Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
org
27
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org
When the FBI began their search he estate, pay BAL, Work-at-home donation
went on the run but was eventually processing etc.
caught. He was given to 5 years Malicious Software: These are Internet-based
penitentiary. He was the first to have a progammes or software used to disrupt a network.
ban on Internet use included in his It is utilized to gain access to a system to thieve
sentence. sensitive information or damaging to software
The World Wide Web is launched, present in the system.
1994 which allowed hackers to shift their Cyber warfare: It is Internet-based conflict
product info from the old bulletin board involving politically motivated attacks on
systems to their own websites. A student information systems. Cyber warfare attacks may
in the UK uses the information to hack disable official websites and networks, disrupt or
into Korea’s nuclear program & US disable essential services, thief or change data, etc.
agencies using only a Commodore among many other possibilities.
Amiga personal computer. Domain hijacking: It is the act of changing the
CIA Director John Deutsch informed registration of a without permission of its original”
1996 that crime rings were actively trying to registrant.
hack US government and corporate SMS Spoofing: SMS Spoofing allows changing
networks. The US GAO announced files the name or number text messages appear to come
had been attacked at least 6,50,000 from.
times.
28
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org
itself. The Morris worm told so that the early think it is not necessary. It is no wonder; about
internet slowed causing untold damage. 45% of attacks are due to employee carelessness.
The worm had effects that lasted beyond an Hyper adoption is putting consumers at risk before
internet slowdown. Robert Morris was the first regulators can react. Consumers are using
person successfully charged under the Computer sophisticated technologies which are much too
Fraud and Abuse Act. Due to this act “Computer advanced for the current controls in place.
Emergency Response Team” was formed. This Employees working at companies are not aware
functions as a non-profit research centre for issues about information security awareness, and many
that could affect the internet as a whole. think it is not necessary. It is no wonder, about
The viruses started after Moris worm found to be 45% of attacks are due to employee carelessness.
deadlier infecting more systems.
The Morris worm also brought with it one last
irony. The worm took advantage of the send-mail STRATEGIES FOR PREVENTION
function in Unix. This was related to the email
function originally formed by Ray Tomlinson. By updating the computers regularly, you block
It’s hard to forget the WannaCry, “the biggest attackers making to take advantage of software
ransomware offensive in history.” Within 24 hours, flaws(vulnerabilities)that they could otherwise use
WannaCry had infected more than 230,000 to break into your system. Selecting password that
computers in over 150 countries. cannot be easily guessed is first step toward
keeping your information secured.
NEED OF CYBER SECURITY Keep your password in safe place and try not to use
the same password for online services. The
Cyber security is needed because government, password needs to change on regular basis, at least
corporate, financial, and medical organizations every 90 days. Protect your computer with security
stores abundant amounts of data on computers and software. Protect your personal information by
other devices. A remarkable portion of that data keep an eye out for phony email messages, don't
may be crucial information, it might be intellectual respond to email message that ask you for personal
property, accounting data, personal information, or information (Kumbhar & Gavekar 2017). Pay
other informatio for which unauthorized access attention to privacy policies on web sites and in
could have negative results as the volume and software. Guard your email address. Review bank
sophistication of cyber-attacks grow, companies and credit card statements regularly everyone is
and organizations that areas regarding information talking about AI and machine learning, and it can
related to national health, security required to take be hard to establish the practical applications
steps to protect their business and personal around the buzz.
information. However, machine learning & AI are the leading
STATUS OF CYBER SECURITY IN INDIA technology in security. Endpoint security
technologies use machine learning to confirm that
Regulators are used for playing catch-up, and they applications are running securely. Vendors are also
are doing too little, too late. merging artificial intelligence and machine learning
The Reserve Bank of India (RBI) and Insurance into security products to identify patterns of
Regulatory Development Authority of India performance that are general, as opposed to
(IRDAI) had released guidelines on Information threatening.
and Cyber Security in the last few years. However,
as cyber-attacks become more sophisticated, these CYBER SECURITY TECHNIQUES
norms having limitation to establish controls of Access control and password security: The concept
crisis more than five years ago. Hyper adoption is of password & user name is the main way of
putting consumers at risk before regulators can protecting our information. This may be one of the
react. Consumers are using sophisticated first measures regarding cyber security.
technologies which are much too advanced for the Authentication of data: The documents that we
current controls in place. want should be checked before downloading and a
Companies are extracting value from data but are reliable source and that they are not altered.
neglecting risks associated with doing so. Most of Authenticating of these documents is normally
the companies do not have an Information Security done by the antivirus software present in the
Management System. devices. Thus good antivirus software is also
essential to protect the devices from viruses.
Employees working at companies are not aware
Malware scanners: This is software that usually
about information security awareness, and many
scans all the files and documents present in the
29
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org
30
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org
REFERENCES
Yassir, A., & Nayak, S. (2012). Cybercrime: A Threat To Network Security. International Journal of Computer
Science And Network Security Review, 12.
Schjolberg, S. (2017). The History of Cybercrime. Cybercrime Research Institute Review, 12.
Kumbhar, M., & Gavekar, V. (2017). A Study of Cybercrime Awareness For Prevention and Its Impact.
International Journal of Recent Trends in Engineering & Research Review, 03. 241-242.
Singh, A. (2017). Studies Report on Cyber Law in India & Cybercrime Security. International Journal of
Innovative Research in Computer and Communication Engineering Review, 05.
Namayandeh, M., & Taherdoost, H. Review Paper on Computer Ethics and Related Research Models.
Websites:
http://www.pollere.net/Pdfdocs/1021103-technical_only.pdf
https://digital.wings.uk.barclays/for-everyone/milestone/introduction-to-cyber-security/
]https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
https://www.testbytes.net/blog/cyber-attacks-on-india-2018/
http://rtinagpur.cag.gov.in/uploads/CaseStudies/CaseStudiesonCyberCrimesNOTSENT/CaseStudiesonCyberCrim
es.pdf
https://digitalguardian.com/blog/what-cyber-security
http://www.helplinelaw.com/employment-criminal-and-labour/CCII/cyber-crimes-in-india-what-is-types-web-
hijacking-cyber-stalking.html
https://www.123helpme.com/cyber-crime-and-cyber-law-preview.asp?id=191081
31
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018