CFP last date
20 January 2025
Reseach Article

Cyber Security: Attacks, Implications and Legitimations across the Globe

by Samanjeet Kaur, Sukhwinder Sharma, Amanjot Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 6
Year of Publication: 2015
Authors: Samanjeet Kaur, Sukhwinder Sharma, Amanjot Singh
10.5120/19983-1932

Samanjeet Kaur, Sukhwinder Sharma, Amanjot Singh . Cyber Security: Attacks, Implications and Legitimations across the Globe. International Journal of Computer Applications. 114, 6 ( March 2015), 21-23. DOI=10.5120/19983-1932

@article{ 10.5120/19983-1932,
author = { Samanjeet Kaur, Sukhwinder Sharma, Amanjot Singh },
title = { Cyber Security: Attacks, Implications and Legitimations across the Globe },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 6 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number6/19983-1932/ },
doi = { 10.5120/19983-1932 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:00.237825+05:30
%A Samanjeet Kaur
%A Sukhwinder Sharma
%A Amanjot Singh
%T Cyber Security: Attacks, Implications and Legitimations across the Globe
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 6
%P 21-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper confers the importance of the cyber security and the economic deprivation caused by the flourishing cyber attacks. The review delves into growing exploitation of the computer which has given space to the present-day crimes. In extension to this the legislative framework has been taken up to provide the outline of the laws to curb cyber crime over the globe.

References
  1. Jamal Raiyn " A survey of the cyber attack detection strategies" International Journal of Security and Its Applications Vol. 8, No. 1 (2014).
  2. Er. Harpreet Singh Dalla, Ms. Geeta "Cyber Crime – A Threat to Persons, Property, Government and Societies" International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013.
  3. Introduction to cyber crime Available:"wsilfi. staff. gunadarma. ac. id/Downloads/files/. . . /W03Cyber+crime. pdf".
  4. DeticaReportAvailable:https://www. gov. uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report. pdf "the cost of the cyber crime".
  5. Mahmoud Khonji, Youssef Iraqi "Phishing Detection: A Literature Survey" IEEE COMMUNICATIONS SURVEYS & TUTORIALS, Vol. 15, No. 4, 2013.
  6. Vineet Kandpa , R. K. Singh "Latest face of cyber crime and its prevention in India" International Journal of Basic and Applied Sciences Vol. 2. No. 4. 2013
  7. Jose Nazario "Politically Motivated Denial of Service attacks".
  8. Manish Lunker "Cyber Laws: A Global Perspective" PRIVACY AND CYBER CRIME INSTITUTE report "International Comparison of Cyber Crime".
  9. Inotes Available:http://www. indiainsure. com/pdf/Inotes-Dec2014. pdf .
  10. M. S. Bhatia, Shruti Srivastava "Cyber Laws" DELHI PSYCHIATRY JOURNAL APRIL 2013.
  11. Report conducted by Ponemon Institute "2013 Cost of Cyber Crime Study: United States".
  12. Center for strategic and international studies report 2014 "Economic impact of cyber crime".
  13. A report for CPNI "Cyber-attacks: Effects on UK Companies July 2014".
  14. A Trend Micro Research Paper "Brazil Cyber security Challenges Faced by a Fast-GrowingMarket Economy".
  15. U. S. News&WorldReport,Available:http://www. usnews. com/news/business/articles/2015/01/15/france-cyberdefense-chief-19-000-cyberattacks-in-last-week.
  16. Vinit Kumar Gunjan ,Amit Kumar "A Survey of Cyber Crime in India" IEEE 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cybercrime Cyber law DOS WSN FEBRABAN.