Cyber Crimes: Threats and Protection

被引:4
|
作者
Mathew, Alex Roney [1 ]
Al Hajj, Aayad [1 ]
Al Ruqeishi, Khalil [1 ]
机构
[1] Coll Appl Sci, Dept Informat Technol, Nizwa Sultanate, Oman
关键词
social engineerin; phishing; e-mail spoofing; pharming; biometrics;
D O I
10.1109/ICNIT.2010.5508568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Technology has grown tremendously during the last two decades and became the main source of knowledge. The latest information and the current technology are available through the Internet making it the most valuable source of information to almost all people from the novice to the expert in all fields of knowledge. Yet with the usefulness and importance of the Internet, the misuse and the cyber crime become more evident. In this paper we try to explore some of these cyber crimes and the ways to protect from them. We discuss different types of cyber crime namely social engineering-phishing, email spoofing and pharming. We also discuss the ways to protect ourselves from such crimes with emphasis on biometrics.
引用
收藏
页码:16 / 18
页数:3
相关论文
共 50 条
  • [21] Establishing a Theory of Cyber Crimes
    Jaishankar, K.
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2007, 1 (02): : 7 - 9
  • [22] Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach
    Papadopoulos, Lazaros
    Demestichas, Konstantinos
    Munoz-Navarro, Eva
    Hernandez-Montesinos, Juan Jose
    Paul, Stephane
    Museux, Nicolas
    Koenig, Sandra
    Schauer, Stefan
    Alarcon, Alfonso Climente
    Llopis, Israel Perez
    Stelkens-Kobsch, Tim
    Hadjina, Tamara
    Levak, Jelena
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 44
  • [23] PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats
    Papadopoulos, Lazaros
    Karteris, Antonios
    Soudris, Dimitrios
    Munoz-Navarro, Eva
    Hernandez-Montesinos, Juan Jose
    Paul, Stephane
    Museux, Nicolas
    Koenig, Sandra
    Egger, Manuel
    Schauer, Stefan
    Hingant Gomez, Javier
    Hadjina, Tamara
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [24] Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics
    Glisson, William Bradley
    Choo, Kim-Kwang Raymond
    [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 5574 - 5575
  • [25] Aviation cyber security: legal aspects of cyber threats
    Klenka, Michal
    [J]. JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 177 - 195
  • [26] On the Top Threats to Cyber Systems
    Kettani, Houssain
    Wainwright, Polly
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 175 - 179
  • [27] National Perceptions of Cyber Threats
    Lewis, James A.
    [J]. STRATEGIC ANALYSIS, 2014, 38 (04) : 566 - 576
  • [28] Aviation and Cyber security threats
    Lehto, Martti
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [29] Cyber Threats and Nuclear Weapons
    Griffith, Melissa K.
    [J]. SURVIVAL, 2022, 64 (05) : 177 - 180
  • [30] Cyber wars and other threats
    Hinde, S
    [J]. COMPUTERS & SECURITY, 1998, 17 (02) : 115 - 118