SECURITY TO PRUDENT CYBERCRIMES

Authors:

G. SUNIL,SRINIVAS ALUVALA,NAHEER FATIMA,SANA FARHEEN,AREEFA,

DOI NO:

https://doi.org/10.26782/jmcms.2020.08.00040

Keywords:

cyber security ,cybercrimes,cyberattacks,ransom ware,malicious software,hackers,

Abstract

In today’s generation, the internet has become an essential part of our lives for communication, banking and studying. Especially the youth has turned them into the virtual world. Have you ever speculated how many people stalk you on social media? With the rapid usage of the internet by society, it is also important to protect the information. A computer should have security in it if not it will be accessed by hackers. A hacker can illegally access the data present in a computer. Hacking the important data affects our lives adversely. Cyber-attacks are generally planned wisely. The cyber security specialists and cybercriminals started the competition which will be compared with the growth of offensive weapons and defensive ones to resist the attacks. Cyber security is that the field of science that's developing perpetually and speedily. A Cybercrime square measures currently a worldwide downside that affects innumerable spheres of human life. Every new appliance and software package become the target for cyber criminals sooner or later, therefore their makers do everything doable to be one step ahead. Nearly everything we have a tendency to see in our everyday life may require a number of the cyber security. The main ambition of the hackers is to steal confidential information or to change the data. The hackers opt for a unique way to infect the computer to gain access to it. They usually use malicious software to infect the computer. A virus is been carried by the attachments of the e-mails. When we download these attachments, the computer gets infected. Cyber security plays a major role in organizations such as governments, businesses, hospitals as these have a wide range of confidential information with them. Social networking sites became the medium for sharing information and connecting with people. One side we have an advantage as it connects people, on the other hand, it creates opportunities for cybercrimes. As an individual, we should be alert enough to secure our accounts and data.

Refference:

I. Azzah Kabbas, Atheer Alharthi, and Asmaa Munshi, Artificial Intelligence Applications in Cybersecurity, IJCSNS International Journal of Computer Science and Network Security, 20(2),pp.120-124, Fabruary 2020.
II. Clifton L. Smith, David J. Brooks, Security Risk Management in Security Science, 2013.
III. G.Sunil, Srinivas Aluvala,K. Ravi Chythanya, Goje. Roopa, Rajesh Mothe, Trends having huge impact on cyber security and techniques of cyber security, International Journal of Advanced Science and Technology, 29(2), pp.2701-2708, Jan.2020.
IV. G. Sunil, Srinivas Aluvala, S. Tharun Reddy, Dadi Ramesh, Dr. Revuri Varun, Various forms of cybercrime and role of social media in cyber security, International Journal of Advanced Science and Technology, 29(2), pp.2709-2715, Jan.2020.
V. G.Sunil, Srinivas Aluvala, Nagendhar Yamsani, Kanegonda Ravi Chythanya, Srikanth Yalabaka, Security Enhancement of Genome Sequence Data in Health Care Cloud, International Journal of Advanced Trends in Computer Science and Engineering, 8(2), pp.328-332, March-April 2019.
VI. Kenichi Yoshida, Kazuhiko Tsuda,Setsuya Kurahashi,Hiroki Azuma, Online Shopping Frauds Detecting System and Its Evaluation, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), 4-8 July 2017.
VII. Lisa Lee Bryan, Effective Information Security Strategies for Small Business, International Journal of Cyber Criminology, 14(1), pp.341-360, January-June (2020).
VIII. Mohamed Abomhara, Geir M. Koien, Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks, Journal of Cyber Security, 4, pp. 65–88, 22 May 2015.
IX. Roopa Goje, Ramesh Dadi, Designing a collaborative detection system for detecting the threats to the cyber security in big data, Indian Journal of Public Health research & Development, 9(11), pp.730-733, November 2018.
X. Surbhi Guptha, Abhishek Singhal, Akanksha Kapoor, A literature survey on social engineering attacks: Phishing attack, 2016 International Conference on Computing, Communication and Automation (ICCCA), 29-30 April 2016.
XI. Yashpal Singh Bist, Charu Agarwal, Uttara Bansal, Online Business Frauds: A Case Study of an Online Fraud Survey Company, International Journal of Modern Engineering Research (IJMER), 2(6), Nov-Dec. 2012 pp-4396-4404.

View Download