Exploring Cyber Intelligence Alternatives for Countering Cyber Crime

被引:0
|
作者
Gayatri, P. Usha [1 ]
Neeraja, S. [2 ]
Poornima, Ch. Leela [3 ]
Sekharaiah, K. Chandra [4 ]
Yuvaraj, M. [5 ]
机构
[1] MVSREC, Hyderabad, Andhra Pradesh, India
[2] MCE, Hyderabad, Andhra Pradesh, India
[3] SRKVS Samiti, Hyderabad, Andhra Pradesh, India
[4] JNTUH, Sch IT, Hyderabad, Andhra Pradesh, India
[5] MEC, Hyderabad, Andhra Pradesh, India
关键词
Artificial Intelligence (AI); Information Technology (IT); Web Intelligence (WI); Collective Intelligence (CI); Information and Communication Technologies (ICTs);
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, a case study of cyber crime is presented in the context of JNTUHJAC website. CERT-In is identified as the organization relevant to handling this kind of cybercrime. This paper is an attempt to find and do away with the lacunae in the prevailing cyber laws and the I.T. Act 2000 and the related amendment act 2008 such that law takes cognizance of all kinds of cybercrimes perpetrated against individuals/societies/nations. It is found that ICANN is an organization to control the cyberspace by blocking the space wherein the content involves cognizable offence.
引用
收藏
页码:900 / 902
页数:3
相关论文
共 50 条
  • [1] Countering the cyber-crime threat
    Yang, DW
    Hoffstadt, BM
    [J]. AMERICAN CRIMINAL LAW REVIEW, 2006, 43 (02) : 201 - 215
  • [2] Countering cyber attacks
    Wagner, Cynthia G.
    [J]. FUTURIST, 2007, 41 (03) : 16 - 16
  • [3] Understanding and Countering Cyber Coercion
    Hodgson, Quentin E.
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON X): MAXIMISING EFFECTS, 2018, : 73 - 88
  • [4] Cyber Crime
    Mazurczyk, Wojciech
    Szczypiorski, Krzysztof
    Duric, Zoran
    Ye, Dengpan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2861 - 2863
  • [5] Cyber crime
    Ming, L
    Yue, M
    Shen, Y
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2003, 136 : 196 - 196
  • [6] COUNTERING TERRORISM WITH CYBER SECURITY
    Westby, Jody R.
    [J]. INTERNATIONAL SEMINARS ON NUCLEAR WAR AND PLANETARY EMERGENCIES - 36TH SESSION, 2007, : 279 - 294
  • [7] Identify Uncertainty of Cyber Crime and Cyber Laws
    Sahu, Bhanu
    Sahu, Neeraj
    Sahu, Swatantra Kumar
    Sahu, Priya
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 450 - 452
  • [8] Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime
    Broadhurst, Roderic
    Grabosky, Peter
    Alazab, Mamoun
    Chon, Steve
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2014, 8 (01): : 1 - 20
  • [9] Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity
    David, MW
    Sakurai, K
    [J]. AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 716 - 721
  • [10] Exploring Open Source Information for Cyber Threat Intelligence
    Adewopo, Victor
    Gonen, Bilal
    Adewopo, Festus
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2232 - 2241