International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 169    Submit Your Rating     Cite This   Download        Certificate

"GLIMPSE ON CYBERCRIME IN INDIA AND VARIANTS OF TECHNOLOGY THAT ARE USED IN CYBERCRIME

    1 Author(s):  OMKAR SINGH

Vol -  8, Issue- 4 ,         Page(s) : 40 - 48  (2017 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Cybercrime has grown in leaps and bounds as the computer has become central to trade and commerce, leisure, entertainment and government. Cybercrime involves attack on information about individuals, groups, corporations, or governments. An important aspect of cybercrime is its international character. This poses severe problems for law enforcement since previously local or even national crimes now require international cooperation. Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, midway along the spectrum lie transaction-based crimes and at the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet.

l."Phishing", Language Log, September 22, 2004. Retrieved August 9, 2006.
2. Gonsalves, Antone (April 25, 2006).'phishers Snare victims With VoIP". Techweb.

3."ldentity thieves take advantage of VoIP'. Silicon.com. March 21, 2005.

4. The Spamhaus Project - The Definition of Spam.

5. Royakkers 2000:7, cited in Cyber Stalking: menaced on the internet. 

6. http:/ /delhicourts.nic.in /CYBER%20LAW.pdf 

7. Nasik Police play big boss for internet voyeurs, Hindustan Times, Sunday, Oct 28 2007

8. Losses due to cyber crime can be as high as $40 billion, The Hindu Business line date May 21 2007.

9. Kolkata man threatens to blowup Stock exchanges arrested. Express India. Com Sun 28 Oct 2007

l0. Mutton, Paul." Fraudsters seek to make phishing sites Undetectable by Content filters". Net craft.
11.http://news.netcraft.com/archives/2005/05/12/fraudsters-seek-to-make-phishing-sites-undetect able-by content- filters.html.

12. Peter Likarish, Don Dunbar, Juan Pablo Hourcade, Eunjin Jung, BayeShield: Conversational
Anti-phishing User Interface, Symposium on Usable Privacy and Security (SOUPS) 2009, ACM.

13. Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, Elizabeth

14. Cyber Crimes on the rise in state - Kerala: The Hindu Monday Oct 30 2006

15. https://cis-india.org/internet-governance/resources/section-79-information-technology-act

16. Nowa Pune base for net's cyber cops The Hindu Sunday Nov 26 2006

17. Bank Customers face Phishing the Hindu, Coimbatore Monday August20 2007,

18. http://dispur.nic.in/itact/it-intermediaries-guidelines-rules-2011.pdf

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details