Professional Documents
Culture Documents
net/publication/338385940
CITATION READS
1 4,511
3 authors:
Ravindu Miyuranga
General Sir John Kotelawala Defence University
2 PUBLICATIONS 1 CITATION
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
UPDATED FRAMEWORK FOR A SMART, SECURE AND CONVENIENT ONLINE BANKING IN SRI LANKA View project
All content following this page was uploaded by Nimesh Kasun Ekanayake on 04 January 2020.
1,2,3
Department of Information Technology, General Sir John Kotelawala Defence University, Sri Lanka
# Ekanayake EMNK; <nimesh.ekanayaka7@gmail.com>
Abstract— Cybercrime encircles the criminal acts that Implementing effective cybersecurity measures is
involve computers and networks. Thus, “Cybercrime” is a especially difficult nowadays as a result of there are a lot of
broad term that describes everything from electronic devices than individuals, and attackers are getting more
hacking to denial-of-service attacks that cause e-business innovative.
websites to lose cash. Cybercrimes are basically criminal
activities where computers, networks or electronic
information technology devices are the source, tool, target A. Treat Actors
In fact, there's a chance to spot different threat actors who
or place of crime. Cybercrimes are effected by way of
unlawful access into another database, unlawful may undermine the integrity of the protection status of your
interception, data interference, system interference, misuse device:
of devices, forgery and electronic scams. This paper tries
to provide a clear understanding of varieties of cybercrime 1) Cybercriminals: They attack systems and steal data for
and basic prevention techniques which will facilitate profit.
internal auditors to assess whether or not an organization
has adequate defenses against cybercrime. For households 2) Hackers: There are two types of hackers.
or people, understanding cybercrime guides us not to fall i. Professional hackers who work to benefit
prey to specific cybercrimes like identity theft and cyber corporations by improving security.
fraud. ii. Malicious hackers who are skilled criminals aiming
for financial gain by means of obtaining access to the
Keywords— Cybersecurity, Cybercrime, Cyberattack, bank account, personal passwords, faking antivirus,
Prevent Cyberattacks and blackmailing.
card company that makes you surprise, close the e-mail and [5] Norton, “11 ways to help protect yourself against cybercrime,”
type the bank or credit card company's address directly into Norton, 2018. [Online]. Available:
your web browser. Better yet, call the company and ask https://us.norton.com/internetsecurity-how-to-how-to-
them regarding the message. recognize-and-protect-yourself-from-cybercrime.html.
VIII. CONCLUSION
Though not all individuals are victims of cybercrimes,
they're still in danger. Crimes by computer vary, and that
they don’t always occur behind the computer, however they
executed by a computer. The hacker’s identity is ranged
between 12 to 67 years old. The hacker might live 3
continents faraway from its victim, and that they wouldn’t
even know they were being hacked. Crimes done behind
the computer are the 21st century’s downside. With the
technology increasing, criminals don’t ought to rob banks,
nor do they need to be outside in order to commit any crime.
Cybercriminals have everything they need at their
fingertips. Their weapons aren’t guns anymore; they attack
with mouse cursors and passwords.
REFERENCES
[1] Cisco, “What Is Cybersecurity?” [Online]. Available:
https://www.cisco.com/c/en/us/products/security/what-is-
cybersecurity.html.