Skip to main content

2022 | OriginalPaper | Buchkapitel

A Recent Survey on Cybercrime and Its Defensive Mechanism

verfasst von : Garima Bajaj, Saurabh Tailwal, Anupama Mishra

Erschienen in: Cyber Security, Privacy and Networking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybercrime  is one of the severe issues in today’s world that is increasing day by day due to unawareness of people about the harm it can cause. The main reason against the augmentation of cybercrime is the lack of education or knowledge about the impact it can lead to. Cybercrime can be done against individuals, society, or any organization whether it is private or government. The aim of the paper is to focus on what cybercrime is, its types, related work, and its defensive mechanism. Defensive mechanism against cybercrime includes the ways or measures that how can any individual or any organization protects them against cybercrime. This paper also includes the related work which includes some points about the work which has been done so far on cybercrime.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Furnell S (2002) Cybercrime: vandalizing the information society. Addison-Wesley, London, pp 3–540MATH Furnell S (2002) Cybercrime: vandalizing the information society. Addison-Wesley, London, pp 3–540MATH
2.
Zurück zum Zitat Gunjan VK, Kumar A, Avdhanam S (2013) A survey of cyber crime in India. In: 2013 15th international conference on advanced computing technologies (ICACT), Sept 2013. IEEE, pp 1–6 Gunjan VK, Kumar A, Avdhanam S (2013) A survey of cyber crime in India. In: 2013 15th international conference on advanced computing technologies (ICACT), Sept 2013. IEEE, pp 1–6
3.
Zurück zum Zitat Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20CrossRef Gordon S, Ford R (2006) On the definition and classification of cybercrime. J Comput Virol 2(1):13–20CrossRef
4.
Zurück zum Zitat Pandove K, Jindal A, Kumar R (2010) Email spoofing. Int J Comput Appl 5(1):27–30 Pandove K, Jindal A, Kumar R (2010) Email spoofing. Int J Comput Appl 5(1):27–30
5.
Zurück zum Zitat Pittaro ML (2007) Cyber stalking: an analysis of online harassment and intimidation. Int J Cyber Criminol 1(2):180–197 Pittaro ML (2007) Cyber stalking: an analysis of online harassment and intimidation. Int J Cyber Criminol 1(2):180–197
6.
Zurück zum Zitat Erickson J (2008) Hacking: the art of exploitation. No Starch Press Erickson J (2008) Hacking: the art of exploitation. No Starch Press
7.
Zurück zum Zitat Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, p 12 Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, p 12
8.
Zurück zum Zitat Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRef Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRef
10.
Zurück zum Zitat McMillen J (1996) Understanding gambling. In: Gambling cultures: studies in history and interpretation, pp 6–42 McMillen J (1996) Understanding gambling. In: Gambling cultures: studies in history and interpretation, pp 6–42
11.
Zurück zum Zitat Fick J (2009) Prevention is better than prosecution: deepening the defence against cyber crime. J Digit Forensics Secur Law 4(4):3MathSciNet Fick J (2009) Prevention is better than prosecution: deepening the defence against cyber crime. J Digit Forensics Secur Law 4(4):3MathSciNet
12.
Zurück zum Zitat Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc 1–13 Buil-Gil D, Miró-Llinares F, Moneva A, Kemp S, Díaz-Castaño N (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. Eur Soc 1–13
13.
Zurück zum Zitat Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161 Mishra A, Gupta N, Gupta BB (2020) Security threats and recent countermeasures in cloud computing. In: Modern principles, practices, and algorithms for cloud security. IGI Global, pp 145–161
14.
Zurück zum Zitat Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 international conference on innovative sustainable computational technologies (CISCT), Oct 2019. IEEE, pp 1–6 Mishra A, Gupta N (2019) Analysis of cloud computing vulnerability against DDoS. In: 2019 international conference on innovative sustainable computational technologies (CISCT), Oct 2019. IEEE, pp 1–6
15.
Zurück zum Zitat Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput 10(5):1985–1997CrossRef Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput 10(5):1985–1997CrossRef
16.
Zurück zum Zitat Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688 Alsmirat MA et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688
17.
Zurück zum Zitat Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763 Dahiya A, Gupta BB (2020) Multi attribute auction based incentivized solution against DDoS attacks. Comput Secur 92:101763
18.
Zurück zum Zitat Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fog cloud computing environment. Soft Comput 24(8):5695–5711 Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fog cloud computing environment. Soft Comput 24(8):5695–5711
19.
Zurück zum Zitat Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, May 2015, pp 1–8 Gupta S, Gupta BB (2015) PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In: Proceedings of the 12th ACM international conference on computing frontiers, May 2015, pp 1–8
20.
Zurück zum Zitat Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst Dahiya A, Gupta BB (2020) A reputation score policy and Bayesian game theory based incentivised mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst
Metadaten
Titel
A Recent Survey on Cybercrime and Its Defensive Mechanism
verfasst von
Garima Bajaj
Saurabh Tailwal
Anupama Mishra
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_29

Neuer Inhalt