0% found this document useful (0 votes)
34 views

Wa0000.

The document discusses cyber security, types of cybercrimes like phishing and account takeover, and techniques to prevent cybercrimes like using antivirus software and firewalls. A study was conducted through surveys in Chennai and Thiruvallur districts of India with 60 respondents between ages 18-35. The study found that most respondents were male, unmarried students with only half using antivirus software. It also found that informational theft through phishing is a major problem and threat.

Uploaded by

srk08072003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Wa0000.

The document discusses cyber security, types of cybercrimes like phishing and account takeover, and techniques to prevent cybercrimes like using antivirus software and firewalls. A study was conducted through surveys in Chennai and Thiruvallur districts of India with 60 respondents between ages 18-35. The study found that most respondents were male, unmarried students with only half using antivirus software. It also found that informational theft through phishing is a major problem and threat.

Uploaded by

srk08072003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Abstract:

In the current world that is run by technology and network connections, it is crucial to know what is
cyber security and to be able to use it effectively. Systems, important files, data, and other important
virtual things are at risk if there is no security to protect it.In this research various types & method of
fraud and techniques of preventing cyber crimes are discussed and from the responses some conclusions
are drawn.

Introduction :

Cyber security is generally the techniques set to protect the cyber environment of the user. This
environment includes the user themselves, the devices, networks, applications, all software’s etc. The
main objective is to reduce the risk including cyber attacks. Cyber security is the branch of computer
security related to internet. The main security objective is to project the device using various rules and
to establish various measures against attack over the internet. There are various methods that are used
to prevent online attacks and enhance internet security. With the rise of online activities, applications
the cyber-attacks are increasing day by day.

TYPES OR METHODS OF FRAUD:

1.Account Takeover :

It is a type of fraud where criminals attempt to gain access to a consumer’s funds by adding their
information to the account (for example, adding their name as a registered user to the account, changing
an email or physical address).
2.Pharming :

It re-directs website traffic to an illegal site where customers unknowingly enter their personal details.

3.Cyber Stalking :

It involves the use of electronic communications to harass or frighten someone, for example by sending
threatening emails or sms .

4.Vishing :

Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking
password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.

5.Identity Fraud :
The fraudulent acquisition and use of sensitive personal information, such as national identification
numbers (eg social security numbers), passports and driver’s licences. This information enables a
skilled thief to assume an individual’s identity and conduct numerous crimes.

6.Phising :

It is the attempt to obtain sensitive information such as credit card details, usernames, passwords etc.
often for the malicious reasons.

Phishing is typically carried out by the instant messaging or email spoofing and it often directs users to
enter personal details at a fake website. Phishing emails may contain links to website that are infected
with malware.

CYBER SECURITY TECHNIQUES :

1. Access control and password security :


The concept of user name and password has been fundamental way of protecting our
information. This may be one of the first measures regarding cyber security.
2. Authentication of data

The documents that we receive must always be authenticated be before downloading that is it
should be checked if it has originated from a trusted and a reliable source and that they are not
altered. Authenticating of these documents is usually done by the anti virus software present in the
devices. Thus a good anti virus software is also essential to protect the devices from viruses.

3. Malware scanners

This is software that usually scans all the files and documents present in the system for
malicious code or harmful viruses. Viruses, worms, and Trojan horses are examples of
malicious software that are often grouped together and referred to as malware.

4. Firewalls
A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and
worms that try to reach your computer over the internet. All messages entering or leaving the
internet pass through the firewall present, which examines each message and blocks those that do
not meet the specified security criteria. Hence firewalls play an important role in detecting the
malware.

5 .Anti-virus software

Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove
malicious software programs, such as viruses and worms. Most antivirus programs include an
auto-update feature that enables the program to download profiles of new viruses so that it can check
for the new viruses as soon as they are discovered. An anti virus software is a must and basic necessity
for everyone.

The case where it all begins:


The arrest of an East German spy in IBM’s German by West Germany’s police in 1968 was
acknowledged as the first case of cyber espionage (Warner, 2012, p. 784).

Review of literature :

#1) The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age
of Big Brother and Big Data.

Written By: Kevin Mitnick

Release Date: Feb 4, 2017

#2) Hacking: The Art of Exploitation

Written By: Jon Erickson

Release Date: Feb 4, 2008

#3) Practical Malware Analysis

Written By: Michael Sikorski and Andrew Honig

Release Date: Feb 1, 2012

#4) website

https://www.researchgate.net/publication/352477690_Research_Paper_on_Cyber_Security

Research Gap :

The above research paper clearly conclude that the cyber crimes relating to informational theft is the
major threat and cause more serious damage.

This research paper concentrates on people who are from the age group of 18 to 35 years and are
restricted to the jurisdiction of the Chennai and Thiruvallur districts only.

Table 1 - Socio-economic variables:

1.1 Age

Age No.of responses Percentage

Below 18 8 13.3

18-25 38 63.3

25-35 14 23.3

Above 35 0 0

Total 60 100

1.2 Marital status

Marital status No.of responses Percentage

Married 9 15

Unmarried 51 85

1.3 Gender
Gender No.of responses Percentage

Male 40 66.7

Female 20 33.3

1.4 Educational qualification

Educational qualification No.of responses Percentage

HSC 9 15

Ug 41 68.3

Pg 3 5

Others 7 11.7

1.5 Occupation

Occupation No.of responses Percentage

Students 44 73.3

Private sector 13 21.7

Government sector 1 1.7

Profession 1 1.7
Others 1 1.7

1.6 Annual income

Annual income No.of responses Percentage

1 lakh - 3 lakhs 23 60.5

3 lakhs-6lakhs 9 23.7

6 lakhs and above 6 15.8

2.Opinion Table :

2.1 Do you have anti-virus software installed on your computer?

Yes 31 51.7

No 20 33.3

Don't know 9 15

2.2 Do you think that now a days phising is becoming a major society problem ?

Yes 43 71.7

No 5 8.3
Don't know 12 20

2.3 What is the most serious damage caused due to lack of cyber security ?

Financial damage 13 21.7

Informational Damage 43 71.7

Others 4 6.7

2.4 Do you think that India is good in cyber security ?

Agree 12 20%

Neutral 33 55%

Not agree 15 25%

Findings or Results:

From the table 1.1,we find that 63% of the responses are from the people between the age group of 18-
25 and none frome the age group of 35& above have responded.

From the table 1.2, we find that 85% respondents were married and only 15% were unmarried.

From the table 1.3, we find that most of the responses are from male , almost 66% are from the male.

From the table 2.1 ,Half of the respondents have their computer installed with anti-virus software but
still remaining half have not installed the anti-virus software.

From the table 2.2, Phising (a type of informational theft), Almost 3/4 of the respondents know about
this type of cyber fraud which might be useful for themselves.

From the table 2.3,In the above table we saw a type of informational theft and in this table respondents
concludes that informational damage by cyber crimes are the most serious damage causing crimes.

From the table 2.4, It is important to note that only 20% have agreed that India is good in cyber security
and 80% have not agreed .

Limitations of the study:

The above research is done based on the responses of 60 people and that too from the districts ( Chennai
and Thiruvallur ).No response is received from the people who were between the age group of 35 and
above. Most of responses are from the UG graduates and students ,so the other categories are not
covered properly.

Conclusion:

Cyber security is one of the most important aspects of the fast-paced growing digital world. The threats
of it are hard to deny, so it is crucial to learn how to defend from them and teach others how to do it too.
If you want to learn more about what is cyber security and how to deal with cyber criminals hop into
our courses section and become a hero in the digital platforms.And from this above research I conclude
that informational thefts are most serious damage causing crime and Most of the people are aware of the
Phising ,A type of stealing informations from the peoples which evidently shows that comming
generation can keep themselves safe from cyber crimes .

You might also like