CYBER CRIME
DOI:
https://doi.org/10.29121/granthaalayah.v7.i3.2019.949Keywords:
Cyber Attacks, Cyber Crimes, Potential Economic Impact, Consumer Trust, National Security.Abstract [English]
Cybercrime is advancing at a shocking pace, following indistinguishable dynamic from the inescapable entrance of PC innovation and correspondence into all kinds of different backgrounds. While society is concocting and developing, in the meantime, lawbreakers are sending an amazing flexibility keeping in mind the end goal to get the best advantage from it. to abstain from giving cybercriminals the activity, it is vital for those associated with the battle against cybercrime to endeavor to foresee subjective and quantitative changes in its hidden components so they can modify their strategies fittingly.
Downloads
References
Wow Essay (2009), Top Lycos Networks, Available at: http://www.wowessays.com/ dbase/ab2/ nyr90.shtml, Visited: 28/01/2019.
Bowen, Mace (2009), Computer Crime, Available at: http://www.guru.net/, Visited: 28/01/2019.
CAPEC (2010), CAPEC-117: Data Interception Attacks, Available at:
http://capec.mitre.org/data/definitions/117.html, Visited: 28/01/2019.
Oracle (2003), Security Overviews, Available at:
http://docs.oracle.com/cd/B13789_01/ network.101/ b10777/overview.htm, Visited: 28/01/2019. DOI: https://doi.org/10.1055/s-0039-1677920
Computer Hope (2012), Data Theft, Available at:
http://www.computerhope.com/jargon/d/ datathef.htm, Visited: 28/01/2019.
DSL Reports (2011), Network Sabotage, Available at:
http://www.dslreports.com/forum/r26182468-NetworkSabotage-or-incompetent-managers-trying-to-, Visited: 28/01/2019.
IMDb (2012), Unauthorized Attacks, Available at:
http://www.imdb.com/title/tt0373414/, Visited: 28/01/2019.
Virus Glossary (2006), Virus Dissemination, Available at:
http://www.virtualpune.com/citizencentre/html/cyber_crime_glossary.shtml, Visited: 28/01/2019
Leagal Info (2009), Crime Overview Aiding and Abetting Or Accessory, Available at:
http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-or-accessory. html, Visited: 28/01/2019
Shantosh Rout (2008), Network Interferences, Available at: http://www.santoshraut.com/ forensic/ cybercrime.htm, Visited: 28/01/2019
By Jessica Stanicon (2009), Available at: http://www.dynamicbusiness.com/articles/articles-news/one-infive-victims-of-cybercrime3907.html, Visited: 28/01/2019.
Prasun Sonwalkar (2009), India emerging as centre for cybercrime: UK study, Available at:
http://www.livemint.com/2009/08/20000730/India-emerging-as-centre-for-c.html,
Visited: 10/02/19
India emerging as major cyber crime centre (2009), Available at:
http://wegathernews.com/ 203/indiaemerging-as-major-cyber-crime-centre/, Visited: 10/02/19
PTI Contents (2009), India: A major hub for cybercrime, Available at: http://business.rediff.com/ slideshow/2009/aug/20/slide-show-1-india-major-hub-for-cybercrime.htm, Visited: 28/01/2019.
Crime Desk (2009), Million Online Crimes in the Year: Cyber Crime Squad Established, Available at:
http://www.thelondondailynews.com/million-online-crimes-year-cyber-crime-squad-established-p-3117.html, Visited: 02/02/2019.
Newswise (2009), China Linked to 70 Percent of World's Spam, Says Computer Forensics Expert, Available at: http://www.newswise.com/articles/view/553655/, Visited: 03/02/2019.
Cyberlawtimes (2009), Available at:
http://www.cyberlawtimes.com/forums/index.php?board =52.0, Visited: 03/02/19
Kevin G. Coleman (2011), Cyber Intelligence: The Huge Economic Impact of Cyber Crime, Available at:
http://gov.aol.com/2011/09/19/cyber-intelligence-the-huge-economic-impact-of-cyber-crime/, Visited: 03/02/2019
Gordon, L. A. et al., 2003, A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, 46(3): 81-85. DOI: https://doi.org/10.1145/636772.636774
D. Ariz. (April 19, 2000), American Guarantee & Liability Insurance Co. v. Ingram Micro, Inc. Civ. 99- 185 TUC ACM, 2000 U.S. Dist. Lexis 7299.
Downloads
Published
How to Cite
Issue
Section
License
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.