You are on page 1of 4

“Cyber Crime and it’s Prevention”

Introduction:

Nowadays, many problems, security breaches and thefts are being done online such that
the user activity is mostly being disturbed. So, all those possible crimes taking place
through networks, websites, security breaches etc. are known as cybercrimes. Thus, these
attacks are irrespective of the state as the hacker can be from any place or state so it
should be known that cybercrimes and their resultant attacks are illegal.

So, attacks that are a result of cyber activity involve the use of cellular networks or to be
more specific an internet connection as these attacks are conducted online and a common
aspect for these attacks involves targeting the IP/ MAC address.

Types and Causes

As per the government rules and regulations these attacks are classified into three types
depending on the functionality.

 Targeting a Computer: The first type involves targeting a computer that is only
possible by gaining access to the network. So, in such type of an attack a computer
system is targeted such that plans are made for gaining access to that.
 Planning a D.O.S attack: being considerate about this type the services are made
unavailable to the proposed users. Consider the example of a service provider.
When the main server for such provider gets hacked then these are denied whereas
there is no involvement for the provider.
 Storage for Illegal Data: Many computers as well as hard-drives are used as part
of cyber-attacks for storing the data stolen from a corporate or a particular
organization. Without these third party devices, the attack cannot be possible
because there shall be no place for storage of data.

Being considerate about the causes for cyberattacks, these are multiple causes/agendas to
such attacks. Thus, the party making/planning to make an attack can be larger/smaller
attacks depending on the issue or the subject i.e. an organization/ smaller parties or
corporates. Some common reasons include jealousy among the corporates as well as
other certain rivalries. The nature for the attacks is common as there is always an
opportunity that is associated with such attacks.

Certain facts considering the modern markets reveal that there are many million/billion
dollar companies which are operating online serving as essential parts for the economy as
they contribute to the elevation of GDP. So, these are operating at all times through many
different places. These companies are not limited to a particular place as these are
operational 24/7. An internet connection is mandatory for the operation of such
companies irrespective of the platform i.e. mobile/laptop as both of them are applicable.
Therefore, many types of attacks take place within these companies. The subject can be
anything including browsers, web-traffic, pop-ups, add-ons, Trojans and other internal
factors leading to internal threats.

Literature Review

Being considerate about the researches made in the cyber security a lot has changed over
the past years with the increase in technology. In the beginning there used to be only
malware but this has majorly expanded with the passage of time such that technology has
diversified. These include cloud computing, social media and also some other relevant
applications. Moreover, the “trace-back” techniques are of major importance nowadays
because of the level of complexity with respect to such attacks.

With respect to cyber security, the threat is being identified through the use of “intrusion
detection system.” So, it won’t be wrong to say that the problems or threats should be
resolved considering the roots not the face value. It is because these are associated with
long/short term. With respect to the system it aims at resolution for that particular threat
such that it doesn’t damage the client or the corporate’s system. Most of the IPs are
anonymous for the systems through which the threats are actually planned. So, patterns
are identified in order to identify the real traffic such that how it is reaching the gateway
and also that if the flow for the traffic is regular or irregular. Changing traffic behaviors
increase the probability of such attacks. Moreover, the use of signature based detection
systems has evolved because the ways have modified through which the security
breaches used to occur. As per the activities of nowadays, the use of such methods is not
at all permitted. However, it has evolved and replaced by anomaly based systems as these
contain the required information w.r.t malwares considering the trend going on
nowadays. The aspect which makes the particular method unique is the aspect that there
is a time extension to some extent through which the traffic is identified for a much
longer period.

Prevention

Being considerate about the prevention, the protection of data is the most important step
with respect to a particular cyberattack. In that regard, cryptography is the most
important. The use of high tech military level encryption makes the method more unique.
So, it is a common approach that is used by the people nowadays. So, it has kept the
organizations safe over the past years due to which there has been an active threat
control.

Being considerate about this particular preventive measure, it is currently being utilized
by almost every company. So, it won’t be wrong to say that keeping data encrypted
through the use of cryptography has become mandatory for every organization due to the
on-going data threats.

At an average, almost seventy-five percent of the larger organizations utilize


cryptography for the purpose of data protection. So, it won’t be wrong to say that
advanced researches are going on within the encryption aspect. Modern works include
researches by USNIST “United States National Institute of Standards and Technology.”
Their research indicates an upgraded form for the setup such that these indicate the use of
AHS “Advanced Hash Standard” over SHA-I standard. Moreover, the AHS is more
efficient with respect to the older standard where impractical involvement for other
authorities takes place. So, with respect to this newly introduced practice, it won’t be
wrong to say that the control will be in hands of the organization itself and not these third
parties.

Conclusion

Throughout the report we have discussed about cybercrimes, their causes as well as their
possible remedies. The ratio for the associated attacks has increased with the passage of
time due to increased number of fraudulent activities with the passage of time. So,
possible remedies and on-going researches have been discussed throughout the report. It
is likely possible that these threats will decrease with the passage of time.

References

REFERENCES
JulianJang-Jaccard. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System
Sciences. Retrieved from https://www.sciencedirect.com/science/article/pii/S0022000014000178

Nagarajan, A. (2014). Trust enhanced distributed authorisation for web services. Journal of Computer and System
Sciences. Retrieved from https://www.sciencedirect.com/science/article/pii/S0022000014000142

Osuo-Genseleke, M. (2019). Cyber attacks: A literature Survey. Retrieved from


https://www.researchgate.net/publication/334284696_Cyber_attacks_A_literature_Survey

You might also like