Thanks to visit codestin.com
Credit goes to link.springer.com

Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 844))

  • 1630 Accesses

  • 4 Citations

Abstract

In the world of information management, data protection plays an significant position. Protecting knowledge has been one of today’s greatest problems. Once we hear of privacy protection, the first topic that comes to mind is “Internet crime,” that is rising exponentially each single day. Data protection, cyber security or information technology security are the defense of computer systems and networks from misuse or harm to their equipment, software or electronic records, as well as from interruption or mismanagement of the services they offer. Cyber security is a subset of computer security that deals with the Internet. The major security goal is to project the device using various rules and to set up various safeguards to protect it from online attacks. Cyber security is a practice that protects systems, networks and data breaches. These cyber attacks are typically targeted at obtaining, modifying or damaging private information; extorting users’ money; or interrupting regular businesses processes. Different governments and corporations are taking many steps to combat these cyber-crimes. To avoid online assaults and improve Internet security, a variety of approaches are employed. The execution of successful information protection policies is especially difficult today because there are more computers than people and criminals are getting increasingly creative. Despite response to numerous initiatives, information defense is also a big concern. This article mainly addresses topics pertaining to the security of information, particularly emerging technology. It reports on new approaches, policies and innovations in information security which change the profile of information security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from £29.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 199.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jain N, Shrivastava V (2014) cyber crime changing everything—an empirical study

    Google Scholar 

  2. https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security

  3. Lyne J, A sophos 04.12v1.dna, eight trends changing network security

    Google Scholar 

  4. www.britannica.com/ebchecked/topic/130595/cybercrime

  5. Hussain WS, Ibrahim NJ (2019) A survey of cybercrimes, investigations and penal laws imposed on the criminals 8(1):131–143

    Google Scholar 

  6. Wall D, Cyber crimes and internet, crime and the internet, ISBN 0-203-164504, ISBN 0-203-164504, p 1

    Google Scholar 

  7. Chatterjee BB, Last of the Rainmacs? Thinking about pornography in cyber space, crime and the internet, ISBN 0-203-164504, p 74

    Google Scholar 

  8. http://satheeshgnair.blogspot.in/2009/06/s elected-case-studies-on-cybercrime.html#email_spoofing_329149830155074

  9. Gainsbury S, Russell A, Hing N, Blaszczynski A (2013) The impact of internet gambling on gambling problems: a comparison of moderate-risk and problem internet and non-internet gamblers. Psychol Addict Behav?: J Soc Psychol Addict Behav 27:02

    Google Scholar 

  10. Singh G, Singh J (2013) Investigation tools for cybercrime. Int J Comput 4(3):141-154. ISSN 0974-2247

    Google Scholar 

  11. en.wikipedia.org/wiki/phishing

    Google Scholar 

  12. Nw3c, criminal use of social media (2013) nw3c

    Google Scholar 

  13. Symantec, what is social engineering? Symantec Corporation

    Google Scholar 

  14. Sauter M (2012) Nine major ways criminals use facebook. Fox business

    Google Scholar 

  15. Nw3c, cyberstalking (March 2015) nw3c

    Google Scholar 

  16. Saariluoma P, Sacha H (2014) How cyber breeds crime and criminals. In: The society of digital information and wireless communications (SDIWC)

    Google Scholar 

  17. Dadkhah MLM, Borchardt G (2018) Identity theft in the academic world leads to junk. Sci Eng Ethics 24(1):287–290

    Article  Google Scholar 

  18. Irshad S, Soomro TR (2018) Identity theft and social media. Int J Comput Sci Network Secur 18(1):43–55

    Google Scholar 

  19. Abie H (2000) An overview of firewall technologies. Telektronikk 96(3):47–52. http://www.nr.no/~abie

  20. Salam S, Maged D, Mahmoud D (2014) Malware Detection in cloud computing. Int J Adv Comput Sci Appl 5(4)

    Google Scholar 

  21. Soomro TR, Hussain M (2019) Social media-related cybercrimes and techniques for their prevention. Appl Comput Syst 24(1):9–17

    Article  Google Scholar 

  22. Hedayati A (2012) An analysis of identity theft: motives, related frauds, techniques and prevention. J Law Conflict Resolution 4(1)

    Google Scholar 

  23. Tran PH, Tran KP, Huong T, Heuchenne C, Tran PH, Le H (2018) Real time data-driven approaches for credit card fraud detection

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manjot Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, M. (2022). Cyber Security Challenges in the Latest Technology. In: Bindhu, V., Tavares, J.M.R.S., Du, KL. (eds) Proceedings of Third International Conference on Communication, Computing and Electronics Systems . Lecture Notes in Electrical Engineering, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-16-8862-1_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8862-1_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8861-4

  • Online ISBN: 978-981-16-8862-1

  • eBook Packages: EngineeringEngineering (R0)

Keywords

Publish with us

Policies and ethics