Sei sulla pagina 1di 7

IPASJ International Journal of Information Technology (IIJIT)

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


A Publisher for Research Motivation ........ Email:editoriijit@ipasj.org
Volume 6, Issue 11, November 2018 ISSN 2321-5976

An overview of Cyber crimes in diverse sectors:


Challenges and Preventive measures
K. Chitra Lekha, Dr. S. Prakasam
1
Ph.D Research Scholar, SCSVMV University
2
Associate Professor, SCSVMV University

ABSTRACT
Cyber crime is effortless to consign, firm to perceive and habitually firm to trace in jurisdictional terms, given the geographical
indeterminacy of the web. Hackers can demolish web sites and portal by hacking and get access to extremely private and
perceptive information. Cyber crime is the innovative rising drift of crime which has the potentiality to devastate each and
every characteristic of life of common people. Cyber crimes are a novel category of offenses which are quickly escalating due to
pervasive use of Internet and I.T. facilitated services. In view of the fact that the clients of internet are increasing global in
huge cipher day by day, where it is graceful to access any information simply within a few seconds by using internet which is
the medium for huge information and a large base of communications around the world, assured defensive actions should be
taken by all of us while utilizing the internet which will aid in challenging this foremost hazard cyber crime.
Keywords: Phishing, Hacking, Cyber squatting, Pornography

1. INTRODUCTION
Computer expertise is more and more omnipresent; the infiltration of knowledge in culture is a greeting pace towards
renovation but humanity desires to be enhanced and outfitted to grip with disputes linked with technology. Innovative
hacking skills are utilized to break through in to the network and the sanctuary vulnerabilities which are not habitually
revealed generate difficultly. Computers amid internet links have facilitated the guy to execute any task or bustles with
just one snap. Ordering provisions, online trade, performing bank dealings, receiving any sort of information at every
time and at any specified consign has turn out to be very simple, gratitude to the internet. Consequently this attests that
undoubtedly computers and internet are ubiquitous and are connected directly or indirectly in almost every bustle we
accomplish [1].
Cybercrime is existent peril to the rapid expertise development. This technologies dawn not merely redefined the
human verve but furthermore redefined cyber crimes. The hasty escalation of internet addicts and reliance significantly
amplified the risks of expenses of crime [2]. As the equipments are sprouting based on human desires the more we are
getting prone to hackers and terrorization which are departing more unrelenting and refined by the day. Now it’s time
for academe, manufacturing and regime to effort jointly in bold innovative ways to crack the majestic disputes of
information refuges. To contest today’s complicated intimidation and convene we require a multilayer loom to peril
impediment. Banks are predisposed to several distractions caused by diverse categories of bullying; various threats are
distinct under assorted categories i.e. trade stability scheduling, cyber fraud, and information refuge [3].
In today‘s world, an organization enslavement on cyberspace is flattering an progressively more facet of clerical
security. The infrastructure of diverse institutions are interrelated in cyberspace, hence the level of menace to refuge has
augmented vividly. The intimidation to cyber refuge is budding at cosmic pace. Computer systems at colleges and
Universities have turn out to be intentions since they accumulate identical documentation as bank. The cyber crimes
rivet the exploit of workstation, internet, and cyberspace along with the World Wide Web and confer augment to the
cyber illicit activities. Cyber scandalous are flattering classier and are indenting patrons as well as public and private
institutions.

2. CYBER CRIME & ITS CHALLENGES


The ancestry of cybercrime lies in technology and its significant infrastructure. As the number of internet users are
incessantly escalating and with this escalation, the risk of numerous types of cyber crimes is also augmented. Amid the

Volume 6, Issue 11, November 2018 Page 12


IPASJ International Journal of Information Technology (IIJIT)
Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm
A Publisher for Research Motivation ........ Email:editoriijit@ipasj.org
Volume 6, Issue 11, November 2018 ISSN 2321-5976

era of globalization, computers, mobiles and the internet have turn out to be component of our every day custom. As a
consequence of this, online dispensation information is made accessible on the internet conveying in latest threats in
the figure of cybercrimes. Such intimidation not only approach in diverse faces, but they also have diverse effecting
methods building it thorny for cyber experts to uncover a feasible elucidation [4]. Cyber crimes are in a progression of
hastening development and are appropriate gradually reutilized. Conspicuously, the electronic carve up thus
consequences in the partition of cyber crime. The vital conclusion is that illicit assets choose the quantity of offense,
while judicial assets decide the preclusion [5]. Cybercrimes are anecdotal in its nature owing to enrichment in
technologies. Despite the fact that there is no contracted description of the cybercrime, it is yet inevitable. Hardly any
classifications of such cyber crimes may stare like customary crimes conversely many of them are acknowledged as
different kinds of crime and to be griped in a diverse mode. Technology-based crimes have been emerging with the
passage of every day and they required to be cracked with chief precedence. Since companies, government societies,
and folks persist to rely on them more and more, so do the scandalous constraint of cyber crimes is reliant on
appropriate analysis of their performance and perceptive of their impacts over assorted levels of society [6].Cybercrime
slots in everything from downloading illicit movie files to thieving millions of dollars from online stock financial
statements. It furthermore embraces non-money transgressions, such as generating viruses, Trojans on other computers
or posting private trade information on the web. Cyberspace can be defined as an implicit globe of computers where
internet is implicated, wherever folks can interrelate, accomplish business, perform transactions, widen graphics [7].
Cyber security is the bustle of defending data and information systems through appropriate ritual and technical refuge
measures. Firewalls, antivirus software, and further scientific clarifications for conserving private data and computer
networks are crucial but not enough to ensure precautions [8]. Cybercrime has augmented in brutality and regularity in
the latest years and as of this, it has turn out to be a foremost distress for business, universities and institutions.
International regimes, law enforcement departments and intellect units have started to retort [9].
Eternal arguments are there concerning the pro and cons of cyber crimes. There are numerous disputes in abut of law
enforcement to scrap beside the cyber crime. Some of them are conferred beneath:
 Lack of attentiveness and the ethnicity of cyber refuge, at the level of individual as well as at an organizational
intensity.
 Shortage of skilled and competent manpower to execute the contradict dealings.
 No e-mail account strategy particularly for the guard forces, law enforcement and the defense bureau recruits.
 Cyber assaults have come not only from rebels but also from adjacent nations divergent to our National welfare.
 The rapidity in changes of cyber technology always thrashes the progress in the development of government sector
such that they are not able to spot out the derivation of these cyber crimes.
 The basic eligibility to join the police force doesn’t embrace any acquaintance of computer sector so that they are
almost not conversant to cyber crime.
 The endorsement of investigation and progress in ICTs is not up to the mark.
 Refuge forces and Law enforcement recruits are not outfitted to tackle futuristic cyber crimes.
 The current etiquettes are not self adequate, which spots out the exploratory task for cyber crimes that widen
globally.
 The funds for protection rationale by the government particularly for the training of law enforcement, defense
personnel’s and investigators in ICT are less as contrast to further crimes.

2.1 ROOTS OF CYBER CRIME


Since e-commerce communications endure to widen, the associated online prank relics an eye-catching reserve of
revenue for frauds. These bogus activities impose a considerable fiscal defeat to merchants, making online deceit
revealing a precondition [17].
2.1.1 Deprived law enforcement bodies: Due to holes in cyber laws of several countries, numerous scandalous get
away without being rebuked.
2.1.2 Reprisal or enthusiasm: The voracity to master the intricate system with an aspiration to wreak the loss to the
prey. It embraces adolescents or those who are obsessed by envy to make rapid cash and they corrupt with data like e-
commerce, e-banking or scam in transactions.
2.1.3 Cyber crimes stanched for exposure or identification: Normally committed by adolescents where they covet to
be discerned without throbbing someone's attitudes.
2.1.4 Cyber pranks: Cyber crimes can be stanched just to cause bullying or dent to one's reputation. This is the most
perilous of all bases. Cyber terrorists deem in combating for their cause and covet their target to be attained.

Volume 6, Issue 11, November 2018 Page 13


IPASJ International Journal of Information Technology (IIJIT)
Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm
A Publisher for Research Motivation ........ Email:editoriijit@ipasj.org
Volume 6, Issue 11, November 2018 ISSN 2321-5976

2.1.5 Ease of access: The crisis stumble upon in safeguarding a system from illicit access is that there is every prospect
of infringing the technology by pilfering access cipher, retina imagers etc. that can be utilized to deceive biometric
systems and evade firewalls to get past many security systems.
2.1.6 Slackness: There are some situations of not concentrating in protecting the system. This laxity confers the
scandalous a power to scratch the system.

3 TAXONOMY OF CYBER CRIME

3.1 Cyber crime against women


3.1.1 Cyber Stalking: It engrosses following a personnel actions crosswise the internet by relocating the posts
(occasionally frightening) on the dispatch boards recurrent by the prey, entering the chat-rooms recurrent by the
sufferer, persistently showering the dupe with emails etc.
3.1.2 Cyber Defamation: It rivets any individual with purpose to lesser down the pride of the personality by slashing
his/her mail account and sending some mails with using rude idiom to mysterious people mail account.
3.1.3 Pornography: It is defined by pedophiles using computer possessions to dispense illegitimate media of and to
minors, as well as appealing in dealings to sexually abuse offspring, surplus publicity to sexually precise material, when
a criminal propels films, cartridges, sound clips cartoons or animations portraying sexual contents by e-mail or by
using web camera.
3.1.4 Email Spoofing: A spoofed email or E-mail forging is one that materializes to derive from one basis but in reality
has been sent from another foundation. The foremost target of the assailant in this case is to disrupt the sufferers e-mail
service by conveying him/her a bulky amount of emails.
3.1.5 Cyber Bullying: Cyber bullying is any annoyance that transpires via the internet. Some examples of cyber
bullying are brutal forum posts, name vocation in chat rooms, posting bogus profiles on web sites, and mean or cruel
email messages.
3.2 Cyber crimes in banking sector
The intricacy of recent endeavors, their reliance on machinery and the dedicated interconnectivity among the society
have formed extensive prediction for larceny, fraud and other forms of exploitation by offenders both outside and inside
the banks [10]. Banking sectors are prone to numerous disruptions originated by a variety of categories of cyber
threats; numerous assaults are discrete under diverse groups that is cyber hoax, trade eternalness development and
information defense measures [11].
3.2.1 Cyber squatting: This is a process in which an eminent province name is registered and then it is vended for a
affluence. Cyber Squatters inventory domain names which are analogous to admired service providers’ domains so as to
magnetize their users and gain from it.
3.2.2 SMS Spoofing: It is fairly new technology in which the user obtains a SMS note on mobile that emerges to be
upcoming from a genuine bank. In this SMS the instigating mobile number (Sender ID) is swapped by alphanumeric
text. Here the user may be tricked to furnish his/her online credentials and his/her funds may be at threat of larceny.
3.2.3 Hacking: It is an electronic invasion, or ahead admittance to assets like processor, e-mail or social networking
accounts such by the use of a chip or network resource devoid of acquiescence.
3.2.4 Credit card fraud/theft: It is the illicit utilization of a credit/debit card to deceptively attain cash or assets.
Credit/debit card numbers can be stolen from unsecured web sites, or can be acquired in an identity theft proposal.
3.2.5 Phishing: Phishing means frustrating to deceive people into leaving with their money. Phishing refers to the
reception of voluntary emails by clients of financial institutions, demanding them to enter their username, password or
other personal information to access their bank account. The cyber criminal then has right of entry to the customer's
online bank account and to the funds enclosed in that account.
3.2.6 Salami attacks: These attacks are utilized for obligating financial crimes. The input here is to make the
modification so irrelevant that in a solitary case it would go utterly unnoticed e.g. an employee in factory inserts a
program into factory‘s servers that deducts a small amount from the account of every worker.
3.2.7 Data diddling: This sort of an assault rivets shifting raw data just ahead of it is processed by a processor and then
altering it flipside after the processing is accomplished.
3.3 Cyber crime against Organizations
There are an enormous amount of cyber intimidation and their deeds are thorny to early perceptive thus tricky to
confine in the early phases of the cyber assaults. They enclose severe brunt over the society in the form of economical

Volume 6, Issue 11, November 2018 Page 14


IPASJ International Journal of Information Technology (IIJIT)
Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm
A Publisher for Research Motivation ........ Email:editoriijit@ipasj.org
Volume 6, Issue 11, November 2018 ISSN 2321-5976

disrupt, psychological disorder, menace to National defense etc [12]. The efficiency of the performance of the cyber
laws in India is a highest imperative to guard our society new cohort of crimes and scandalous and whether it has been
victorious in India or not is the current research query [13].
3.3.1 Denial of Service attacks: The assailant usually target site or service hosted on impressive web servers such as
bank, credit card recompense gateways, mobile networks and yet core name servers. Denial of service attacks are
intended to devour assets so that further clients are incapable to utilize the assets and are consequently ―denied
service. In a Computer network background, the key assets are memory, bandwidth and CPU.
3.3.2 Data theft: It is the term used to depict when the information is illicitly copied or taken from a trade or from any
person. Usually, this data is client information such as passwords, defense codes, credit card data, private information,
or further confidential profitable information. Since this data is illicitly attained, when the person scarf this information
is detained, it is probable that he or she will be impeached to the fullest scope of the regulation.
3.3.3 Software Piracy: It refers to the illicit replication of authentic programs or the forged and allocation of products
proposed to exceed for the novel. These sort of cyber crimes also embrace patent breach, trademark destructions,
larceny of system source code, copyright breach etc.
3.3.4 Money Laundering - It means stirring of illicitly attained currency through monetary and further systems so that
it emerges to be officially gained. This is probable proceeding to computer and internet expertise and electronic
transfers had made it easier and more thriving.
3.3.5 Spamming - It is of transfer unsolicited bulk and commercial messages over the internet. Even though
exasperating to for the most part of email addicts, it is not illicit except it grounds dent such as congestion network and
distracting service to subscribers or creates pessimistic brunt on customer attitudes towards Internet Service Provider.
3.4 Cyber crime against Government
Globally, both governmental along with non-state performers slot in cybercrimes, including spying, monetary larceny,
and other cross-border crimes. Bustle voyage global borders and concerning the interests of at slightest one nation state
is at times referred to as cyber conflict [14].
3.4.1 Cyber Trafficking: It engrosses trafficking in medicines, human beings, missiles and weapons etc. which
distress huge quantity of people.
3.4.2 Web jacking: It means enchanting dynamic power of another individuals’ website. In this situation, the
proprietor of the website loses power over his/her website and its patent.
3.4.3 Logic Bombs: A logic bomb is a bit of cryptogram deliberately slot into a software system that will deposit a
malicious function when precise conditions are accessible. For instance, a programmer may conceal a part of cipher
that begins erasing files should they ever be concluded from the business.
3.4.4 Online Gambling: Online hoax and corrupt is one of the most profitable dealings that are emerging nowadays in
the cyber space. In India, a lot of gaming and betting is made on the surname of cricket through internet.
3.4.5 Sale of Illegal articles: This sort of cyber crimes embraces auction of weapons, narcotics, and wildlife etc., by
distributing information on websites, mart websites, and dispatch boards or just by utilizing email statements.
3.4.6 Online Forgery: It means to betray huge amount of people by transferring bullying posts as online dealing
transactions are fetching the consistent requirement of today’s life mode.
3.4.7 Cyber terrorism: It is a foremost blazing issue in the marital as well as universal distress. The frequent type of
these radical assaults on the web is by scattered denial of service attack, revulsion websites and disgust e-mails, molest
on susceptible computer networks etc. Cyber terrorism tricks imperil the autonomy and veracity of the nation.
3.5 Cyber crime against Property
Cyber assaults may have several incentives behind it or may be practiced unintentionally. The assaults those are routed
intentionally can be considered as the cyber offense and they encompass severe brunt over the society in the form of
reasonable upset, psychosomatic chaos, peril to national defense etc [15]. Several of the risks that are coupled with e-
commerce that embraces but not limited to, stolen Credit card digits, celebrity theft, stolen communal security codes,
and occasionally wares bought and compensated for never appear [16] .
3.5.1 Cyber Vandalism: Vandalism means intentionally destructing assets of another. Thus cyber vandalism means
devastating the data or information hoarded in processor when a network service is interrupted. It may incorporate
within its purview any sort of substantial destruction done to the processor of any person
3.5.2 Intellectual Property Crimes: Intellectual property consists of a cluster of privileges. Any illicit act by which the
proprietor is destitute absolutely or partly of his privileges is an offense. The most general type of IPR breach may be

Volume 6, Issue 11, November 2018 Page 15


IPASJ International Journal of Information Technology (IIJIT)
Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm
A Publisher for Research Motivation ........ Email:editoriijit@ipasj.org
Volume 6, Issue 11, November 2018 ISSN 2321-5976

alleged to be software piracy, breach of copyright, brand name, exclusive rights, intends and service mark abuse,
burglary of computer source cipher, etc.
3.5.3 Cyber Squatting: It rivets two or more people asserting for the same domain name either by alleging that they
had recorded the name first on by right of using it earlier than the other or utilizing rather similar to that formerly. For
instance two analogous names i.e. www.ping.com and www.pinng.com
3.5.4 Transmitting Virus: In a network, viruses are specific programs developed by programmers that affix themselves
to other files and to other systems and essentially distress the data on that computer either by deleting or by altering the
information in it.
3.5.5 Hacking Computer System: Hackers harass those incorporated eminent Twitter, blogging dais by illegal
access/power over the workstation. Owing to the hacking bustle, there will be loss of data as well as sensitive
information. Also investigations principally signifies that those attacks were not essentially projected for economic gain
too and to shrink the reputation of meticulous person or company.
3.5.6 Cyber Trespass: Devoid of precise endorsement of the proprietor, to access someone’s computer or network with
the intention to demolish, alter or misuse the data or system using the wireless internet connection.
4. CYBER OFFENSE PREVENTION GUIDELINES
Information refuge plays a significant responsibility in the enduring progress of information expertise, as well as
internet services. Making the internet safer has turn out to be vital to the expansion of latest services and strategies for
any institute [18]. These are the defensive procedures utilized typically that facilitates to avoid deeds of cyber allied
crimes, which embraces the subsequent explicitly,
 Edification – Apart from attaining power from information, hackers also earn huge amount of money. By
enlightening ourselves about the types of stings that subsists on the internet and how to thwart them, we are positioning
our self one pace ahead of the cybercriminals.
 Exploit a firewall - Firewalls scrutinize passage involving your computer or network and the internet and serve as
an immense foremost streak of guard when it comes to keeping burglars out. Make sure to utilize the firewall that
comes with your defense software. And if you enclose a domicile wireless network, facilitate the firewall that arrives
with your router.
 Connect with warning - When you are scrutiny your email or discussing over instant messenger (IM), be wary not
to snap on any links in posts from inhabitants you don’t discern. The link may perhaps seize you to bogus website that
inquires for your clandestine information, such as user names and passwords, or it may perhaps download malware
onto your workstation. Even if the communication is from somebody you discern, be wary. Several viruses imitate and
extend through email, so stare for information that signifies that the communication is genuine.
 Perform secure surfing - While steering the net, you required to seize safety measures to circumvent spurious
websites that pose for your private information and pages that enclose malware. Utilize a search engine to facilitate you
steer to the accurate web address ever since it resolve correct misspellings. That approach, you won’t twist up on a
phony page at a frequently misspelled address.
 Carry out secure shopping - In addition to enthusiastic safe and sound surfing, you also should be wary where you
shop online. Be vigilant when shopping at a site that you’ve never visited prior to and do a slight inquiry before you
penetrate your expense details.
 Utilize inclusive refuge software and retain your system modernized - Since hackers enclose an extensive
assortment of ways to access your system and information, you required to inclusive security software that can guard
you from all perspectives.
 Safeguard your wireless network - Hackers can access information as it’s in transfer on an unsecured wireless
system. You can retain the hackers away by facilitating the firewall on your router and altering the router’s proprietor
secret code. Cyber scandalous frequently recognize the evade passwords and they can utilize them to lacerate into your
system. You could also desire to deposit up your router so it only allocate access to people with passwords that are
encrypted. Confirm your owner’s guide for instructions on setting up encryption.
 Utilize sturdy passwords - Burly passwords can depart a extensive way in serving protecting your information,
hence prefer a password that is at least 10 characters lengthy and contains of a amalgamation of letters, figures and
unique characters. Besides remember alter your password sporadically to shrink the probability of it being conciliation.
 Exploit common intelligence - In spite of the admonitions, cybercrime is escalating, fueled by general faults people
make such as retorting to spam mails and downloading attachment from people they don’t discern. So, exploit common
wisdom every time you’re on the internet. By no means don’t post any private information online or share receptive

Volume 6, Issue 11, November 2018 Page 16


IPASJ International Journal of Information Technology (IIJIT)
Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm
A Publisher for Research Motivation ........ Email:editoriijit@ipasj.org
Volume 6, Issue 11, November 2018 ISSN 2321-5976

information such as your social sanctuary figure and credit card digits. Implement prudence when snapping on any
links or downloading any agendas.
 Be chary - Even if you deem yourself cyber savvy, you still require to remain your sentry up for any latest tricks and
be practical concerning your security. Endorsement your data recurrently in case something goes mistaken, and
scrutinize your financial statement and tribute reports to formulate sure that a hacker has not stolen your information or
distinctiveness. Even though defending yourself does take some endeavor, consider that there are a assortment of
possessions and tools to facilitate you.
4.1 STIPULATION OF VIRTUAL DEFENSE
Information is the most precious asset with revere to an individual, country or a state.
 With revere to an individual, the fretful spots are:
1) Defending illicit access, revelation, alteration of the assets of the system.
2) Protection throughout on-line dealings concerning shopping, banking, airway reservations and share markets.
3) Refuge of accounts while utilizing social-networking sites against hijacking.
4) One way to enhanced cyber security is an improved perceptive of the peril and of the vectors utilized by the cyber
attacker to thwart cyber defenses.
5) There is a need of separate entity managing defense of the institute.
6) Several institutions magnetize diverse types of opponents, with various goals, and thus require diverse levels of
attentiveness.
7) In recognizing the temperament of the cyber threat, an institution faces the interaction of an adversary’s
potentialities, intentions and targeting tricks must be measured.
 With revere to a country or a state,
1) Protecting the information embracing various crucial appraisals and their intelligence.
2) Defending the data source and retaining the details of all the rights of the institutions at country or state level.
CONCLUSION
Owed to diversified temperament, it is intricate to spot the cyber refuge tribulations which escorts to ignorance on
security issues. The propagation in indexing the cybercrimes under diverse sections of IT act and IPC reveals the
brutality of such cyber threats however most of the cases were still unreported since of assorted motives. It is not
probable to purge cyber crime from the cyber hole but it is pretty feasible to ensure them. Record is the witness that no
legislation has thrived in utterly eradicating cyber crime from the world. The solitary feasible stride is to formulate
people alert of their rights and duties and further creating the application of the commandments more rigorous to check
cyber crime. Certainly, the Information Act is a chronological step in the cyber world where the cyber law is
persistently being progressed. Cyber-Security, Cyber-Ethics, and Cyber-Safety concerns required to be incorporated in
the learning progression from the early period. Protection defies procedures aid to ensure the secrecy, accessibility, and
reliability of information systems by thwarting or extenuating quality losses from Cyber refuge attacks. Recently cyber
defense systems has surfaced with infrastructures with a spotlight on safeguard of precious information hoarded on
those systems from opponents who want to attain, distort, dent, raze or exclude access to it.

References
[1] Niral Shah and Naveen Vaswani, “Cyber Crime and Security- Challenges and Security Mechanisms”, International
Journal of engineering Trends and Technology, XXXVI(7), pp. 367-371, 2016.
[2] Vishi Aggarwal and Ms. Shruti, “Cybercrime victims: a comprehensive study”, International Journal of Creative
Research Thoughts, VI(2), pp. 640-648, 2018.
[3] Manpreet kaur, Divya Bansal and Sanjeev Sofat, “Study of Cyber Frauds and BCP Related Attacks in Financial
Institutes”, International Journal of Information & Computation Technology, VI(4), pp. 1647-1652, 2014.
[4] Anil Kumar and Anil Kumar, “Threat of Advancing Cyber Crimes in Organizations: Awareness and Preventions”,
International Journal of Advanced Research in Computer Science, V(8), pp. 84-91,2014.
[5] Johannes Xingan Li, “Cyber Crime and Legal Countermeasures: A Historical Analysis”, International Journal of
Criminal Justice Sciences, XXII(4), pp. 196-207, 2017.
[6] Sumanjit Das and Tapaswini Nayak, “Impact of cyber crime: issues and challenges”, International Journal of
Engineering Sciences & Emerging Technologies, VI(2),pp. 142-153, 2013.
[7] Rupinder Pal Kaur, “Statistics of cyber crime in India: an Overview”, International Journal of Engineering and
Computer science, II(8), pp. 2555-2559, 2013.

Volume 6, Issue 11, November 2018 Page 17


IPASJ International Journal of Information Technology (IIJIT)
Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm
A Publisher for Research Motivation ........ Email:editoriijit@ipasj.org
Volume 6, Issue 11, November 2018 ISSN 2321-5976

[8] Atul M. Tonge, Suraj S. Kasture and Surabi R. Chaudhari, “Cyber security: challenges for society- literature
review”, IOSR Journal of Computer Engineering, XIX(2), pp. 67-75, 2013.
[9] Arpana and Dr. Meenal Chauhan, “Preventing cyber crime: a study regarding awareness of cyber crime in
Tricity”, International Journal of Enterprise Computing and Business Systems, II(1),2012.
[10] K.Chitra Lekha and Dr. S. Prakasam, “A Survey on Data Mining Techniques in Cyber Crime”, IEEE –
International Conference on Electrical, Electronics, Computers, Communications, Mechanical and Computing, No.
2, January 2018.
[11] K. Chitra Lekha and Dr. S. Prakasam, “Data mining Techniques in detecting and predicting Cyber crimes in
Banking sector”, IEEE – International Conference on Energy, Communication, Data Analytics and Soft
Computing, No. 3, August 2017.
[12] Devika Singh,”Emerging trends in Cyber crimes”, Global Journal of Enterprise Information System, VI(4),pp. 29-
32,2014.
[13] P. K. Vineetha, “Managing cyber crimes in India – issues and challenges”, Journal of Exclusive Management
Science, I(11),2012.
[14] Abhishek Gupta and Dr. Jatinder Singh Manhas, “A Study on Cybercrime in Jammu & Kashmir”, International
Journal for Research in Applied Science & Engineering Technology, VI(2), pp. 595-598, 2018.
[15] Hemraj Saini, Yerra Shankar Rao and T.C.Panda, “Cyber-Crimes and their Impacts: A Review”, International
Journal of Engineering Research and Applications, II(2), pp. 202-209, 2012.
[16] Israel D. Fianyi, “Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics”, 2015.
[17] K. Chitra Lekha and Dr. S. Prakasam, “Implementation of Data mining techniques for Cyber crime Detection”,
International Journal of Engineering, Science and Mathematics, VII(4), pp. 607-613, 2018.
[18] Ms. Shazia Ali, Dr. Sadia Husain and Manju Sharma, “A study on Emerging Cyber Technologies, Threats and
Prevention in Information Security”, IOSR Journal of Computer Engineering, XIX(2), pp. 49-54, 2017.
[19] Rajarshi Rai Choudhury, Somnath Basak and Digbijay Guha, “Cyber Crimes- Challenges & Solutions”,
International Journal of Computer Science and Information Technologies, VI(5), pp. 729-732, 2013.

AUTHOR

K. Chitra Lekha pursuing Ph.D as full time research scholar in Department of Computer Science and
Application, SCSVMV University,Enathur. She has received her M.Phil(Computer Science) from
SCSVMV University in 2016, M.Sc(Computer Science) from Annamalai University in 2015 and
B.Sc(Computer Science) from Annamalai University in 2013. She has presented 2 papers in IEEE
Conference and in a National level Conference and published 4 papers in International Journals. Her
research interest include Data mining, Machine Learning, Software Engineering and Cyber Security.

Dr.S.Prakasam received his Ph.D from SCSVMVUniversity, Enathur, in 2011, M.C.A degree from
Madras University in 2000 ,B.Sc (Mathematics) from Madras University in 1996. He is presently
working as Associate Professor in Department of Computer Science and Application, Sri
Chandrasekharendra Saraswathi Viswa Mahavidyalaya(SCSVMV) University, Enathur. He possesses 16
years of vast experience in Computer Science and Applications and has guided many research scholars.
He has presented 3 papers in International Conference and he is the author of 40 papers in International
journals of repute. His research interests include Knowledge Engineering, Software Agents, and Data Mining.

Volume 6, Issue 11, November 2018 Page 18

Potrebbero piacerti anche