Cyber Security Awareness and Prevention Strategies

Authors

  • Rajat Bhatia Research Scholar, University of Technology
  • Dr. Mohit Gupta Associate Professor, Department of Computer Science, University of Technology

Keywords:

cyber security awareness, prevention strategies, computer, unlawful behaviour, financial crimes, sale of illicit things, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking, unauthorised access, theft of information, e-mail bombing, Salami attacks, logic bombs, Trojan attacks, Internet time thefts, web jacking, theft of computer system, physically damaging, internet, physical infrastructure, innovation, changes in economics, personal communication, information age, instant communication, point-to-point communication, private communication, public communication, worldwide resource, standardised set of protocols, mutually agreed upon, parties involved

Abstract

The use of a computer as a tool can be involved in the following forms of unlawful behaviourfinancial crimes, sale of illicit things, pornography, online gambling, intellectual property crime, e-mailspoofing, forgery, cyber defamation, and cyber stalking. Computers may also be utilised to participate inonline gambling games such as poker and blackjack. On the other hand, the computer could be a targetfor illegal activity in the following scenarios unauthorised access to the computer, computer system orcomputer networks, theft of information contained in electronic form, e-mail bombing, Salami attacks,logic bombs, Trojan attacks, Internet time thefts, web jacking, theft of computer system, and physicallydamaging the computer system. The internet has emerged as the most vital piece of physicalinfrastructure in this modern era. There has never been a time in the history of mankind and there hasnever been an innovation that has generated such great and substantial changes in the economics of theglobe, personal communication, and every sector that pertains to our age as the information age has.The internet provides instant communication between any computers that are linked to it, point-to-pointcommunication, and offers an expanding number of private and public communication options. TheInternet is a worldwide resource that connects millions of users using a standardised set of protocols.These protocols are a form of communication that is mutually agreed upon between the parties involved.

References

Miller LeRoy Roger, Cross B. Frank, The Legal and e-Commerce Environment Business in its Ethical Regulatory and International Setting, (South-Western Thomson Learning, South- Western College Publishing, A Division of Thomson Learning, 2002)

Mishra R.C., Cyber Crime: Impact in the new Millennium, (Authorspress Global Network, E-35/103, Jawahar Park, Laxmi Nagar, Delhi- 110092, 2002)

Nair P.M., Cambating Organised Crime, (Konark Publishers P.Ltd., A- 149, Main Vikas Marg, Delhi- 110092, 2002)

Nanda SS and Tewari RK, Forensic Science in India: A Visionfor the Twentyfirst Century, (Select Publishers, New Delhi, 2001)

Nigam R.C., Law ofCrime in India Vol. I Principles ofCriminal Law, (Asia Publishing House, Bombay, 1964)

Oberoi Sundeep, E-Security and You- Electronic Authentication and Information Systems Security, (Tata Me Graw- Hill Publishing Co Ltd., New Delhi, 2001)

Panda D.N., Practical Handbook on The Information TechnologyAct, (Mashbra Industries P Ltd., Saurabh Print-o-Pack, Noida, 2000)

Papke Jerry, Bader laura, Cambating Computer Crime- Prevention, Detection and Investigation, (Charrtico Publishing Co. Inc., Me Graw Hills, Inc., 1992)

Paranjape N.V., Criminology and Penology, (Central Law Publications, Law Publishers and Book Sellers, 107, Darbhanga Colony, Allahbad, 1996)

Peter Carey, Data Protection in the UK, (Blackstone Press Limited, Aldine Place London W128 AA UK, 2000) 55. Pfaffenberger B., Protect Your Privacy On The Internet, (Wiley, 1997)

Pfleeger P. Charles, Pfleeger Lawrence Shari, Security in Computing, (Pearson Edition (Singapore) Pvt Ltd., Indian Branch, 482 F.I.E. Patparganj, Delhi110092, 2004)

Reed Chris, Computer Law, (Universal Law Publishing Co. Pvt Ltd., New Delhi, 2000) 58. Reed Chris, Internet Law Text andMaterials, (Butterworths Indian, New Delhi, Reed Elsnier, UK Ltd, 2000)

Downloads

Published

2023-10-01

How to Cite

[1]
“Cyber Security Awareness and Prevention Strategies”, JASRAE, vol. 20, no. 4, pp. 345–351, Oct. 2023, Accessed: Jun. 29, 2024. [Online]. Available: https://ignited.in/jasrae/article/view/14560

How to Cite

[1]
“Cyber Security Awareness and Prevention Strategies”, JASRAE, vol. 20, no. 4, pp. 345–351, Oct. 2023, Accessed: Jun. 29, 2024. [Online]. Available: https://ignited.in/jasrae/article/view/14560