Cyber Crimes: Threats and Protection

被引:4
|
作者
Mathew, Alex Roney [1 ]
Al Hajj, Aayad [1 ]
Al Ruqeishi, Khalil [1 ]
机构
[1] Coll Appl Sci, Dept Informat Technol, Nizwa Sultanate, Oman
关键词
social engineerin; phishing; e-mail spoofing; pharming; biometrics;
D O I
10.1109/ICNIT.2010.5508568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Technology has grown tremendously during the last two decades and became the main source of knowledge. The latest information and the current technology are available through the Internet making it the most valuable source of information to almost all people from the novice to the expert in all fields of knowledge. Yet with the usefulness and importance of the Internet, the misuse and the cyber crime become more evident. In this paper we try to explore some of these cyber crimes and the ways to protect from them. We discuss different types of cyber crime namely social engineering-phishing, email spoofing and pharming. We also discuss the ways to protect ourselves from such crimes with emphasis on biometrics.
引用
收藏
页码:16 / 18
页数:3
相关论文
共 50 条
  • [1] A LEGAL ANALYSIS OF EMERGING THREATS OF CYBER CRIMES IN INDIA
    Aggarwal, Abhishek
    Singh, Vibhanshu Shekhar
    Dixit, Anil Kumar
    Singh, Mayank
    Jha, Radhey Shyam
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (04) : 1186 - 1197
  • [2] Approach to APCS Protection from Cyber Threats
    Zegzhda, D. P.
    Stepanova, T. V.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 659 - 664
  • [3] Cyber Security: Terms, Laws, Threats and Protection
    Jha, Manasi
    Anand, C. S.
    Mahawar, Yogesh
    Kalyan, Uday
    Verma, Vikas
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 148 - 151
  • [4] "Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan
    Ashraf, Afaq
    Taha
    Bajwa, Nida Ul Habib
    Konig, Cornelius J.
    Javed, Mobin
    Mustafa, Maryam
    [J]. PROCEEDINGS OF THE NINETEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, SOUPS 2023, 2023, : 37 - 56
  • [5] Cyber security threats in industrial control systems and protection
    Marali, Mounesh
    Sudarsan, Sithu D.
    Gogioneni, Ashok
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATION ENGINEERING (ICACCE-2019), 2019,
  • [6] Privacy, Data Protection and Cyber Crimes: Mapping Perceptions of Pakistani Users
    Nabeel, Fahad
    Iqbal, Khuram
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2024,
  • [7] Improving Critical Infrastructure Protection and Resilience against Terrorism Cyber Threats
    Bologna, Sandro
    Lazari, Alessandro
    Mele, Stefano
    [J]. COMPREHENSIVE APPROACH AS SINE QUA NON FOR CRITICAL INFRASTRUCTURE PROTECTION, 2015, 39 : 79 - 90
  • [8] A survey of cyber crimes
    Zhang, Yanping
    Xiao, Yang
    Ghaboosi, Kaveh
    Zhang, Jingyuan
    Deng, Hongmei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (04) : 422 - 437
  • [9] Are threats always ''violent'' crimes?
    Feinstein, JD
    [J]. MICHIGAN LAW REVIEW, 1996, 94 (04) : 1067 - 1097
  • [10] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170