Abstract
In the world of information management, data protection plays an significant position. Protecting knowledge has been one of today’s greatest problems. Once we hear of privacy protection, the first topic that comes to mind is “Internet crime,” that is rising exponentially each single day. Data protection, cyber security or information technology security are the defense of computer systems and networks from misuse or harm to their equipment, software or electronic records, as well as from interruption or mismanagement of the services they offer. Cyber security is a subset of computer security that deals with the Internet. The major security goal is to project the device using various rules and to set up various safeguards to protect it from online attacks. Cyber security is a practice that protects systems, networks and data breaches. These cyber attacks are typically targeted at obtaining, modifying or damaging private information; extorting users’ money; or interrupting regular businesses processes. Different governments and corporations are taking many steps to combat these cyber-crimes. To avoid online assaults and improve Internet security, a variety of approaches are employed. The execution of successful information protection policies is especially difficult today because there are more computers than people and criminals are getting increasingly creative. Despite response to numerous initiatives, information defense is also a big concern. This article mainly addresses topics pertaining to the security of information, particularly emerging technology. It reports on new approaches, policies and innovations in information security which change the profile of information security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jain N, Shrivastava V (2014) cyber crime changing everything—an empirical study
https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security
Lyne J, A sophos 04.12v1.dna, eight trends changing network security
Hussain WS, Ibrahim NJ (2019) A survey of cybercrimes, investigations and penal laws imposed on the criminals 8(1):131–143
Wall D, Cyber crimes and internet, crime and the internet, ISBN 0-203-164504, ISBN 0-203-164504, p 1
Chatterjee BB, Last of the Rainmacs? Thinking about pornography in cyber space, crime and the internet, ISBN 0-203-164504, p 74
Gainsbury S, Russell A, Hing N, Blaszczynski A (2013) The impact of internet gambling on gambling problems: a comparison of moderate-risk and problem internet and non-internet gamblers. Psychol Addict Behav?: J Soc Psychol Addict Behav 27:02
Singh G, Singh J (2013) Investigation tools for cybercrime. Int J Comput 4(3):141-154. ISSN 0974-2247
en.wikipedia.org/wiki/phishing
Nw3c, criminal use of social media (2013) nw3c
Symantec, what is social engineering? Symantec Corporation
Sauter M (2012) Nine major ways criminals use facebook. Fox business
Nw3c, cyberstalking (March 2015) nw3c
Saariluoma P, Sacha H (2014) How cyber breeds crime and criminals. In: The society of digital information and wireless communications (SDIWC)
Dadkhah MLM, Borchardt G (2018) Identity theft in the academic world leads to junk. Sci Eng Ethics 24(1):287–290
Irshad S, Soomro TR (2018) Identity theft and social media. Int J Comput Sci Network Secur 18(1):43–55
Abie H (2000) An overview of firewall technologies. Telektronikk 96(3):47–52. http://www.nr.no/~abie
Salam S, Maged D, Mahmoud D (2014) Malware Detection in cloud computing. Int J Adv Comput Sci Appl 5(4)
Soomro TR, Hussain M (2019) Social media-related cybercrimes and techniques for their prevention. Appl Comput Syst 24(1):9–17
Hedayati A (2012) An analysis of identity theft: motives, related frauds, techniques and prevention. J Law Conflict Resolution 4(1)
Tran PH, Tran KP, Huong T, Heuchenne C, Tran PH, Le H (2018) Real time data-driven approaches for credit card fraud detection
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kaur, M. (2022). Cyber Security Challenges in the Latest Technology. In: Bindhu, V., Tavares, J.M.R.S., Du, KL. (eds) Proceedings of Third International Conference on Communication, Computing and Electronics Systems . Lecture Notes in Electrical Engineering, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-16-8862-1_43
Download citation
DOI: https://doi.org/10.1007/978-981-16-8862-1_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8861-4
Online ISBN: 978-981-16-8862-1
eBook Packages: EngineeringEngineering (R0)