scholarly journals Cyber Crime, Cyber Space and Effects of Cyber Crime

Author(s):  
Sunil. C. Pawar ◽  
R. S. Mente ◽  
Bapu. D. Chendage

Cyberspace is a domain that uses the electronic and electromagnetic spectrum to store, modify, and exchange data through network and system-related physical infrastructures. Cyberspace is an endless space known as the Internet. Computer transactions, especially transactions between different computers, can be viewed as a space. Images and text on the Internet exist in cyberspace. The term is used in conjunction with virtual reality, giving the name of the imaginary place where a virtual object exists. If a computer creates a picture of a building that allows the architect to "walk in" and see what the nature of a design is, the building is said to be in cyberspace.Cybercrime is a series of organized criminal attack cyberspace and cyber security. Cybercrime such as Hacking into computer,this can be through a network system and clicking on unfamiliar links connecting to unrecognized Wi-Fi, downloading software and files to unsafe sites, consuming energy, electromagnetic radiation waves, and more. Cyber security is a serious problem and must be taken seriously as it has become a national concern. Currently, most electronic devices such as computers, laptops and cell phones come with built-in firewall security software, but even so, computers are not 100 percent accurate and reliable in protecting our data.

Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


2020 ◽  
Vol 2020 (27) ◽  
pp. 20-24
Author(s):  
Hazlina Shaik Md Noor Alam

This paper discourses several issues stemming from whistleblowing. These include, but are not limited to, imposition of liability for inaction in the face of wrongdoing, to scrutinising the available legislative protections for whistleblowers. This paper will also discuss whistleblowing in relation to cyber whistleblowing, which essentially means making disclosures on any misconduct that occurs on the internet. Cyber whistleblowing can provide the basic framework for combating misdeeds online, as it forms a central part of cyber security. Whistleblowing has its roots in less than desirable circumstances, often offering little to no benefit to whistleblowers involved. The act of blowing the whistle, all share common traits, to call attention too, and to punish any and all wrongdoings. Legitimising whistleblowing would enormously help to remove the stigma that is often tied to whistleblowers. This would also give rise to more voluntary whistleblowing in relation to cyber security.


2018 ◽  
Vol 9 (2) ◽  
pp. 25-32
Author(s):  
Alexandru Tăbuşcă ◽  
Silvia-Maria Tăbuşcă ◽  
Gabriel Garais

Abstract The new realities brought on us by the growing usage of IoT devices should be paralleled by new sets of paradigms and regulations, in order to not only accomplish the raise in the living standards of people but also to increase their level of human security. The IoT devices, as well as, in whole, the virtually completely internet connected society we live in today, need strong and clear rules and regulations, need laws that can help maintain and improve the cyber-security level. While being able to electronically track one’s children, by a multitude of IoT and other electronic devices, it is a great and useful feature we have to take into account that the same information, now shared over the internet, might also get into the wrong hands and lead to unpleasant or even dangerous situations.


Author(s):  
Andrea Chiappetta

Analyzing the evolution of new generation peripherals can affirm that the next decade will be characterized by the exponential increase in the number of “objects” interconnected to the internet that will be more able to communicate with each other independently and will lead to the affirmation of the paradigm internet of things (IoT), which will revolutionize everyday life on a global level. This evolution will concern not only the business realities, interested in the development of applications and systems necessary to emerge and be competitive on the market but also the ordinary citizens who will be surrounded by interconnected objects able to facilitate their everyday life. This aspect implies particular attention to the implementation of solutions oriented to cyber security necessary to guarantee an efficient and effective level of protection against the threats coming from the “world” internet, known by the term cyber space.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


Author(s):  
Rashmi Aggarwal

Cyber law is law of the Internet; hence, any crime on the Internet is basically cyber crime. It is committed on cyber space, but all the pre mediation is an act of individual/s, who are the perpetrators of crime with malicious intentions and commission of these acts. Cyber crimes were initially perceived as a subset of Information Technology (IT) laws, which governed the digital dissemination of both digitalized information and software. Digital information includes information security and electronic commerce. However, as the world became subservient to digitalization, cyber/Internet laws became more pronounced in their origin and are now a special branch of Internet laws. These laws include study of Internet access and usage, privacy rights, freedom of expression, and extra territorial jurisdiction issues. This chapter analyzes the cyber laws in India and raises the issues of criticality of provisions relating to dispute resolution in India.


2018 ◽  
Vol 3 (2) ◽  
pp. 248
Author(s):  
Azernikov A. D. ◽  
Norkina A. N. ◽  
Myseva E. R. ◽  
Chicherov K. A.

So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.


Author(s):  
Azeem Khan ◽  
N. Z. Jhanjhi ◽  
Mamoona Humayun ◽  
Muneer Ahmad

The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set of physical electronic devices embedded with intelligence, connected through a network, enabling them to collect and exchange data, and allowing these devices to be sensed and handled remotely between the physical and cyber worlds. The devices connected through the internet has been influencing all walks of our life ranging from individual, societal, educational, industrial, entrepreneurial, and related to governance as well. As we are connected and surrounded with a plethora of connected smart devices, it seems there is a great risk of security and privacy in several aspects, such as device authentication, data theft, device manipulation, data falsification, etc., to name a few. Hence, the current chapter has been undertaken to explore and comprehend the security and privacy related implications, opportunities, future directions, and challenges involved in implementing digital governance with IoT.


Author(s):  
Nabila Malik

Abstract: Software used to perform Cyber Crime are the most emerging subject in the field of Forensic Science. Today, the demand of computer and other electronic devices have increased. This creates an increase in Cyber crime and its awareness. This paper provides you vast information about methods of Cyber crime, Software used to perform cyber crime and a research study on them. In this paper you will also learn how can a software and its algorithm perform, what footprints your device left, what are the loopholes which help that software. This will help you for a better understanding of the software which were used to perform cyber crime and how can you prevent yourself from such activities. If you are a Forensic Expert than you will learn about the software tools which are used in computer forensic. I have analyzed many tools and I will share my study in this paper. After reading you will come to know how forensic science expert backup a hard drive, or how hackers steal your information.1 Keywords: Cybercrime, Hacking, Ethical hacking, Virus, Security, Cyber Security, Network Security.


Author(s):  
Bayisa Kune Mamade ◽  
Diriba Mangasha Dabala

The advancement of information communication technology has triggered a revolution in using the Internet for legitimate educational purposes on university campuses. Therefore, the Internet has changed the way of human communication and contributed to the development of mankind. On the other hand it is regrettable that its revolution has helped malicious users to exploit it for the malign purpose to commit a cyberspace crime that has in turn negatively affected fellow users who were preyed on by cyber predators. This work aimed to examine the awareness of cybersecurity, the measures taken to protect against cyberattacks and the state of victimization among professors at Ambo University. Thus, the present study comes up with the following findings. First, the result shows that the respondents’ cybersecurity awareness was significantly influenced by cyber-crime victimization, fields of study, and protection measures. Second, the current study also depicts that the respondents’ protection measures were connected to and influenced by cyber-crime victimization, education level, and cyber-security awareness. Finally, the study’s findings show that being a cyber-crime victim has been linked to predictors’ variables: protection measures and the level of cybersecurity awareness.


Sign in / Sign up

Export Citation Format

Share Document