Minimize Cyber Losses in Cyber World through the Optimization Technique

Print
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 20
Year of Publication: 2014
Authors:
Narander Kumar
Priyanka Chaudhary
10.5120/16910-6993

Narander Kumar and Priyanka Chaudhary. Article: Minimize Cyber Losses in Cyber World through the Optimization Technique. International Journal of Computer Applications 96(20):18-22, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Narander Kumar and Priyanka Chaudhary},
	title = {Article: Minimize Cyber Losses in Cyber World through the Optimization Technique},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {20},
	pages = {18-22},
	month = {June},
	note = {Full text available}
}

Abstract

In the modern era, internet plays crucial role in the human life. Now that time it is a backbone of human life. In Twenty-first century criminals increasingly rely on these technologies and these advance technologies are also increase day by day criminals and their criminals operations. These criminals can easily lift to Internet to carry out such type of traditional crime such as sex trafficking, illicit drug. In addition they also exploit the digital world which facilitate the crime that are often technology credit/debit card fraud intellectual property theft, identity theft, cyber bullying, identify sensitive data. So cyber crime is a very problem in our society by which there is no of information loosed. In this paper, we present an enumeration technique by which we can minimize losses through cyber crime in cyber world. In this technique we find an optimal solution. This is based on the primary data and personal (social) interaction.

References

  • Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, Hongmei Deng,," A survey of cyber crimes", In Security and Communication Networks, pp 422-437, John Wiley & Sons New York (2012).
  • Virginiah Sekgwathe, Mohammad Talib, "Cyber Crime Detection and Protection: Third World Still to Cope-Up", In Proceeding First International Conference, ICeND 2011, Dar-es-Salaam, Tanzania, pp 171-181, Springer Berlin Heidelberg (2011).
  • Rebecca LeFebvre, "The human element in cyber security: a study on student motivation to act", in proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD '12, pp 1-8, ACM New York (2012).
  • Amber Stabek Paul Watters, Robert Layton, "The Seven Scam Types: Mapping the Terrain of Cybercrime", In Proceedings of the 2010 Second Cybercrime and Trustworthy Computing Workshop, CTC '10, pp 41-51, IEEE Computer Society Washington, DC, USA (2010).
  • Aideen Keane, "Identity theft and privacy – consumer awareness in Ireland", In International Journal of Networking and Virtual Organizations, pp 620-633, Inderscience Publishers, Geneva, Switzerland (2009).
  • Baca,M. , Cosic, j. , Cosic, Z. , "Forensic analysis of social networks", In Proceedings of the ITI 2013 35th International Conference, pp 219-223, IEEE, Cavtat (2013)
  • Alison Ada, "Cyberstalking and Internet pornography: Gender and the gaze", In Ethics and Information Technology, pp 133-14, Kluwer Academic Publishers Hingham, MA, US (2002)
  • Vukelic, B. , Skaron,K. , "Cyber crime and violation of copyright", Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention ;pp 1127-1130, IEEE,Opatija (2013)
  • Ms. Arpana, Dr. Meenal Chauhan, "Preventing cyber crime: A Study regarding Awareness of Cyber Crime in Tricity", International Journal of Enterprise Computing and Business Systems, pp1-10, (2012).
  • John Akhilomen;" Data Mining Application for Cyber Credit-Card Fraud Detection System"; In Proceeding 13th Industrial Conference, ICDM 2013 New York, USA; pp 218-228; Springer Berlin Heidelberg (2013).
  • PWC, "Fighting Economic Crime in the Financial Services Sector", Survey, 2012.
  • Marsh and Chubb, Cyber Risk perceptions: An industry snapshot, Cyber Survey, June 2012.
  • Verizon, 2013 Data Breach Investigations Report, 2013
  • Ristenpart et al. in Proceedings of the 14th ACM conference on computer and communications security, pp 103–115, 2009; Pearson in CLOUD'09, pp 44–52, 2009; Vouk in J Comput Inf Technol 4:235–246, (2008).
  • J. R. Vic Winkler, "Securing the Cloud: Cloud Computer Security Techniques and Tactics", Securing the Cloud: Cloud Computer Security Techniques and Tactics, Syngress Publishing (2011).
  • Vlasti Broucek , Paul Turner, "Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud'—a forensic computing perspective", Journal of Computer Virology and Hacking Techniques, pp 27-33, Springer Paris (2013).
  • Ruan et al. in Adv Digital Forensics VII: 35–46, 2011; Reilly et al. in Int J Multimedia Image Process 1:26–34, 2013
  • Feily, M. , Shahrestani, A. ; Ramadass, S. ," A Survey of Botnet and Botnet Detection", Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on, pp-268-273, IEEE Athens, Glyfada (2009)
  • Ali Alkaabi, George Mohay, Adrian McCullagh," Dealing with the Problem of Cybercrime", Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates,pp 1-18, Springer Berlin Heidelberg