Reference Hub1
Cyber Crime and Cyber Security: A Quick Glance

Cyber Crime and Cyber Security: A Quick Glance

Aruna Devi
Copyright: © 2017 |Pages: 12
ISBN13: 9781522521549|ISBN10: 1522521542|EISBN13: 9781522521556
DOI: 10.4018/978-1-5225-2154-9.ch011
Cite Chapter Cite Chapter

MLA

Devi, Aruna. "Cyber Crime and Cyber Security: A Quick Glance." Detecting and Mitigating Robotic Cyber Security Risks, edited by Raghavendra Kumar, et al., IGI Global, 2017, pp. 160-171. https://doi.org/10.4018/978-1-5225-2154-9.ch011

APA

Devi, A. (2017). Cyber Crime and Cyber Security: A Quick Glance. In R. Kumar, P. Pattnaik, & P. Pandey (Eds.), Detecting and Mitigating Robotic Cyber Security Risks (pp. 160-171). IGI Global. https://doi.org/10.4018/978-1-5225-2154-9.ch011

Chicago

Devi, Aruna. "Cyber Crime and Cyber Security: A Quick Glance." In Detecting and Mitigating Robotic Cyber Security Risks, edited by Raghavendra Kumar, Prasant Kumar Pattnaik, and Priyanka Pandey, 160-171. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2154-9.ch011

Export Reference

Mendeley
Favorite

Abstract

Cybercrime is a multifaceted and forever changing phenomenon. It is found that Cyber criminals who are becoming more classy and stylish are making consumers of both private and public organizations their prey. To prevent attacks additional layers of defense are required. It has been observed that Cyber crime has increased in density and complexity and financial costs ever since organizations have adopted the use of computers in carrying out their business processes. An example of the case studies carried out on cyber crimes is the Parliament attack case. The main points discussed in this chapter are Cyber crime and cyber security, the unusual cyber crimes that we come across. Various prevention techniques and detection techniques like Tripwires, Honey Pots, anomaly detection system, configuration checking tools and operating system commands, various acts that have been imposed against Cyber crime and online safety tips are also discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.