Skip to main content

Identifying Various Risks in Cyber-Security and Providing a Mind-Map of Network Security Issues to Mitigate Cyber-Crimes

  • Conference paper
  • First Online:
Proceedings of 2nd International Conference on Communication, Computing and Networking

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 46))

Abstract

The aim of this review is to acquaint the researcher with the knowledge of cyber-crime. Cyber-crimes are offenses that are carried out against individuals or groups of individuals using computers and networks to commit the crimes. These crimes are carried out intentionally to damage the reputation of a victim or harm the victim physically and psychologically; using modern internet-based communication like emails, chat rooms, notice boards, websites, cell phones, etc. This paper analyzes risk perception in students and precautionary behavior in their use of the internet. It also analyzes various fields that are affected by cyber-crimes that include cyber-bullying in adolescents, cyber-crime in government organizations, and Internet of Things (IoT) and provides an insight into mitigating these hazards. It also provides a mind-map of various network security issues that needs to be considered to avoid cyber-crime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://securityaffairs.co/wordpress/26537/cyber-crime/internet-of-things-risks.html. Last Accesses on 19 Nov 2017

  2. www.dhs.gov/homeland-security-careers/dhs-cyber-security,last. Accesses on 19 Nov 2017

  3. P. van Schaik et al., Risk perceptions of cyber-security and precautionary behavior. Elsevier J. Comput. Hum. Behav. 75, 547–559 (2017)

    Article  Google Scholar 

  4. V. Garg, L.J. Camp, End user perception of online risk under uncertainty, in Hawaii International Conference on System Sciences (Manoa, HI, 2012)

    Google Scholar 

  5. B. Holfelt, B.J. Leadbaeter, Concurrent and longitudinal associations between early adolescents’ experiences of school climate and cyber victimization. Elsevier J. Comput. Hum. Behav. 76, 321–328 (2017)

    Article  Google Scholar 

  6. M. Abomhara, G. Koien, Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. 4, 65–88 (2015) (River Publishers)

    Google Scholar 

  7. M. Abomhara, G. Koien, Security and privacy in the internet of things: current status and open issues, in The International Conference on Privacy and Security in Mobile Systems (PRISMS, Aalborg, Denmark, 2014)

    Google Scholar 

  8. S. Sagiroglu, D. Sinanc, Big data: a review, in IEEE International Conference on Collaboration Technologies and Systems (CTS) (2013), pp. 42–47

    Google Scholar 

  9. S. Kulkarni, S. Saha, R. Hockenbury, Preserving privacy in sensor-fog networks, in 9th IEEE International Conference on Internet Technology and Secured Transactions (ICITST) (2014), pp. 96–99

    Google Scholar 

  10. J. StolfoS, M.B. Salem, A.D. Keromytis, Fog computing: mitigating insider data theft attacks in the cloud, in IEEE Symposium On Security and Privacy Workshops (SPW) (2012), pp. 125–128

    Google Scholar 

  11. J. Kim, Solarwinds, Cyber-security in government: reducing the risk. Comput. Fraud Secur. 2017(7), 8–11 (2017)

    Article  Google Scholar 

  12. A. Saad, A.R. Amran et al., Privacy and security gaps in mitigating cyber-crime: the review, in International symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR), 23–24 Aug 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neelam Saleem Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khan, N.S., Chishti, M.A., Saleem, M. (2019). Identifying Various Risks in Cyber-Security and Providing a Mind-Map of Network Security Issues to Mitigate Cyber-Crimes. In: Krishna, C., Dutta, M., Kumar, R. (eds) Proceedings of 2nd International Conference on Communication, Computing and Networking. Lecture Notes in Networks and Systems, vol 46. Springer, Singapore. https://doi.org/10.1007/978-981-13-1217-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1217-5_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1216-8

  • Online ISBN: 978-981-13-1217-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics