UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1908D89


Registration ID:
320080

Page Number

1488-1498

Share This Article


Jetir RMS

Title

A STUDY OF CYBER SECURITY TOWARDS CYBER CRIME PREVENTION AND DETECTION TECHNIQUE

Abstract

Cybercrime is an ever-evolving phenomenon that is difficult to understand. Cyber criminals are growing more and more skilled, and they're now going after individuals as well as businesses and government agencies. As a result, additional defences are necessary. Since businesses began using computers to conduct business, cybercrime has grown in complexity and cost. The Parliament attack is one of several cybercrime case studies. Cybercrime and cyber security have been explored in this paper, along with various cybercrime prevention and detection strategies, such as Tripwires, Honey Pots and anomaly detection systems on the operating system. This research includes discusses legislation enacted to combat cybercrime, as well as suggestions for staying secure when surfing the web. Child pornography, stalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug selling, data leakage, phishing, and other cyber hacking are all examples of common cybercrimes. In most cases, these types of cybercrimes result in user privacy breaches, security breaches, corporate losses, financial fraud, or damage to public and government property. As a result, this study examines in-depth how to detect and prevent cybercrime. After examining the many sorts of cybercrime, it explains how they might compromise computer systems' privacy and security. Cybercriminals may use various tactics to perpetrate these crimes against persons, organisations, and society. After that, the study goes on the current methods for detecting and preventing cybercrime. It analyses the advantages and disadvantages of each technique objectively. According to the paper's recommendations, cybercrime detection models should be developed that are more effective than the current methodologies.

Key Words

Cyber Crime, Cyber Security, Honey pots, Trip wires, Anomaly detection, Case Study, Regulation Acts, Online safety tips

Cite This Article

"A STUDY OF CYBER SECURITY TOWARDS CYBER CRIME PREVENTION AND DETECTION TECHNIQUE", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.1488-1498, June-2019, Available :http://www.jetir.org/papers/JETIR1908D89.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A STUDY OF CYBER SECURITY TOWARDS CYBER CRIME PREVENTION AND DETECTION TECHNIQUE", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp1488-1498, June-2019, Available at : http://www.jetir.org/papers/JETIR1908D89.pdf

Publication Details

Published Paper ID: JETIR1908D89
Registration ID: 320080
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 1488-1498
Country: Gwalior, Madhya Pradesh, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000364

Print This Page

Current Call For Paper

Jetir RMS