{"id":1353,"date":"2018-12-04T08:51:00","date_gmt":"2018-12-04T08:51:00","guid":{"rendered":"http:\/\/www.gyanvihar.org\/journals\/?p=1353"},"modified":"2019-05-28T13:17:23","modified_gmt":"2019-05-28T13:17:23","slug":"cyber-crime-escalation-vs-solutions-a-literature-snapshot","status":"publish","type":"post","link":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/","title":{"rendered":"Cyber crime Escalation Vs solutions: a Literature Snapshot"},"content":{"rendered":"<p style=\"text-align: center\"><strong>Dr. Raksha Chouhan<\/strong><\/p>\n<p style=\"text-align: center\">Faculty, Prestige Institute of Management and Research, D.A.V.V. Indore (Madhya Pradesh) E-mail: raksha_chauhan@pimrindore.ac.in<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify\">Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust, market value as well as on economy of the country. Internet has acted as an alternate avenue for the criminals to conduct their activities, and commence attacks with relative murkiness. In this age cybercriminals are tagrting the social and professional networks and threats are directed at the mobile platform like smartphones and tablets. The major cyber crimes reported in India are denial of services, defacement of websites, SPAM, computer virus and worms, pornography, cyber squatting, cyber stalking, phishing etc. The failure towards providing trusted secure services in modern computer network technologies has a remarkable socio-economic impact in global aspect and it is alerting us to claim attention in national capitals and dedicated legislation on cyber crime to supplement the Indian Penal Code. In this paper an analytical approach has been introduced from emergence of cyber crime to prevention strategies used for cyber crime. This paper throws light on status of cyber crime in current scenario, available solutions including steps taken by nongovernment and government organizations to avoid cyber crime and forthcoming challenges as well as upon National, International accordance and solutions to deal with the same.<\/p>\n<p><strong>KEYWORDS: <\/strong>Cyber Crime, Cyber Attacks and Piracy, Cyber Safety, Cyber Law, I.T. Act.<\/p>\n<p>1. Introduction<\/p>\n<p style=\"text-align: justify\">Internet technology have not come up without drawbacks, although it make our life speedy but at the same time it requires lot of alertness also. Among E-frauds obscenity, defamation, forgery, criminal intimidation, slander have come up rapidly. Cybercrime deals with the crimes related to computer world. The cyber crime includes the crime in which computer is involved in some format. Cyber criminal is a person who commits an illegal act with a guilty intension or commits a crime. The cyber criminal may be a kids and teenagers between ages 9-17 years, organized hackers (pranksters) or crackers, professional hackers or career criminals, peeved employees, cyber terrorists, cyber bulls, salami attacker etc. Cybercrime damages trade, competitiveness, innovation, and global economic growth. In figure 1 percentage wise country confidence ranking regarding to current scenario of cyber tracking with their borders has been shown where: Australia (.08%),Brazil (.32%), Canada (.17%), China (.63%), European Union (.41%), France (.11%), Germany (1.60%), <strong>India (.21%)<\/strong>, Japan (.02%), Mexico (.17%), Russia (.10%), Saudi Arabia (.17%), Turkey (.07%), United Kingdom (.16%), United States (.64%), Argentina (n\/a), Colombia (.14%), Indonesia (n\/a), Ireland (.20%), Italy (.04%), Kenya (.01%), Korea (n\/a), Malaysia (.18%), Netherlands (1.50%), New Zealand ( .09%), Nigeria (.08%), Norway (.64%),Singapore ( .41%), South Africa ( .14%), United Arab Emirates (.11%), Vietnam (.13%), Zambia (.19%) [1]:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1356 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-62.jpg\" alt=\"\" width=\"628\" height=\"345\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62.jpg 628w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62-624x343.jpg 624w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: justify\">In pre 2000 cybercrime was considered as immature or childish behavior of criminal as a practical joke or game by those who committed it. Earlier it was centered on or around one-man operated crime with the intension to exploit the limitations in the computer operating system or computer network. In most cases these crimes were committed by those people who felt challenged to prove that they could beat the system without any intension of gaining financial benefit where a great deal of financial damage could actually result. At this time Criminal defense policies was also largely based on the fact that no real intentional damage was done and, in a large number of cases, the penalty for the crime was showing how the computer system had been hacked by the hacker. In post 2000 cyber criminal gangs had introduced a professional element into the world of cybercrime. They had organized and focused their attention towards profit gain and had developed tactics to making use of computer networks to infiltrate and take advantage of the trust of other users of that computer network for huge financial gain. They had worked out hardened and they had realized that the Internet was a safe domain, with much less risk, with which to operate and generate large profits [4]. Fig 2 is showing various stages of\u00a0cyber attack evolution from year 1980 to the year\u00a0 \u00a0 \u00a0 \u00a02000+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 [3]:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1357 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-63.jpg\" alt=\"\" width=\"641\" height=\"256\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-63.jpg 641w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-63-624x249.jpg 624w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/p>\n<p style=\"text-align: justify\">While the worldwide scenario on cyber crime looks desolate, the situation in India isn&#8217;t any better. India in rated in the top 5 countries affected with cyber crimes and gaining momentum from simple email type of crime to serious crime like hacking, phishing, Vishing, source code theft, cyber staking, internet time theft, Web Jacking and cross site scripting etc. In table 1 cyber crime classification has been shown [2]:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1372 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-68.jpg\" alt=\"\" width=\"527\" height=\"132\" \/><\/p>\n<p style=\"text-align: justify\"><strong>2. Rationale and objectives of the Study<\/strong><br \/>\nInformation plays essential role for an individual, cooperate sector as well as for state and\u00a0country. India has emerged as a favourite among cybercriminals, mostly hackers and other\u00a0malicious users who use the internet to commit crimes and due to insufficient rules and\u00a0regulations privacy of information is easily breached. According to Computer Emergency\u00a0Response Team-India (CERT-In) report till May 2014 total 9, 9,174 Indian websites were hacked\u00a0by hacker groups spread across the world [5]. According to an Assoc ham-Mahindra SSG study\u00a0\u201cThe number of cyber crimes in the country may double to 3 lakh in 2015 and could pose serious\u00a0economic and national security challenges\u201d [6]. Objective of my study are:<\/p>\n<p style=\"text-align: justify\">1. The study is going to help in identifying different modes by which cybercrime has been\u00a0spread across the world as well as significant variants which can be used to detect and\u00a0prevent our society to combat with cybercrime.<br \/>\n2. To recognize emerging cyber safety mechanism and various initiatives taken by\u00a0international and national organizations so that future direction can be traced towards the\u00a0development of advanced methodologies.<\/p>\n<p style=\"text-align: justify\"><strong>3. Methodology<\/strong><br \/>\nThis study is descriptive in nature. An attempt has been made to analyze cyber crime report given\u00a0by different media resources from theoretical and investigative points of views with sentencing\u00a0research. The material has been referred from Online as well as desk based book reviews,\u00a0articles, reports, research and conference papers. Thus a combination of existing literature studies\u00a0and in-depth secondary database material is used to fulfill the objective.<\/p>\n<p style=\"text-align: justify\">\n<strong>4. Cyber Crime Variants<\/strong><br \/>\nIn the present scenario the online channels are facing tricky and globally-integrated technological\u00a0crimes. An offence of cyber crime involves use of computer, internet, cyber space, tools and\u00a0techniques of World Wide Web. Fig 3 illustrates cyber crime variants.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1381 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-71.jpg\" alt=\"\" width=\"628\" height=\"390\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-71.jpg 628w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-71-624x388.jpg 624w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: justify\"><strong>5. Role playing factors and growth of cyber crime<\/strong><br \/>\nThe integrity, authenticity, confidentiality and availability of data in cyberspace have become\u00a0vital questions of the 21st century. The trends of Information Systems such as Internet and cloud\u00a0computing has created challenges in maintaining security of information. Data interception, data\u00a0modification, data theft, network crime, access crime etc are the fundamental categories of cyber\u00a0crimes. Accountable factors which are responsible for cyber crime are<\/p>\n<p>1. Data access and sharing policies between private and public sectors.<br \/>\n2. Data leakage through mobile and wireless frauds and cloud computing also plays<br \/>\nimportant role to augmentation of cyber crime.<br \/>\n3. Criminals Justice sanctions like internet restrictions and electronic monitoring.<br \/>\n4. Sentencing of cyber criminals etc.<\/p>\n<p style=\"text-align: justify\">Threats from cybercrime are increasing rapidly and Internet has become a platform for criminals\u00a0to conduct their activities and to launch attacks with relative obscurity. Main targets of Cyber\u00a0criminals are citizens, businesses and governments. Social networking and constant online\u00a0communication, proliferation of communication devices, networks, and users have generated\u00a0new vulnerabilities that create more cyber crime opportunities. In 2013, the IC3 received 262,813\u00a0consumer complaints with an adjusted dollar loss of $781,841,6111, which is a 48.8 percent\u00a0increase in reported losses since 2012 ($581,441,110). Of the 262,813 complaints received in\u00a02013, 45.5 percent (119,457) reported financial loss. Year wise complaints registered in IC3 has\u00a0been shown below [7]-<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1388 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-73.jpg\" alt=\"\" width=\"702\" height=\"190\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-73.jpg 702w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-73-624x169.jpg 624w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" \/><\/p>\n<p style=\"text-align: justify\">According to Computer Emergency Response Team-India (CERT-In) report till may 2014 total 9,9,174 Indian websites were hacked by hacker groups spread across the world[5]. The study revealed that mobile frauds are an area of concern for companies as 35-40 per cent of financial transactions are done via mobile devices and this number is expected to grow to 55-60 per cent by 2015[6]. In fig 5 Cyber crimes \/ cases registered and persons arrested under IT Act during 2009-2013 have been shown. According to National Cyber Crime Bureau Report (2013) from 2009 to 2013 the graph for registered cases under IT Act has been increased successively and most of the cases were for hacking and obscene publication\/transmission. Like in 2013 total 2450 cases were registered and only 1000 persons were arrested under hacking similarly 1192 cases were registered under obscene publication\/transmission and only 734 persons were arrested [8].<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1390 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-75.jpg\" alt=\"\" width=\"649\" height=\"452\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-75.jpg 649w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-75-100x70.jpg 100w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-75-624x435.jpg 624w\" sizes=\"auto, (max-width: 649px) 100vw, 649px\" \/><\/p>\n<p style=\"text-align: justify\">In fig 6 Cyber crimes \/ cases registered and persons arrested under IPC during 2009-2013 have been shown. According to National Cyber Crime Bureau Report (2013) from 2009 to 2013 the graph for registered cases under IT Act has been increased successively and most of the cases were for forgery (735 cases) and of criminal breach of trust\/fraud (518 cases). As it is clear that out of 735 registered cases only 608 persons were arrested under forgery and out of 518 registered cases only 471 persons were arrested under criminal breach of trust\/fraud [8].<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1392 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-76.jpg\" alt=\"\" width=\"638\" height=\"418\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-76.jpg 638w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-76-624x409.jpg 624w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/p>\n<p>From fig 5 and fig 6, It can be observed that the ratio of persons arrested under IPC is more than the number of persons arrested under IT act that indicates that special attention is required under IT act<\/p>\n<p><strong>6. Challenges and Issues<\/strong><br \/>\nDevelopment of national technological and manpower capabilities, endorsement of new laws,\u00a0encouragement of higher level of industry government collaboration programs and move forward\u00a0for international cooperation are critical to combat cyber crime. Some of the issues are [2]:<\/p>\n<p style=\"text-align: justify\"><strong>A) Technical Issues:<\/strong> The growth of Cyber crime as given rise to numerous forensic\u00a0software vendors and the main challenge is to select one of them because no single\u00a0forensic tool is capable to solve the entire case. Technical issues are related with\u00a0hardware, software and third party tools, where large storage space is required to store\u00a0analysed image and retrieved evidence because retrieved evidence might contain\u00a0documents, pictures, videos and audio files which require large storage space.<\/p>\n<p style=\"text-align: justify\"><strong>B) Global Issues:<\/strong> Correspondence with bodies such as Google, Yahoo, Hotmail is quite\u00a0time consuming and prolong the investigations. Most of the IP addresses retrieved during\u00a0investigation leads to servers or computers located abroad which have no identity, hence\u00a0further investigations are blocked and closed.<\/p>\n<p style=\"text-align: justify\"><strong>C) Challenges Faced By Law Enforcement<\/strong>: In some cases people are unaware of the resources and services that law enforcement could provide them if being a victim of crime or witness and fear to report crimes.<\/p>\n<p style=\"text-align: justify\"><strong>\u00a0D)\u00a0<\/strong><strong>Wireless or Wi-Fi, Bluetooth, Infrared Issues<\/strong>: This is another cause for vulnerability and exploitation that law enforcement faces due to latest unsecured wireless technologies<\/p>\n<p style=\"text-align: justify\"><strong>E)\u00a0<\/strong><strong>Inadequate Training and Funds: <\/strong>Training bodies are limited and are expensive. Insufficient funding is also responsible factor for officers training and future investment point of view. Transfers and recruiting officers adds to the loss of experienced staff and spending for training the newcomers. Cases become pending in such circumstances.<\/p>\n<p style=\"text-align: justify\"><strong>\u00a0F)\u00a0<\/strong><strong>Judiciary and IT Act 2000: <\/strong>The judicial bodies are not fully aware of Cyber crime and the way in which investigations are carried out. Although Cyber law courses available in India, it is difficult to find an experienced cyber lawyer who is aware of Forensic analysis and technical terms. It is difficult to convince judicial bodies including judges and the tribunal when evidence is in a digital format. There is no legal procedure for collecting, analyzing and presenting evidence in the court of law. There are certain shortcomings of the Information Technology Act, 2000 with regard to identity theft, spamming, pornography, data protection and internet banking.<\/p>\n<p style=\"text-align: justify\"><strong>7. Detection and Prevention of cybercrime<\/strong><br \/>\nThe increasing use of smart phones and tablets for online banking and other financial\u00a0transactions have increased risks. Phishing attacks of online banking accounts or cloning of\u00a0ATM\/debit cards are common occurrences. The attacks have mostly originated from the cyber\u00a0space of countries including the US, Europe, Brazil, Turkey, China, Pakistan, Bangladesh,\u00a0Algeria and the UAE, the study revealed [6]. Fig 7 shows four major tasks perform by cyber<br \/>\nanalysts for working with digital evidence.<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1394 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-77.jpg\" alt=\"\" width=\"628\" height=\"268\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-77.jpg 628w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-77-624x266.jpg 624w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: justify\">Prevention mechanism should at least consider security mechanisms like identity proof\u00a0verification, Safe confidentiality of transferred data, Integrity of transferred data, Undeniable\u00a0responsibility for transactions made. Some of the important cyber crime safety mechanism used\u00a0by most of the International and international banks are password encryption, virtual keyboard,\u00a0secure socket layer, SMS alerts, user awareness programs, browser protection, OTP token, OTP\u00a0card , digital certification etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1399 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-78.jpg\" alt=\"\" width=\"699\" height=\"417\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-78.jpg 699w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-78-624x372.jpg 624w\" sizes=\"auto, (max-width: 699px) 100vw, 699px\" \/><\/p>\n<p style=\"text-align: justify\">The most popular weapon in cyber terrorism is the use of computer viruses and worms. Antivirus stays helpless until and unless its database is updated periodically to discover new attacks like hijacking, Denial of Service etc. therefore other software\u2019s are also needed along with the use of antivirus. It is good practice not to eliminate the firewall from our system even if it has limited capacities compared to IPS or IDS, because a firewall reduces the amount of the bad traffic that can reach the IPS and IDS, which will reduce the alarms and the suspicious data. Some of the foremost policies involved in cyber safety mechanism are NCSP (National Cyber Security Policy)-2013, IT Act 2000 and ITA Act 2008, Counter Measures used to provide cyber safety mechanism, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), An intrusion detection and prevention system (IDPS), Distributed Intrusion Detection System (DIDS) and GPRS Security Architecture etc[9][10][11].<\/p>\n<p style=\"text-align: justify\">The economic growth of any nation and its security depends on how well is its cyberspace secured and protected. In recent cyber security measures Non Government (private) regulatory measures, National Law and enforcement measure, Defensive strategies, products as well as some limited forms of international cooperation and regulations plays important role. Some of the initiatives taken by Non Government Organization are IETF (Internet Engineering Task Force), Web Consortium House, FIRST (Forum of Incident Response and Security Teams), IEEE (Institute of Electrical and Electronics Engineers), ICANN (Internet Corporation for\u00a0\u00a0Assigned Names and Numbers). Government Organizations are DSCI (Data Security Council of India), NIC (National Informatics Centre), Cert-In (Indian Computer Emergency Response Team), NISAP (National Information Security Assurance Program). International Organizations are IUSCSF (Indo-US Cyber Security Forum) and USNSE (United State National Security Experts) [9][12].<\/p>\n<p style=\"text-align: justify\"><strong>8. Recommendations<\/strong><br \/>\nA combination of technological and non-technological measures can give strong fight to the\u00a0problems arising through cyber crime. Few recommendations are:<\/p>\n<p>1.The new legislation to cover all the aspects of the Cyber Crimes should be passed to\u00a0remove the grey areas of the law.<br \/>\n2. There is also a need for IT-savvy lawyers and judges, as well as training for\u00a0government agencies and professionals in computer forensics.<br \/>\n3. From technological point of view database and network design with their\u00a0implementation part is crucial, whereas nontechnical measures are behavioral\u00a0measures like general awareness training programs for employees, consumers and\u00a0public.<br \/>\n4. The software&#8217;s which are easily available for download should be restricted by the\u00a0Government by appropriate actions.<br \/>\n5. Smartphone users are advised to check for security certificates while downloading\u00a0apps (games, music and other software) from third party or unsecured sites<\/p>\n<p>6. New amendment should be including in to the IT Act to make it efficient and active\u00a0against a Cyber Crime.<br \/>\n7. Investing in training people, law enforcement authorities and investigators could also\u00a0enhance nations\u2019 ability to fight with cybercrimes.<br \/>\n8. There is an immense need for training, and more cities need to have such cells hence\u00a0the training camps and public awareness programs should be organized in the\u00a0Companies as well as in common sectors.<br \/>\n9. Multi-layered boundary defense control should be established to control the flow of\u00a0traffic<\/p>\n<p>10. Standardized logs for each hardware and software should be generated to\u00a0maintenance, monitoring, and analyze security including date, time stamp, source\u00a0addresses, destination addresses, and other information about each packet and\/or\u00a0transaction.<\/p>\n<p style=\"text-align: justify\"><strong>9. Conclusion<\/strong><br \/>\nCyber crime is emerging as a serious threat. Awareness is important, and any matter should be\u00a0reported at once. More importantly, users must try and save any electronic information trail on\u00a0their computers. Current perimeter-intrusion detection, signature-based malware, and anti-virus\u00a0solutions are providing little defenses and are rapidly becoming obsolete because, cyber\u00a0criminals now use encryption technology to avoid detection. There is a dire need for evolving a\u00a0code of Ethics on the Cyber-Space and discipline and it is necessary to take certain precautions\u00a0while operating it. Since cyber world has no boundaries, it is a Herculean task to frame laws\u00a0which can cover each and every aspect. But, however a balance has to be maintained and laws be\u00a0evolved so as to keep a check on cyber crimes. World Wide governments, police departments\u00a0and intelligence units have started to react. Initiatives to curb cross border cyber threats are\u00a0taking shape. Indian police has initiated special cyber cells across the country and have started\u00a0educating the personnel. Unless there is solid prevention, cyber crime will rise steeply. A strong\u00a0commitment is required from beside of general public, Bench and Bar, IT experts, Executive\u00a0Members, Social Organization, NGOs, and other similar type of organization to keep the society\u00a0free from such type of crime.<\/p>\n<p><strong>10. References<\/strong><br \/>\n1. McAfee Intel Security (June 2014) \u201cNet losses Estimating the global cost of cyber crime:\u00a0Economic Impact of cyber crime II, centre for strategic and international studies\u201d, pp 24,\u00a0http:\/\/www.mcafee.com, http:\/\/csis.org\/.<br \/>\n2. Raksha Chouhan, Shashikant Pardeshi (2013) \u201cCyber Crime Security and Upcoming\u00a0Challenges: An Overview\u201d, Journal of Engineering, Science And Management Education\u00a0(JESME), Quarterly Research Journal of NITTTR Bhopal, Vol-6, Issue-III, July\u2013\u00a0September 2013, PP 131-136, ISSN 0976-0121.<br \/>\n3. Raksha Chouhan (2014) \u201cCyber Crimes: Evolution, Detection and Future Challenges\u201d,\u00a0The IUP Journal of Information Technology, ICFAI University Press, Hyderabad, Andhra\u00a0Pradesh, Vol. X, No. 1, March 2014, PP 48-55, ISSN 0973-2896.<br \/>\n4. Criminal Defense (visited: 8-1-15) \u201cThe evolution of cybercrime from past to the\u00a0present\u201d http:\/\/www.criminallawyergroup.com\/criminal-defense\/the-evolution-ofcybercrime-from-past-to-the-present.php.<\/p>\n<p>5. Computer Emergency Response Team-India (CERT-In) reports 62,189 cyber attacks till\u00a0May 2014, http:\/\/www.techmistory.com\/2014\/07\/cert-in-reports-62189-cyberattacks.html,\u00a0visited: 10-1-15.<\/p>\n<p>6. The Economic Times (Jan 5, 2015) \u201cCyber crimes in India likely to double to 3 lakh in\u00a02015:Report\u201d,http:\/\/articles.economictimes.indiatimes.com\/2015-01-<br \/>\n05\/news\/57705670_1_cyber-crimes-online-banking-pin-and-account-number.<\/p>\n<p>7. FBI IC3 (Federal Bureau of Investigation International Crime Complaint Center 2013)\u00a0\u201c2013 Internet Crime Report\u201d, visited on 10-1-15.<br \/>\n8. National Cyber Crime Bureau Report (2013) \u201cCrime in India-2013\u201d, http:\/\/ncrb.gov.in\/,\u00a0pp 6, visited: 10-1-15.<br \/>\n9. Atul M. Tonge, Suraj S. Kasture , Surbhi R. Chaudhari(2013), \u201cCyber security:\u00a0challenges for society- literature review\u201d, IOSR Journal of Computer Engineering (IOSRJCE)\u00a0e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. &#8211; Jun. 2013), PP\u00a067-75 www.iosrjournals.org.<br \/>\n10. Janhavi J Deshmukh and Surbhi R Chaudhari (April\u2019 2014), Cyber crime in Indian\u00a0scenario \u2013 a literature snapshot, International Journal of Conceptions on Computing and\u00a0Information Technology, Vol.2, Issue 2, pp 24-29, ISSN: 2345 \u2013 9808.<\/p>\n<p style=\"text-align: justify\">11. Baroudi Siba, Ziade Haissam, Mounla Bassem (2004), \u201cAre we really protected against\u00a0hackers?\u201d Proceddings International Conference on Information and Communication\u00a0Technologies: from theory to application. PP. 621-622. IEEE<br \/>\n12. Col S S Raghav (visited: 28-11-14), \u201ccyber security in india&#8217;s counter terrorism strategy\u201d,\u00a0pp 5, ids.nic.in.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dr. Raksha Chouhan Faculty, Prestige Institute of Management and Research, D.A.V.V. Indore (Madhya Pradesh) E-mail: raksha_chauhan@pimrindore.ac.in &nbsp; Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust, market value as well as on economy of the country. Internet has acted [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,28],"tags":[],"class_list":["post-1353","post","type-post","status-publish","format-standard","hentry","category-international-journal-of-converging-technologies-management","category-volume-1-issue-2-2015"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"description\" content=\"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Crime Escalation Vs Solutions: A Literature Snapshot | SGVU\" \/>\n<meta property=\"og:description\" content=\"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-04T08:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-28T13:17:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"628\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"gyanvihar3\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Crime Escalation Vs Solutions: A Literature Snapshot | SGVU\" \/>\n<meta name=\"twitter:description\" content=\"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gyanvihar3\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/\",\"name\":\"Cyber Crime Escalation Vs Solutions: A Literature Snapshot | SGVU\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-62.jpg\",\"datePublished\":\"2018-12-04T08:51:00+00:00\",\"dateModified\":\"2019-05-28T13:17:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\"},\"description\":\"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#primaryimage\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62.jpg\",\"contentUrl\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62.jpg\",\"width\":628,\"height\":345},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber crime Escalation Vs solutions: a Literature Snapshot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\",\"name\":\"gyanvihar3\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"caption\":\"gyanvihar3\"},\"url\":\"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","description":"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Crime Escalation Vs Solutions: A Literature Snapshot | SGVU","og_description":"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.","og_url":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/","og_site_name":"research journal","article_published_time":"2018-12-04T08:51:00+00:00","article_modified_time":"2019-05-28T13:17:23+00:00","og_image":[{"width":628,"height":345,"url":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62.jpg","type":"image\/jpeg"}],"author":"gyanvihar3","twitter_card":"summary_large_image","twitter_title":"Cyber Crime Escalation Vs Solutions: A Literature Snapshot | SGVU","twitter_description":"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.","twitter_misc":{"Written by":"gyanvihar3","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/","url":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/","name":"Cyber Crime Escalation Vs Solutions: A Literature Snapshot | SGVU","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#primaryimage"},"image":{"@id":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#primaryimage"},"thumbnailUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-62.jpg","datePublished":"2018-12-04T08:51:00+00:00","dateModified":"2019-05-28T13:17:23+00:00","author":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9"},"description":"Internet based global fraud rate is increasing rapidly and there is a potential impact of cyber crime on quality production time, overhead cost, consumer trust.","breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#primaryimage","url":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62.jpg","contentUrl":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-62.jpg","width":628,"height":345},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/cyber-crime-escalation-vs-solutions-a-literature-snapshot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"Cyber crime Escalation Vs solutions: a Literature Snapshot"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9","name":"gyanvihar3","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","caption":"gyanvihar3"},"url":"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/1353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=1353"}],"version-history":[{"count":1,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/1353\/revisions"}],"predecessor-version":[{"id":1402,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/1353\/revisions\/1402"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=1353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/categories?post=1353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/tags?post=1353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}