A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies (original) (raw)
Related papers
MALWARE THREATS AND MITIGATION STRATEGIES: A SURVEY
Malicious software is one of the major threats faced by the internet today. Basically the program is designed to disrupt the operation, collect information which can be used for unauthorized access and other targeted behavior. Malwares from their early designs which were just for propagation have now developed into more advanced form, stealing sensitive and private information. Apart from these their can even be some targeted worms to victimize an organization and even identity theft. In this paper, we are addressing different trends and techniques used for developing malware and a survey on how these can be handled in an efficient manner. Finally we discuss trends in malware designs and latest attack models and also the latest mitigation strategies.
2020
Security issues are ever-evolving in today’s scenario due to the heterogeneous nature of software applications, multimedia features, multilingual interactive and responsible features, and rapid rise in third-party software products. The main objective of this chapter is to focus on the difficulties and components that the users have to contend with on the internet. This chapter investigates and manages ongoing malware attacks. It also explains the significance of the research, malware investigation, social engineering, and user awareness in the field of malware attacks. Cyber-attacks are the most common problem in recent years, and the increasing number of malware is becoming a challenging task for security experts. This chapter underlines key issues along with various aspects for experts to discuss and focus on reducing the threats posed by malware and planning the strategy for prevention in the future. The chapter provides an effective future direction for researchers to produce i...
Analysis of Malware Attack and Strategies for Curbing The Threat
Malicious Software otherwise known as Malware is software used or developed by attackers with the intent of disrupting computer operations. It can also be used to gather sensitive information, or to gain access to private computer systems. Today, devastating effects of Malware are not limited to individuals, but also governments, industries and financial institutions. It is very easy to send Malware to targets even at a very remote distance. Most of the users and other beneficiaries of the computer and Information Technology facilities are oblivious of the fact that there are Malware that often bypass their traditional security protection techniques and reside on their computer systems undetected. Users of computer systems face evolving challenges that they are not prepared to deal with. It is very pertinent that these challenges must be attended to with the application of the proper and adequate strategies and technologies. This paper is not only intended to assist stakeholders by creating awareness and bringing to fore the risks involved and other nasty activities associated with Malware in our day-today operations with the computer systems, it is also an attempt to bring to the understanding of all, especially security units of organizations and other interested parties, the effective methods and necessary steps to take in order to curb the menace.
Security Measures Against Malware, Botnets & Ransomware
Advances in Multidisciplinary and scientific Research Journal Publication
Phone: +233574346850 The COVID-19 pandemic has witnessed a huge surge in the number of malware and ransomware attacks. Different institutions such as healthcare, financial, and government have been targeted. There can be numerous reasons for such a sudden rise in attacks, but it appears working remotely in home-based environments (which is less secure compared to traditional institutional networks) could be one of the reasons. Cybercriminals are constantly exploring different approaches like social engineering attacks, such as phishing attacks, to spread ransomware. Hence, in this paper, I explored recent advances in ransomware prevention and detection and highlighted future research challenges and directions. Keywords: Ransomware, Cybersecurity, Antivirus, Malware, Ransomware prevention, COVID-19, Ransomware detection BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Joseph Antwi Attoh (2022): Security Measures Against Mal...
Computer Viruses: The Threat Today and The Expected Future
Språk Language Rapporttyp Report category ISBN Svenska/Swedish X Engelska/English Licentiatavhandling X Examensarbete ISRN LITH-ISY-EX-3452-2003 C-uppsats D-uppsats Serietitel och serienummer Title of series, numbering ISSN Övrig rapport ____ URL för elektronisk version Abstract This Master's Thesis within the area computer security concerns "Computer viruses: The threat today and the expected future". Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today's influencing factors for near future computer virus epidemics are explained, then it further predicts new possible types of computer viruses in the near future; Furthermore, currently available anti-virus technologies are analyzed concerning both advantages and disadvantages; Finally, new promising trends in computer virus defence are explored in details.
Emerging Threats in Cyber Security
International Journal of Technical Research & Science
The growth of the Internet in the connections has led to a significant growth of cyber attack cases often with heavy outcome towards the globe. Malware is the primary choice of weapon to carry out malicious intent in the cyberspace, either by exploitation in to existing vulnerabilities or utilization of unique characteristics of emerging techniques. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cyber security community. To assist in achieving this goal, we first present an over view of the most exploited vulnerabilities in existing hardware, software, and network layers.
Proposals to Win the Battle Against Cyber Crime
Handbook of Research on Threat Detection and Countermeasures in Network Security, 2015
Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.
Review of Computer Malware: Detection and Preventive Strategies
International Journal of Computer Science and Information Security (IJCSIS), Vol. 19, No. 11, November 2021, 2021
Malware is a malevolent code, program, or software. It refers to a program that is introduced into a system, often in a hidden (covert) manner, with the aim of compromising the secrecy, probity, or accessibility of the victim's information, data, applications, software, or operating system(OS) or as well as hinder the proper function of the victim's system as well as hinder good user experience. They are usually created to carry out various delictuous and crimeful functions in such a way that their existence is of total negligence, at a minimum initially when they were introduced into the victim's system. Malware infestations and inhibition before year 2000 centered on system attack, denial of service, and so on. However, beyond year 2000 till date, individuals, corporate bodies, and government of nations have been involved with malicious code design and propagation for distributed network breakdown, as well as, cyberwars. Shared ignorance about the nature of malware's development and propagation has resulted in colossal loss for both individuals and corporate organizations. With new malwares emerging daily to join the thousands in existence, it is evident that the virus issue will not go away any time soon. This paper details the history of malwares and their categories, obfuscation techniques, identification and recommendations for preventing malware incidents to all computer users.
Emerging Challenges of Cybercrimes to Cyber Security
2011
Cyber space is flexible and undergoes change often at a rapid pace. A computer’s increasing sophistication, in terms of power, capacity and communication speed have offered multifarious opportunities to realize fully the benefits that networked technology promises the world, these systems must function reliably and securely. People must have confidence that data will travel to its destination and its integrity remains intact. Assuring the free flow of information, the security and privacy of data and the integrity of the interconnected networks themselves are all essential to global economic prosperity and security. Almost a third of the world’s population uses Internet and countless more are indirectly using it in their daily lives. There are more than four billion digital wireless devices in the world today. Scarcely a half-century ago, that number was zero. Enormous dynamics of cyberspace increases the criminal opportunity for motivated offenders as well as the availability of su...
For as long as Internet exists, jurists and lawyers have tried to convince the public and sometimes we should add also themselves that Internet is not an outlaw region, a new far west whereas the civilization’s rules cease to apply. However, now more than ever it has become obvious that every internet user is susceptible to become the victim of various forms of attacks from unknown sources, most of the time with unknown means and with any trace to the criminal. While the terms virus, hacking and even cracking have become very familiar to the public, the new evolution of the cybercriminality’s activity are for now much less known: what are exactly the romance scam, the scareware and ransomware? And what does it tell us about the actual mutations of the cybercriminal profile? This is the topic of this paper.