A Survey of Cyber Crimes
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 12
Abstract
Now a days Cyber Crime is the most significant challenges in India .Cyber Crimes are generally referred as criminal activities that use computers or networks. It can range from fraud to unsolicited emails (spam). It can include the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Characteristics and nature of Cyber Crime is important in helping research communities find ways to effectively prevent them. The internet is the electronic information field for such crimes. Such crimes have no space or time limitations and, naturally, there are no moral or legal barriers to them. Now it is a crucial challenge to us because day by day cyber crime is gradually increases. This paper provides a survey of Cyber Crimes that have actually occurred. The threat from Cyber Crime is multi-dimensional, targeting citizens, businesses, and governments at a rapidly growing rate. Cyber Criminal tools pose a direct threat to security and play an increasingly important role in facilitating most forms of organized crime and terrorism. This paper introduces some approach to prevent the various Cyber Crimes. To avoid Cyber Crimes there are many ways like, know how to recognize phishing, know the pitfalls of public Wi-Fi, use credit cards rather than debit cards etc. are discussed.
Authors and Affiliations
S. MISHRA , C. S. PANDA
Exploration of Cloud Computing and its Essential Facets
Cloud computing is all about how we can use external services over network by various resources provided by many different companies that share and access through the internet to perform many commercial essentialities. C...
Design and Comparative Analysis of CMOS Full Adder Cells Using Tanner EDA Tool
The binary adders are the fundamental and key component in digital signal processors, general purpose microprocessors and data-processing application specific integrated circuits. Therefore, binary adders are crucial bui...
Development of a Speech Recognition System for Speaker Independent Isolated Malayalam Words
In this paper, a speech recognition system is developed for recognizing speaker-independent, isolated words. Speech recognition is a fascinating application of Digital Signal Processing and is a pattern classification ta...
SPY BOT:A BOOM FOR CAMOUFLAGING
The objective behind making this project deals out with satisfying various functional needs such as secretly spying or keeping surveillance over a desired target location. We also aim to achieve a few more additional com...
FACE RECOGNITION SYSTEM BASED ON 2DFLD AND PCA
An automated system is used for fast human face recognition. The 2DFLD algorithm is tested on the various databases. PCA algorithm is tested on various databases. As the face system is totally nonintrusive, existing secu...