Thwart and Safeguard of Cyber Crime & Cyber Attack in Computer Networks
Kurian M.J1, Sreekanth D2

1Dr. Kurian M.J, Department of Computer Applications, Baselios Poulose II Catholicos College, Piravom, (Kerala), India.
2Dr. Sreekanth D, Head of Research and Solutions, ICT Academy of Kerala (Kerala), India.
Manuscript received on 29 January 2023 | Revised Manuscript received on 04 February 2023 | Manuscript Accepted on 15 February 2023 | Manuscript published on 28 February 2023 | PP: 25-32 | Volume-12 Issue-3, February 2023 | Retrieval Number: 100.1/ijitee.C94520212323 | DOI: 10.35940/ijitee.C9452.0212323

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Cyber is the term closely relating to or characteristic of the culture of computers or computer networks, information technology, and virtual reality. The Internet is a global network of billions of computers and other electronic devices using standardized communication rules or protocols. A total of 5.07 billion people around the world use the internet today – equivalent to 63.5 percent of the world’s total population. Internet users continue to grow too, as of 2022, China had over one billion internet users, more than any other country in the world. India ranked second, as close to 933 million Indians accessed the internet via any device. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. The slogans used to address data privacy are: “Data privacy belongs to you.” Lock it down, protect it, and block hackers. This paper reveals the issues related to categories & impact of cyber crime, basic cyber laws, security threats and protection which are a warning alarm to internet users.
Keywords: Adware, Cybercrime, Cyber bulling, Cyber spying, DDOS, DoS, Phishing, Ransomeware, Spyware
Scope of the Article: Computer Network