Please use this identifier to cite or link to this item: http://192.168.9.248:8080/jspui/handle/123456789/811
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKhan, Suhel Ahmed ed.-
dc.contributor.authorKumar, Rajeev ed.-
dc.contributor.authorKaiwartya, Omprakash ed.-
dc.contributor.authorKhan, Raees Ahmad ed.-
dc.contributor.authorFaisal, Mohammad ed.-
dc.date.accessioned2024-01-18T05:03:22Z-
dc.date.available2024-01-18T05:03:22Z-
dc.date.issued2023-
dc.identifier.isbn9781003323426-
dc.identifier.urihttp://dx.doi.org/10.1201/9781003323426-12-
dc.identifier.urihttp://192.168.9.248:8080/jspui/handle/123456789/811-
dc.descriptionCHAPTER 12 : A Critical Analysis of Cyber Threats and Their Global Impact by Syed Adnan Afaq, Mohd. Shahid Husain, Almustapha Bello, Halima Sadiaen_US
dc.description.abstractInformation technology and internet services both need to be concerned about cyber security. Internet users must be aware of the numerous types of threats that exist in the online environment. Improving cyber security and protecting sensitive information are critical to a country’s security and economic well-being. In the field of computer science, cyber security is critical. It refers to a set of procedures and technological security approaches for protecting data resources (computer systems, machines, records, and numerous applications). Data and information security has become one of the most significant concerns in the modern day. Several managements and corporations are enchanting different measures in order to prevent and control these cybercrimes. Despite several precautions and strategies, cyber security continues to be a major concern for many individuals. Cyber society has evolved into a common and unavoidable foundation of information exchange and different proficient activities such as commercial, shopping, bank transactions, ads, and facilities in the current era. This rapid growth in cyberspace use has resulted in an enormous rise in cybercriminal behavior. The extensive usage of web applications in virtually every aspect of life is the primary cause of this development. This research examines the challenges that cyber security faces in the present period, as well as the cybercrimes and kinds of cyber security risks that are addressed globally during the COVID-19 pandemic. The advancement of digital technology has formed a completely new platform for criminal behavior. India is third in the world in terms of internet users, only after the United States and China, with a percent per annum of 44% between 2012 and 2017. The United States is among the top ten spam-sending countries in the world. India is now one of the leading countries affected by cybercrime, as per a study released on October 22 by internet security firm “Symantec Corp.” In this pandemic, various methods are used by the cyber criminals and scammers such as phishing, fake URLs, preying on the good of people for donation, spreading misinformation, fake messages like your COVID-19 tests have arrived, your family member has been hospitalized, we urgently need you to help with a donation, etc. The cybercriminals have established hundreds of new bogus and risky webpages that use phishing to obtain vital information from users. According to a study, phishing attempts have grown by 350% since the outbreak of the epidemic. Malwares have been installed in mobile applications that are designed to follow the progress of COVID-19; these apps have the power to collect vital information from users. Phishing emails have also been on the increase throughout the outbreak, with reputable authority emphasizing their existence. As per report, scammers take advantage of a person’s insecurities about the novel coronavirus to trick them into buying things they do not need. While spreading malwares, the cyber criminals are willing to attempt economic crime by providing links to fraudulent charitable courses and contribution platforms. Although a lot of methods and measures have been developed to monitor and prevent cyberattacks, it’s still very challenging for all the industries.en_US
dc.language.isoenen_US
dc.publisherCRC PRESSen_US
dc.subjectComputer Applicationen_US
dc.titleComputational Intelligent Security in Wireless Communicationsen_US
dc.typeBook chapteren_US
Appears in Collections:Books/Book Chapters/Edited Books

Files in This Item:
File Description SizeFormat 
BOOK CHPATER 4 2023-2024 CA.pdfCRC318.01 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.