Abstract
We know that all live in the era of the internet where most of everyday task is done over the internet from online transaction to net banking. Since web is a global stage that connects people around the world everyone can access the resources provided by the internet from anywhere. This Internet is sometimes used by few people for criminal purposes like invading person’s privacy, scams, cyberbullying, etc. These acts are termed as cybercrime. This paper provides a survey of these cybercrimes which are performed using various attacking mechanisms in India.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Deepa, T.: Survey on need for cyber security in India (2014)
Dwivedi, D.: Technological challenges to human security in the age of information and cyber wars. Int. J. Basic Appl. Res. 8, 40–48 (2018)
Defort, M.: Human security in the digital age: a relocation of power and control over security from state to non-state actors. Small Wars J. (2015)
The 12 types of cyber crime. https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html. Last accessed 21 Nov 2016
Rouse, M.: Trojan Horse (computing). https://searchsecurity.techtarget.com/definition/Trojan-horse. Last accessed 29 May 2019
O’Hanley, R., Tiller, J.S.: Information Security Management Handbook. Auerbach Publications (2013)
Cyber Crimes in India—What is, Types, Web Hijacking, Cyber Stalking. http://www.helplinelaw.com/employment-criminal-and-labour/CCII/cyber-crimes-in-india-what-is-types-web-hijacking-cyber-stalking.html. Last accessed 17 Feb 2019
Rouse, M.: Email virus. https://searchsecurity.techtarget.com/definition/email-virus. Last accessed 29 May 2019
Sebastian, Z.: Security 1:1—Part 3—Various types of network attacks. https://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks. Last accessed 06 June 2019
Email bomb. https://en.wikipedia.org/wiki/Email_bomb. Last accessed 24 June 2019
Rajendra, A.B., Rajkumar, N., Prafulla, Naveenkumar, M.R.: Accessibility evaluation of private and public websites in India. In: Pant, M., et al. (eds.): Soft Computing: Theories and Applications, vol. 1053. Advances in Intelligent System and Computing (2018)
Important Cyber Law Case Studies. https://www.cyberralegalservices.com/detail-casestudies.php. Last accessed 21 Mar 2019
Zhang, Y., Chen, B., Lu, X.: Intelligent monitoring system on refrigerator trucks based on the internet of things. In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (2012)
Kaushik, T.: Bengaluru is India’s cybercrime capital. https://economictimes.indiatimes.com/tech/internet/whatsapp-can-trace-message-origin-says-iit-m-professor/articleshow/70580443.cms. Last accessed 13 Apr 2019
Michael, G.: The new media and the rise of exhortatory terrorism. Strateg. Stud. Q. 40–68 (2013)
Morgan, S.: Cybercrime damages $6 trillion by 2021. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/. Last accessed 18 May 2019
Rubin, A.D., Geer, D., Ranum, M.J.: Web Security Sourcebook. Wiley (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kashyap, N., Malali, H.R.K., Gururaj, H.L. (2020). Cyber Attacks and Security—A Critical Survey. In: Pant, M., Kumar Sharma, T., Arya, R., Sahana, B., Zolfagharinia, H. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1154. Springer, Singapore. https://doi.org/10.1007/978-981-15-4032-5_80
Download citation
DOI: https://doi.org/10.1007/978-981-15-4032-5_80
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4031-8
Online ISBN: 978-981-15-4032-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)