University of Bahrain
Scientific Journals

Cyber Crime- Techniques, Prevention and Cyber Insurance

Show simple item record

dc.contributor.author Shoukat, Saba
dc.contributor.author Bashir,Adil
dc.date.accessioned 2018-07-31T08:50:10Z
dc.date.available 2018-07-31T08:50:10Z
dc.date.issued 2018-01
dc.identifier.issn 2210-1519
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/1796
dc.description.abstract Rapid technological advancements are changing our day-to-day lives. Technology has improved the way people think, act and respond. Presently, with the growth of digital revolution, everyone is reliant on information technology. Banks are using information technology that is built by the most intelligent brains and at the same time there are folks who are equally intelligent with technical knowledge but use their intelligence negatively and end up in performing unethical tasks. The intention of such kind of folks is to harm people by their unethical activities. With digital revolution, these criminals need not to commit the crime physically; rather they can reach every corner of the world virtually using a computer, internet and communication medium. By deciphering encrypted information, they can rob anything using computers, be it money or credit card details of an individual or data. This paper presents different types of cybercrimes like cyber extortion, cyber stalking etc. It also highlights the various techniques that are used by criminals in order to launch attacks and breach security of an organization, thus committing cyber-crimes. Also, the counter measures against cyber-crimes are presented. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.rights Attribution-NonCommercial-ShareAlike 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc-sa/4.0/ *
dc.subject Cyber crime
dc.subject cyber insurance
dc.subject Malware
dc.subject Hacking
dc.subject Spyware
dc.title Cyber Crime- Techniques, Prevention and Cyber Insurance en_US
dc.type Article en_US
dc.identifier.doi http://dx.doi.org/10.12785/IJCNT/060103
dc.volume 06
dc.issue 01
dc.pagestart 23
dc.pageend 26
dc.source.title International Journal of Computing and Network Technology
dc.abbreviatedsourcetitle IJCNT


Files in this item

This item appears in the following Issue(s)

Show simple item record

Attribution-NonCommercial-ShareAlike 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial-ShareAlike 4.0 International

All Journals


Advanced Search

Browse

Administrator Account