An Analysis on Cyber Crime, Cyber Threats and Role of Cyber Analyst

Abstract

Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, Spam and so on. All such crimes are computer related and facilitated crimes. With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company.

Authors and Affiliations

Miss. Debalina Nandy, Mr. Renish J Padariya

Keywords

Related Articles

A Secured framework for SACM in Cloud Computing

The paradigm that offers Cloud computing is advantages in economic aspects, by reducing flexible computing, capabilities limitless computing power and time to market. To use the full potential of cloud computing like tr...

slugManufacturing of 64-Bit Vliw Microprocessor

In the two decades since FPGAs introduced, the way which digital logic is designed and deployed has been radically changed. FPGAs have made possible entirely new types of applications. It is very important to design mi...

Seismic Performance and Evaluation of An Existing Highway Bridge Across the Palar River Near Kanchipuram

Structurally sound bridges are the need of people which made us converge all our views to design a major bridge. As of present scenario the design of a bridge includes, following updated code provisions for vehicle load...

Implementation of an IOT Based Smart Chair

We present the implementation of a Smart IoT Chair system for Internet of Things (IoT) that combines an embedded device and IOT server. The proposed Smart IoT Chair records and visualizes user’s posture through a smart...

Improving Performance of Diesel Engine with Reduction of Emissions by Applying Magnetic Field

I.C. engine used in automobiles has a problem of pollutant emission, which mainly depends on combustion process occurs in I.C. engines. Incomplete combustion produces large amount of emission gases & gives lower efficie...

Download PDF file
  • EP ID EP21721
  • DOI -
  • Views 286
  • Downloads 4

How To Cite

Miss. Debalina Nandy, Mr. Renish J Padariya (2016). An Analysis on Cyber Crime, Cyber Threats and Role of Cyber Analyst. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://europub.co.uk/articles/-A-21721