Security to Protect From Cybercrime and Security Incidents Used To Commit Cybercrime in Cyberspace

Abstract

Security is the key to preventing or detecting Computer and Computer Network related criminal activity. Cybercrime is possible because Computers and Networks are not properly secured. Security Incidents have greatly increased over the years, where the attackers have increasingly improved in devising attacks towards a specific target. Cyber Incidents have created a global threat, both in defending local and global Computer Networks. Attacks are becoming more sophisticated and possess the ability to spread in a matter of few seconds.

Authors and Affiliations

Dr. P. B. Pathak

Keywords

Related Articles

Human Activity Recognition Using Gaussian Mixtures

Objective of recognizing human activity in the growing ubiquity and mobility of video data has emerged as one of the key research topic in computer vision and machine learning. This paper considers the inclusivity of la...

Estimation of Lipid Accumulation in Chlorella pyrenoidosa culturing in Different Concentrations of KNO3

The present study deals with growing microalgae Chlorella pyrenoidosa to assess its biofuel potential. The microalga was grown in Fogg’s media with different concentration of nitrate source. And an attempt has been made...

A Power Equalizer for Shaded PV Module

This paper deals with a photovoltaic (PV)-module embedded power-electronics topology derived from a battery equalizer. The photovoltaic equalizer is a promising response to the problems of partial shading in photovoltai...

Design and Implementation of Finger Writing In Air by Using Open CV (Computer Vision) Library on Arm Platform

The Main Aim of the project is to design “A Kinect Sensor for Finger Writing in the Air” Evaluating the performance of an operating system on an embedded before delving into its implementation, an introduction is needed...

Implementation of a High-Speed RSD Based ECC Processor with Vedic Multipliers

In this paper, an exportable application-specific instruction-set elliptic curve cryptography processor based on redundant signed digit representation is proposed. The processor employs extensive pipelining techniques f...

Download PDF file
  • EP ID EP21655
  • DOI -
  • Views 184
  • Downloads 4

How To Cite

Dr. P. B. Pathak (2016). Security to Protect From Cybercrime and Security Incidents Used To Commit Cybercrime in Cyberspace. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(2), -. https://europub.co.uk/articles/-A-21655