Up

A Review Paper on Cyber security and Accept it as a Challenge

 Hot
File Size:
1.30 MB
Volume:
Volume 3, Issue 8 (August, 2017)
Publication No:
IJTC201708013
Author:
Sanvir Singh, Ramandeep Sandhu, Pooja Sharma
Downloads:
25 x

Abstract:
In the modern world of computer and technology, cyber security must be required. No doubt about it that cyber security is an issue of worldwide concern today. What is cyber security and why need it? In simple words we can say that, cyber security is the protection of information and data from the cyber criminals, their intentions are not positive manner. Cyber security must be required for economic and security of any country. There are several attacks like steganography, spoofing, eavesdropping and viruses attacks etc. So these types of attacks are the biggest challenge against cyber security. The terms computer crime and cybercrime are more appropriately top secret to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as scam, theft, blackmail, forgery, and misappropriation, in which computers or networks are used. As the use of computers has full-fledged, computer crime has become more significant. Computer crime can broadly be defined as criminal activity connecting an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud. Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

KEYWORDS:
Cyber crimes, Cyber crime acts, Crime Attacks, cyber security, various applications.