![]()
Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks
Kurian M.J1, Sreekanth D2
1Dr. Kurian M.J, Department of Computer Applications, Baselios Poulose II Catholicos College, Piravom, (Kerala), India.
2Dr. Sreekanth D, Head of Research and Solutions, ICT Academy of Kerala (Kerala), India.
Manuscript received on 29 January 2023 | Revised Manuscript received on 04 February 2023 | Manuscript Accepted on 15 February 2023 | Manuscript published on 28 February 2023 | PP: 25-32 | Volume-12 Issue-3, February 2023 | Retrieval Number: 100.1/ijitee.C94520212323 | DOI: 10.35940/ijitee.C9452.0212323
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The term “cyber” is closely related to or characteristic of the culture of computers, computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices that use standardised communication protocols. A total of 5.07 billion people worldwide use the internet today, equivalent to 63.5% of the world’s total population. Internet users continue to grow as well. As of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, with nearly 933 million Indians accessing the internet via any device. Cybercrime is a type of criminal activity that targets or utilises a computer, a computer network, or a networked device. The slogans used to address data privacy are: “Data privacy belongs to you.” Secure it, protect it, and block hackers. This paper highlights the issues related to categories and the impact of cybercrime, as well as fundamental cyber laws, security threats, and protection, serving as a warning to internet users.
Keywords: Adware, Cybercrime, Cyber bulling, Cyber spying, DDOS, DoS, Phishing, Ransomeware, Spyware
Scope of the Article: Computer Network
