We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Top Five Cyber Frauds

by Rajesh Kumar Goutam, Deepak Kumar Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 7
Year of Publication: 2015
Authors: Rajesh Kumar Goutam, Deepak Kumar Verma
10.5120/21080-3759

Rajesh Kumar Goutam, Deepak Kumar Verma . Top Five Cyber Frauds. International Journal of Computer Applications. 119, 7 ( June 2015), 23-25. DOI=10.5120/21080-3759

@article{ 10.5120/21080-3759,
author = { Rajesh Kumar Goutam, Deepak Kumar Verma },
title = { Top Five Cyber Frauds },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 7 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number7/21080-3759/ },
doi = { 10.5120/21080-3759 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:25.815849+05:30
%A Rajesh Kumar Goutam
%A Deepak Kumar Verma
%T Top Five Cyber Frauds
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 7
%P 23-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In last three decades the attacks against the personal information, social information and financial information become more frequent and sophisticated. Initially, the purpose of cyber attack was the entertainment but as scenario has changed, internet is now seen as wonderful tool to conduct fraud or to grasp the information about anyone else. The paper shows how internet is important for cyber criminals and why they use it as a secure medium to conduct fraud. The major five categories of cyber crimes have been explained with their landscape. We have also presented a brief idea about the cost of stolen items in terms of information in underground cyber black market and its impact on society.

References
  1. A report, Economic Impact of Trade Secret Theft: A framework for companies to safeguard trade secrets and mitigate potential threats, Centre for responsible enterprise and trade, February 2014.
  2. A Report available from Tommie Singleton, the top 5 cyber crimes, AICPA, October 2013.
  3. A Report on Corporate Account Takeover: Traditional Protection Strategies Not Enough; Multi-Dimensional, Preemptive Strategies Needed. 2011 available at http://achalert. com/uploads/Documents/WhitePaper. pdf.
  4. A Kristin Finklea, Identity Theft: Trends and Issues, CRS Report prepared for members and committees of congress, January 16, 2014.
  5. Booz, Allen and Hamilton, Cyber Theft of Corporate Intellectual Property: The Nature of the Threat, An Economist Intelligence Unit research, 2012.
  6. A Report the Cyber crime Black Market: Uncovered, Panda Security, 2010.
  7. Internet Security Treat Report (ISTR 20) From Symantec, Vol 20, April 2015.
  8. Cisco 2014 Annual Security Report available at http://www. cisco. com/web/offer/gist_ty2_asset/Cisco_2014_ASR. pdf.
  9. Howard F. Lipson. Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Carnegie Mellon Software Engineering Institute, Pittsburgh, November 2002
Index Terms

Computer Science
Information Sciences

Keywords

Cyber security Malware Cybercrime