Top Five Cyber Frauds

نویسندگان

  • Rajesh Kumar Goutam
  • Deepak Kumar Verma
  • Kristin Finklea
چکیده

In last three decades the attacks against the personal information, social information and financial information become more frequent and sophisticated. Initially, the purpose of cyber attack was the entertainment but as scenario has changed, internet is now seen as wonderful tool to conduct fraud or to grasp the information about anyone else. The paper shows how internet is important for cyber criminals and why they use it as a secure medium to conduct fraud. The major five categories of cyber crimes have been explained with their landscape. We have also presented a brief idea about the cost of stolen items in terms of information in underground cyber black market and its impact on society.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Old is Still Gold: A Comparison of Cyber and Traditional Consumer Fraud in The United States

While cybercrime is a relatively recent human invention, fraudulent activity has a much longer history. Understanding the extent to which cybercrime is fundamentally different from, or similar to, traditional fraudulent activity is the first step toward being able to effectively combat it. This paper investigates the differences in fraud targeting among United States based consumers by comparin...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

A Comprehensive Study of Mechanisms Dealing Credit Cards to Defy Social Engineering Crimes

Nowadays credit cards have become a prerequisite in our daily activities. The misuse of credit card is increasing day by day. There are several ways in which a offender performs a credit card fraud. It is always been advised to exercise and provide additional security to the credit cards in order to elude the frauds. This paper focuses on credit card frauds. It addresses the cyber security chal...

متن کامل

Stealing Your Money Through

Cyber criminals are using advanced attacks to exploit online banking systems and services to covertly steal money. This paper describes the tactics currently used by cyber criminals to conduct cyber bank robbery. The Art of Cyber Bank Robbery earn approximately $25,000. Recent botnets such as Zeus, SpyEye, and Citadel have infected millions of machines. If the same formula is applied, potential...

متن کامل

An event-based platform for collaborative threats detection and monitoring

Organizations must protect their information systems from a variety of threats. Usually they employ isolated defenses such as firewalls, intrusion detection and fraud monitoring systems, without cooperating with the external world. Organizations belonging to the same markets (e.g., financial organizations, telco providers) typically suffer from the same cyber crimes. Sharing and correlating inf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015