trends/fake-antivirus.aspx.

D. Kumar and N. Panchanatham, "A case study on Cyber Security in E-Governance," International Research Journal of Engineering and Technology (IRJET), vol. 2, no. 8, pp. 272-265, 2015. [Online]. Available: https://www.birminghammail.co.uk/news/midlands-news/school-meals-coronavirus-text-scam-17975311.

M. Stohl, "Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime, law and social change," vol. 46, no. 4-5, pp. 223-238, 2006. [Online]. Available: https://www.birminghammail.co.uk/news/midlands-news/school-meals-coronavirus-text-scam-17975311.

R. M. Fishman, K. Josephberg, J. Linn, J. Pollack and J. Victoriano, "Threat of international cyberterrorism on the rise," Intellectual Property & Technology Law Journal, vol. 14, no. 10, pp. 23-23, 2002. [Online]. Available: https://www.birminghammail.co.uk/news/midlands-news/school-meals-coronavirus-text-scam-17975311.

Y.-C. Chen, P. S. Chen, J.-J. Hwang, L. Korba, R. Song, and G. Yee, "An analysis of online gaming crime characteristics," Internet Research, vol. 15, no. 3, pp. 246-261, 2005. [Online]. Available: https://www.birminghammail.co.uk/news/midlandsnews/school-meals-coronavirus-text-scam-17975311.

G. Grispos, S. Hanvey, and B. Nuseibeh, "Use of Organisational Topologies for Forensic Investigations," Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, pp. 2-5, 2017. [Online]. Available: https://www.bleepingcomputer.com/news/security/newcoronavirus-screenlocker-malware-is-extremelyannoying.

S. Back and J. LaPrade, "Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions," International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 25-47, 2020. [Online]. Available: https://blog.check point.com/2020/05/12/coronaviruscyber-attacks-update-beware-of-the-phish.

BSA, "BSA Global Cloud Computing Scorecard, a Blueprint for Economic Opportunity," 2013. [Online]. Available: https://www.forbes.com/sites/thomasbrewster/2020/04/22/there-are-now-more-than-40000-high-risk-covid-19–threats-on-the-web.

E. C. Chang and J. Xu, "Remote integrity check with dishonest storage server," Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security (ESORICS’08), ACM Press, Heidelberg, pp. 223-237, 2008. [Online]. Available: https://www.fda.gov/consumers/health-fraudscams/fraudulent-coronavirus-disease-2019-covid-19-products.

R. Dacey and S. K. Gallant, "Crime control and harassment of the innocent," Journal of Criminal Justice, vol. 25, no. 4, pp. 325-334, 1997. [Online]. Available: https://ec.europa.eu/anti-fraud/media-corner/news/20-03-2020/olaf-launches-enquiry-fake-covid-19-relatedproductsen.

G. Grispos, S. Hanvey, and B. Nuseibeh, "Use of Organisational Topologies for Forensic Investigations," Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, pp. 2-5, 2017. [Online]. Available: https://www.gov.uk/government/news/uk-medicinesand-medical-devices-regulator-investigating-14-casesof-fake-or-unlicensed-covid-19-medical-products.

S. Mierzwa, S. RamaRao, J. A. Yun, and B. G. Jeong, "Proposal for the development and addition of a cybersecurity assessment section into technology involving global public health," International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 48-61, 2020. [Online]. Available: https://cltc.berkeley.edu/ scenario-back-matter.

"Thievery, Embezzlement and Fraud," New York: Thomas Y. Crowell Company, International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 62-66. [Online]. Available: https://www.bitdegree.org/tutorials/what-is-cyber-security.

S. Back and J. LaPrade, "Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions," International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 25-47, 2020. [Online]. Available: http://conventions.coe.int/Treaty/EN/Treaties/Html/185.html.

B. Nodeland, "The effects of self-control on the cybercrime victim-offender overlap," International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 4-24, 2020. [Online]. Available: http://www.afp.gov.au/~/media/afp/pdf/f/fighting-the-invisible.ashx.

BSA, "BSA Global Cloud Computing Scorecard, a Blueprint for Economic Opportunity," 2013. [Online]. Available: https://hmaconsulting.com/projects/kuwait-general-department-of-criminal-investigation.

H. J. Mohammed, E. AL-dahneem, and A. Hamadi, "A comparative analysis for adopting an innovative pedagogical approach of flipped teaching for active classroom learning," J. Glob. Bus. Soc. Entrep., vol. 3, no. 5, pp. 86-94, 2016. [Online]. Available: https://www.comparitech.com/vpn/cybersecurity-cyber-crime-statistics-facts-trends/#Global.

Brenner, "Social networking dangers exposed," 2009. [Online]. Available: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf.

Bagyavati, "Social Engineering in Lech J. Janczewski and Andrew M. Colarik Cyber warfare and cyber terrorism," vol. 1, no. 1, pp. 9-15, 2009. [Online]. Available: http://www.symantec.com.

A. Kumar, "Orkut used in credit card scam to buy airline tickets," The Deccan Chronicle, vol. 1, no. 1, pp. 9-15, 2008. [Online]. Available: http://www.symantec.com.

T. Rid, "Think again: cyberwar," Foreign Policy, vol. 192, pp. 1-11, 2012. [Online]. Available: http://www.indiancybersecurity.com.

N. Kshetri, "Positive externality, increasing returns and the rise in cybercrimes," Communications of the ACM, vol. 52, no. 12, pp. 141-144, 2009. [Online]. Available: http://www.frankrubino.com.

S. Bistarelli, F. Fioravanti, and P. Peretti, "Using CP-nets as a guide for countermeasure selection," Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 300-304, 2007. [Online]. Available: http://arxiv.org/abs/1106.4692v1.

N. Jyoti, "Cyber Security: Protection of Human Rights," vol. 3, no. 2, pp. 888-895, 2017. [Online]. Available: http://securityaffairs.co/wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html.

B. Nussbaum, "Book review of Whiteside, Thomas, ‘Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud. New York: Thomas Y. Crowell Company,’" International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 62-66, 2020. [Online]. Available: http://arxiv.org/abs/1106.4692v1 .

W. Lifei, H. Zhu, C. Zhenfu, and W. Jia, "Sec Cloud, Bridging secure storage and computation in cloud," Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, IEEE Xplore Press, Genova, pp. 52-56, June 21-25, 2010. [Online]. Available: http://www.justice.gov.

OECD, "Cybersecurity policy making at a turning point: Analysing new generation of national cybersecurity strategies for the internet economy," 2012. [Online]. Available: http://business.kaspersky.com/threats-in-q2-2013.

H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet Detection by Monitoring Group Activities in DNS Traffic," in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007), pp. 715-720, 2007. [Online]. Available: https://en.wikipedia.org/wiki/Demographics_of_India.

S. Back and J. La Prade, "Cyber-situational crime prevention and the breadth of cybercrimes among higher education institutions," International Journal of Cybersecurity Intelligence and Cybercrime, vol. 3, no. 2, pp. 25-47, 2020. [Online]. Available: http://business.rediff.com/slide-show/2009/aug/20/slide-show-1-india-major-hub-for-cybercrime.html.

S. Rani, H. Beenu Jindal, N. Gautam, and S. Kumar, "Importance of Universal Human Values for Human life: A Study," Asian Journal of Science and Applied Technology, vol. 11, no. 1, pp. 36-48, 2022. DOI: https://doi.org/10.51983/ajsat-2022.11.1.3204.

H. Jindal, Y. Garg, S. Kumar, N. Gautam, and R. Kumar, "Social media in political campaigning: A Study," I-manager’s Journal on Humanities & Social Sciences, vol. 16, no. 1, pp. 49-60, 2021. [Online]. Available: https://imanagerpublications.com/article/18266/.

S. Aman Kumar, S. Sharma, and R. Kumar, "Importance of Universal Human Values in Education System: A Critical Review," I Manager’s Journal of Humanities & Social Science, vol. 1, no. 2, pp. 45-55, 2020.

Downloads

Published

20-05-2022

How to Cite

Tuli, B., Kumar, S., & Gautam, N. (2022). An Overview on Cyber Crime and Cyber Security. Asian Journal of Engineering and Applied Technology, 11(1), 36–45. https://doi.org/10.51983/ajeat-2022.11.1.3309