A DEEP AND PRECISE STUDY OF DIGITAL CRIME AND WEB SECURITY - A TECHNOLOGY ANALYSIS

S. Nithyanandh, V. Jaiganesh

Abstract


This objective thinks about is to be survey the issues required of web security and digital wrongdoing or crime. Obviously, this had a Catch since the mechanical advances made in both of programming and equipment to expanded web safety efforts are additionally accessible to digital offenders who instantly utilization of them to balance these proportions of digital wrongdoing. A Marvels, Difficulties and Lawful Reaction are to be help nations in understanding the legitimate parts of digital security and to help orchestrate lawful systems. Digital wrongdoings and Crimes have advanced into genuine danger and appropriate enactment and indictment is seriously expected to battle them. Digital crime enactment is continually lingering behind those quickly developing mechanical advances which are utilized by the crooks and in addition the individuals who wish to battle them. There is likewise an expected to consider the contending intrigued between singular privileges of security and free discourse, and the respectability of both open and private systems framework.

Keywords


Digital Crime, Digital Wrong Doing, Web Security, Cyber Crimes, Cyber law and Act.

References


BIBLIOGRAPHY

Internet security - cyber crime, Ali Peiravi, 2Mehdi Peiravi, Marsland Press Journal of American Science 2010; 6(1): 15-24.

Aaron, G., Bostik, K. A. Chung, E. Rusmussen, R., (2008),"Protecting the web: Phishing, malware, and other security, threats", Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08, pp. 1253-1254.

Ben-Itzhak, Y., (2009), "Organised cybercrime and payment cards", Card Technology Today 2009; (2): 10-11.

Bhatia, J. S. Sehgal, R. Bhushan, B. Kaur, H., (2008), "Multi layer cyber attack detection through honeynet", Proceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS 2008.

Blakeley, C. J., (2008), "Cybercrime law: international best practices", Doha information Security Conference, Doha, Qatar, June 10-11, 2008.


Refbacks

  • There are currently no refbacks.


Send mail to ijmss@ijmss.com with questions or comments about this web site. 

International Journal of Management and Social Sciences, All rights reserved.