Cyber Crime: Name:-Jaivik Akbari Enroll No: - 20SS02IT002
Cyber Crime: Name:-Jaivik Akbari Enroll No: - 20SS02IT002
Cyber Crime: Name:-Jaivik Akbari Enroll No: - 20SS02IT002
CRIME
Enroll No :- 20SS02IT002
INTRODUCTION 01
02 TABLE OF
LITERATURE
REVIEW
04 CONCLUSION
CONTENTS
CASE STUDY
03 05 FUTURE WORKS
06 REFERENCES
01
iNTRODUCTION
Introduction to The Area
-
Cyber Security
- Botnets
- Phishing and Other Social Engineering Attacks
- Fraud and Identity Theft
Three Major Examples of Cyber
Crime
Techopedia1 defines Cybercrime as “[...] a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes)”. Cybercriminals
may use computer technology to access information that can be personal, business information like trade
secrets, or use the net for any other malicious purposes. “Hackers usually perform these types of illegal
activities”. The damage that any single cybercriminal activity can bring about is massive. In 2017, the WannaCry
ransomware was used to attack the National Health Service in May of that year, and Petya/NotPetya
ransomware infecting global companies with a total waste of resources that cannot, to date, be estimated. The
years 2018 and 2019 suffered no better fate, indeed (Solano and Peinado, 2021). The overly high costs
connected to and lack of knowledge over these cyberattacks fundamentally motivates a systematic synthesis of
the problem and solutions around the phenomenon. We operate such a systematic synthesis intending to
identify gaps and shortcomings in the literature if any.
03
Case Study
Case STUDY
In this study, a novel approach comprising data mining technology and visualization
technique are implemented for predicting the distribution of cyber crime over major areas
of India. Initially, cyber crime datasets were preprocessed and data mining algorithms
were utilized to extort the facts out of them and then concealed interactions among the
data were explored that is promoted to report. Then, the cyber crime prototypes were
explored which were useful to cyber crime analysts in analyzing those networks by
means of visualization for cyber crime prediction and hence compassionate in preclusion
of cyber crimes. This work depicts the design of a knowledge base for an intelligent cyber
crime pattern identification system dealing with cases of Information Technology Act (IT
Act).
04
CONCLUSION
Conclusion
Slide 4 :- [1]
Slide 5 :- [1]
Slide 6 :- [1]
Slide 7 :- [1]
Slide 8 :- [1]
Slide 9 - 10 :- [1]