cyber crimes
Recently Published Documents


TOTAL DOCUMENTS

279
(FIVE YEARS 123)

H-INDEX

8
(FIVE YEARS 1)

Information ◽  
2022 ◽  
Vol 13 (1) ◽  
pp. 22
Author(s):  
Mohamed Amine Ben Farah ◽  
Elochukwu Ukwandu ◽  
Hanan Hindy ◽  
David Brosset ◽  
Miroslav Bures ◽  
...  

The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ports. The vulnerabilities of the Global Navigation Satellite System (GNSS) have been given particular consideration since it is a critical subcategory of many maritime infrastructures and, consequently, a target for cyber attacks. Recent research confirms that the dramatic proliferation of cyber crimes is fueled by increased levels of integration of new enabling technologies, such as IoT and Big Data. The trend to greater systems integration is, however, compelling, yielding significant business value by facilitating the operation of autonomous vessels, greater exploitation of smart ports, a reduction in the level of manpower and a marked improvement in fuel consumption and efficiency of services. Finally, practical challenges and future research trends have been highlighted.


2021 ◽  
Author(s):  
David Ward ◽  
Paul Wooderson

Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems and components that govern safety must be protected from harmful attacks, unauthorized access, damage, or anything else that might interfere with safety functions. Automotive Cybersecurity: An Introduction to ISO/SAE 21434 provides readers with an overview of the standard developed to help manufacturers keep up with changing technology and cyber-attack methods. ISO/SAE 21434 presents a comprehensive cybersecurity tool that addresses all the needs and challenges at a global level. Industry experts, David Ward and Paul Wooderson, break down the complex topic to just what you need to know to get started including a chapter dedicated to frequently asked questions. Topics include defining cybersecurity, understanding cybersecurity as it applies to automotive cyber-physical systems, establishing a cybersecurity process for your company, and explaining assurances and certification.


Author(s):  
Shruti Sunil Ajankar ◽  
Aditi Rajesh Nimodiya

Cyber Security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. So basically it is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risks of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies. Whenever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on some of the techniques and perspectives on transforming the cyber security. Here we have discussed a new posture for cyber security in a networked world which explains how companies can use organizational structure and governance to enhance cyber security protections.


2021 ◽  
pp. 1279
Author(s):  
Cindy Cindy ◽  
Lydia Imelda Rachmat ◽  
Yahya Abdi Nugroho ◽  
Tatang Ruchimat

Information technology has important functions both now and in the future. Advances in technology make it easier for us to get information, but apart from having a good impact, technology can also have a bad impact, such as breaking the law. One example of a violation of the law on social media is cyber crime, which uses computers as a tool or target for criminal means (Widodo: 2011). The spread of fake news is an example of cyber crime that is quite rampant in Indonesia. no exception in the current pandemic, it also makes people afraid of information on social media and sometimes panics. The rise of this incident has made law enforcement in Indonesia run a cyber patrol system with the aim of monitoring the activities of spreading fake news (hoaxes), or the movement of terrorist networks, as well as other crimes related to social media. This is regulated in the ITE Law, Article 390 of the Criminal Code, Articles 14 and 15 of Law No.1 Year 1946 which is the legal basis for handling cyber crimes. The police are trying to overcome all the impacts of hoaxes and cybercrimes by establishing the Directorate of Cyber Crime. using research methods that focus on secondary data processing and data analysis is carried out qualitatively using deductive logic (Soekanto and Mamudji 2007). The results of this study are known that cyber crimes, especially hoax news, create panic in the community and solutions that can be done in overcoming these crimes that occurred. Teknologi informasi memiliki fungsi penting baik sekarang maupun di masa depan. Kemajuan teknologi mempermudah kita untuk mendapatkan informasi, namun selain berdampak baik teknologi juga bisa berdampak buruk, seperti pelanggaran hukum. Salah satu contoh pelanggaran hukum di media sosial adalah cyber crime, yang menggunakan komputer sebagai alat ataupun sasaran untuk sarana kejahatan (Widodo:2011).Penyebaran berita bohong merupakan salah satu contoh kejahatan siber yang cukup marak terjadi di Indonesia .Persentase penyebaran berita bohong sangatlah tinggi tidak terkecuali di masa pandemi seperti saat ini,juga membuat masyarakat menjadi ketakutan dengan informasi yang ada di media sosial dan  terkadang membuat menjadi panik.Maraknya kejadian ini membuat penegak hukum di indonesia menjalankan sistem patroli cyber dengan tujuan untuk memantau aktivitas penyebaran berita bohong (hoaks), atau pergerakan jaringan terorisme, serta kejahatan lainnya yang berkaitan dengan media sosial. Hal ini diatur dalam UU ITE, Pasal 390 KUHP, Pasal 14 dan 15 UU No.1 Thn.1946  yang menjadi landasan hukum terhadap penanganan kejahatan dunia maya. Kepolisian berupaya untuk menanggulangi semua dampak dari berita bohong (hoaks) maupun kejahatan dunia maya dengan membentuk Direktorat Tindak Pidana Siber.Artikel ini dibuat dengan tujuan agar masyarakat bisa lebih kritis terhadap setiap berita yang disebarkan di media sosial dan semakin bijak dalam menggunakannya .Dalam artikel ini menggunakan metode penelitian yang berfokus pada data sekunder pengolahan dan analisis data dilakukan secara kualitatif dengan menggunakan logika deduktif(Soekanto dan Mamudji(2007). Hasil dari penelitian ini diketahui bahwa kejahatan siber terutama berita hoaks membuat panik masyarakat dan penyelesaian yang dapat dilakukan dalam mengatasi kejahatan-kejahatan yang terjadi


2021 ◽  
pp. 1111
Author(s):  
Yuwono Prianto ◽  
Nabila Annisa Fuzain ◽  
Afif Farhan

Digital activity during the pandemic is increasing this is because people are asked to stay at home doing all activities online, this makes people vulnerable to becoming victims of cyber crime. Cybercrime itself is a cyber crime by using a computer or computer network as a tool, or as a target, as well as the location of the crime, the absence of space and time limits makes it easier for cyber criminals to carry out their actions in the cyber world. The author's purpose in conducting this analysis is to discuss what are the obstacles in handling cybercrime cases during the Covid-19 pandemic and how to enforce the law for cybercrime perpetrators. This article is the result of normative legal research that focuses on the use of secondary data. Cyber crimes need special attention from law enforcement, both national and international. The perpetrators of cybercrime have not been fully prosecuted due to the weakness of the cyber legislation system in Indonesia and the limited number of experts to handle this case. Cyber law has not been clearly spelled out in the regulations governing the technical implementation. The perpetrators of cyber crime come from various countries, limited human resources and infrastructure are the main obstacles. It requires a strong commitment from the leadership, law enforcement institutions to improve the quality and quantity of human resources as well as to prepare an adequate budget for the procurement of facilities and infrastructure as well as to establish cooperation with higher education to accelerate the handling of existing limitations. Aktivitas digital pada masa pandemi semakin meningkat hal ini disebabkan masyarakat diminta untuk tetap di rumah melakukan semua kegiatan dilakukan secara daring, hal ini membuat masyarakat rawan menjadi korban kejahatan cyber. Cybercrime sendiri adalah kejahatan dunia maya dengan menggunakan komputer atau jaringan komputer sebagai alat, atau sebagai sasaran, serta lokasi terjadinya kejahatan, tidak adanya batasan ruang dan waktu memudahkan penjahat cyber untuk melakukan aksinya di dunia cyber. Tujuan penulis melakukan analisis ini  adalah untuk membahas apa saja yang menjadi kendala dalam menangani kasus cybercrime di saat masa pandemi Covid-19 dan bagaimana penegakan hukum bagi para pelaku cybercrime. Artikel ini meruupakan hasil dari penilitian hukum normatif yang fokus pada penggunaan data sekunder. Kejahatan cyber  crime perlu mendapatkan perhatian khusus dari penegak hukum baik nasional maupun Internasional. Pelaku cybercrime belum seluruhnya dapat di proses hukum karena lemahnya sistem perundangan-undangan siber di Indonesia dan terbatasnya tenaga ahli yang dimilki untuk menangani kasus ini, Undang-Undang cyber belum dijabarkan dengan jelas didalam Peraturan yang mengatur mengenai teknis pelaksanaannya. Pelaku cyber crime berasal berbagai dari negara, terbatasnya SDM dan prsarana menjadi kendala utama. Diperlukan komitmen yang kuat dari pimpinan, Institusi penegak hukum untuk meningkatkan kualitas dan kuantitaf SDM serta penyiapan anggaran yang memadai untuk pengadaan sarana dan prasana serta menjalin kerjasama dengan pendidikan tinggi untuk mempercepat penanganan keterbatasan yang ada.


Author(s):  
Mrs. Jaishma Kumari B ◽  
Manisha ◽  
Ravish Acharya ◽  
R Yajnesh

Among the diverse forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnets are designed to perform predefined functions in an automated fashion, where these malicious activities range from online searching of data, moving files sharing channel information to DDoS attacks against critical targets, click fraud etc. Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today’s network intersect to inform the field of botnet technology and defense.


Author(s):  
Ch. Mary Pushpa ◽  
K.V.M Udaya Lakshmi ◽  
S. Hepsibha

This paper will discuss the topic of ethical hacking, which is also called penetration testing. It starts by briefing about the ethical hacking introduction and its key protocols. It will further discuss the varied classifications of hacking and explain the causes for the swift rise in the cyber-crimes and their impact on socio-economic growth. The advantages and limitations of ethical hacking are also listed. It will further discuss the steps involved in ethical hacking, who is allowed to conduct ethical hacking, and its importance in order to reduce the effect of these attacks, penetration tests are highly required, to consider an acceptable solution for this task. Results from the case study shows that there are negative impacts where the society suffers from cybercrimes and why the computer or networking tools are targeted for the crimes. Ethical hacking education can provide the future professionals to combat the future cyber security issues.


Security plays a crucial role in the field of Social media network. Securing the data become one among the largest challenges in the present scenario. Whenever we expect concerning the cyber security, the primary issue that involves our mind is ‘cyber crimes’ that are increasing vastly day by day. Embedding secret message into the image (Steganography) is associated with art and science of secure data communication wherever the key information or confidential information is hidden in host file. It's employed incompletely different helpful applications like secure electronic communication, health care and military. Confidential information’s are unremarkably keep in digital media and transmitted via network cause of rapid growth of internet. In this paper, steganography techniques which might be used to safeguard the information from intruders. Here, Steganographic technique is used to hide multiple secret images into a single 24-bit cover image using Least Significant Bit (LSB) and dual steganography method. Multiple secret images are scrambled and encoded before hiding into cover image using Arnold Transform and Block Code Encoding. The Proposed technique is Block Code Encoding to convert Secret message to binary and bit pairs to form safer information. The main goals of proposed work offers security and high limit based steganography plan of concealing a massive size secret image into a bit size cover image, to enhance security using dual steganography, image quality and to reduce error.


Sign in / Sign up

Export Citation Format

Share Document