Cyber Crime and Security- Challenges and Security Mechanisms

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-36 Number-7
Year of Publication : 2016
Authors : Niral Shah, Naveen Vaswani
DOI :  10.14445/22315381/IJETT-V36P267


Niral Shah, Naveen Vaswani"Cyber Crime and Security- Challenges and Security Mechanisms", International Journal of Engineering Trends and Technology (IJETT), V36(7),367-371 June 2016. ISSN:2231-5381. published by seventh sense research group

Man has reached a long way since inception and during the course of time he has managed to develop and invent technology for his own benefits. One can’t deny the fact that the computer by far is one of the finest creations of the humans. It has become an indispensable part of our life and it has become a very important tool in this information era. Computers with internet connections have enabled the man to perform any job or activity with just one click. Ordering food, online shopping, performing bank transactions, getting any kind of information at any time and at any given place has become very easy, thanks to the internet. So this proves that undoubtedly computers and internet are omnipresent and are linked directly or indirectly in almost every activity we do. Everything has its equal share of pros and cons. And computers and internet networks are no such exception. The internet has been used by many miscreants for all the wrong purposes. The issue of cyber crime has risen considerably in the last decade or so. Many people have fallen prey to the cyber crime. This problem has been in the market since long and since its arrival, methods and strategies are constantly invented on how to tackle the cyber crime. Many security mechanisms have also been developed to avert the cyber crime. This presentation will concentrate on the challenges faced to tackle cyber crime and also briefly discuss about the security mechanisms employed for the same.


[1] Zhang, Linfeng, “Effective techniques for detecting and attributing cyber criminals”, (2008). Graduate Theses and Dissertations Paper 11953.
[2] Internet World Stats. [Online]. Available:
[3] Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. ISBN 978 160960-830-9
[4] ISACA. [Online]. Available: _Eng_0415.pdf
[5] R. Richardson, 2008 CSI “computer crime & security survey," 2008. [Online]. Available: survey.jhtml
[6] Britz, Marjie T. , “Computer Forensics and Cyber Crime, An Introduction”, Pearson.
[7] Dr. Mike McGuire and Samantha Dowling, “Cyber Crime: A review of the evidence”, (2013), Home Office Research Report.
[8] Norton by Symantec [Online]. Available:
[9] Mohit M.Patel , Shailendra K.Mishra. "Design and Development of Efficient Algorithm in Web Usage Mining For Web Personalization". International Journal of Engineering Trends and Technology (IJETT). V4(4):1101-1104 Apr 2013. ISSN:2231- 5381. published by seventh sense research group.
[10] Richard Steinberger, “Proactive vs Reactive Security”.
[11] LogRhythm-The Security Intelligence Company. [Online].
[12] Dr. Marco Gercke, “Understanding cybercrime: phenomena, challenges and legal response”, (2012). ITU
[13] Symantec [Online] Available:
[14] Eric A. Fischer, “Cybersecurity Issues and Challenges: In Brief”, (2014) , Congressional Research Service.

Computer crime, Identity crime, Cyber crime, Cyber Security, Security Mechanisms for Cyber Security.