Cyber Attacks and Security—A Critical Survey

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1154))

  • 990 Accesses

Abstract

We know that all live in the era of the internet where most of everyday task is done over the internet from online transaction to net banking. Since web is a global stage that connects people around the world everyone can access the resources provided by the internet from anywhere. This Internet is sometimes used by few people for criminal purposes like invading person’s privacy, scams, cyberbullying, etc. These acts are termed as cybercrime. This paper provides a survey of these cybercrimes which are performed using various attacking mechanisms in India.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Deepa, T.: Survey on need for cyber security in India (2014)

    Google Scholar 

  2. Dwivedi, D.: Technological challenges to human security in the age of information and cyber wars. Int. J. Basic Appl. Res. 8, 40–48 (2018)

    Google Scholar 

  3. Defort, M.: Human security in the digital age: a relocation of power and control over security from state to non-state actors. Small Wars J. (2015)

    Google Scholar 

  4. The 12 types of cyber crime. https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html. Last accessed 21 Nov 2016

  5. Rouse, M.: Trojan Horse (computing). https://searchsecurity.techtarget.com/definition/Trojan-horse. Last accessed 29 May 2019

  6. O’Hanley, R., Tiller, J.S.: Information Security Management Handbook. Auerbach Publications (2013)

    Google Scholar 

  7. Cyber Crimes in India—What is, Types, Web Hijacking, Cyber Stalking. http://www.helplinelaw.com/employment-criminal-and-labour/CCII/cyber-crimes-in-india-what-is-types-web-hijacking-cyber-stalking.html. Last accessed 17 Feb 2019

  8. Rouse, M.: Email virus. https://searchsecurity.techtarget.com/definition/email-virus. Last accessed 29 May 2019

  9. Sebastian, Z.: Security 1:1—Part 3—Various types of network attacks. https://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks. Last accessed 06 June 2019

  10. Email bomb. https://en.wikipedia.org/wiki/Email_bomb. Last accessed 24 June 2019

  11. Rajendra, A.B., Rajkumar, N., Prafulla, Naveenkumar, M.R.: Accessibility evaluation of private and public websites in India. In: Pant, M., et al. (eds.): Soft Computing: Theories and Applications, vol. 1053. Advances in Intelligent System and Computing (2018)

    Google Scholar 

  12. Important Cyber Law Case Studies. https://www.cyberralegalservices.com/detail-casestudies.php. Last accessed 21 Mar 2019

  13. Zhang, Y., Chen, B., Lu, X.: Intelligent monitoring system on refrigerator trucks based on the internet of things. In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (2012)

    Google Scholar 

  14. Kaushik, T.: Bengaluru is India’s cybercrime capital. https://economictimes.indiatimes.com/tech/internet/whatsapp-can-trace-message-origin-says-iit-m-professor/articleshow/70580443.cms. Last accessed 13 Apr 2019

  15. Michael, G.: The new media and the rise of exhortatory terrorism. Strateg. Stud. Q. 40–68 (2013)

    Google Scholar 

  16. Morgan, S.: Cybercrime damages $6 trillion by 2021. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/. Last accessed 18 May 2019

  17. Rubin, A.D., Geer, D., Ranum, M.J.: Web Security Sourcebook. Wiley (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nithin Kashyap .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kashyap, N., Malali, H.R.K., Gururaj, H.L. (2020). Cyber Attacks and Security—A Critical Survey. In: Pant, M., Kumar Sharma, T., Arya, R., Sahana, B., Zolfagharinia, H. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1154. Springer, Singapore. https://doi.org/10.1007/978-981-15-4032-5_80

Download citation

Publish with us

Policies and ethics

Navigation