Abstract
The aim of this review is to acquaint the researcher with the knowledge of cyber-crime. Cyber-crimes are offenses that are carried out against individuals or groups of individuals using computers and networks to commit the crimes. These crimes are carried out intentionally to damage the reputation of a victim or harm the victim physically and psychologically; using modern internet-based communication like emails, chat rooms, notice boards, websites, cell phones, etc. This paper analyzes risk perception in students and precautionary behavior in their use of the internet. It also analyzes various fields that are affected by cyber-crimes that include cyber-bullying in adolescents, cyber-crime in government organizations, and Internet of Things (IoT) and provides an insight into mitigating these hazards. It also provides a mind-map of various network security issues that needs to be considered to avoid cyber-crime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
http://securityaffairs.co/wordpress/26537/cyber-crime/internet-of-things-risks.html. Last Accesses on 19 Nov 2017
www.dhs.gov/homeland-security-careers/dhs-cyber-security,last. Accesses on 19 Nov 2017
P. van Schaik et al., Risk perceptions of cyber-security and precautionary behavior. Elsevier J. Comput. Hum. Behav. 75, 547–559 (2017)
V. Garg, L.J. Camp, End user perception of online risk under uncertainty, in Hawaii International Conference on System Sciences (Manoa, HI, 2012)
B. Holfelt, B.J. Leadbaeter, Concurrent and longitudinal associations between early adolescents’ experiences of school climate and cyber victimization. Elsevier J. Comput. Hum. Behav. 76, 321–328 (2017)
M. Abomhara, G. Koien, Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. 4, 65–88 (2015) (River Publishers)
M. Abomhara, G. Koien, Security and privacy in the internet of things: current status and open issues, in The International Conference on Privacy and Security in Mobile Systems (PRISMS, Aalborg, Denmark, 2014)
S. Sagiroglu, D. Sinanc, Big data: a review, in IEEE International Conference on Collaboration Technologies and Systems (CTS) (2013), pp. 42–47
S. Kulkarni, S. Saha, R. Hockenbury, Preserving privacy in sensor-fog networks, in 9th IEEE International Conference on Internet Technology and Secured Transactions (ICITST) (2014), pp. 96–99
J. StolfoS, M.B. Salem, A.D. Keromytis, Fog computing: mitigating insider data theft attacks in the cloud, in IEEE Symposium On Security and Privacy Workshops (SPW) (2012), pp. 125–128
J. Kim, Solarwinds, Cyber-security in government: reducing the risk. Comput. Fraud Secur. 2017(7), 8–11 (2017)
A. Saad, A.R. Amran et al., Privacy and security gaps in mitigating cyber-crime: the review, in International symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR), 23–24 Aug 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khan, N.S., Chishti, M.A., Saleem, M. (2019). Identifying Various Risks in Cyber-Security and Providing a Mind-Map of Network Security Issues to Mitigate Cyber-Crimes. In: Krishna, C., Dutta, M., Kumar, R. (eds) Proceedings of 2nd International Conference on Communication, Computing and Networking. Lecture Notes in Networks and Systems, vol 46. Springer, Singapore. https://doi.org/10.1007/978-981-13-1217-5_10
Download citation
DOI: https://doi.org/10.1007/978-981-13-1217-5_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1216-8
Online ISBN: 978-981-13-1217-5
eBook Packages: EngineeringEngineering (R0)