Open Access Open Access  Restricted Access Subscription or Fee Access

Problems and Task of Cyber Protection and Cybercrime

Dr. M. Renuka Devi, U. S. Abisek, L. Divyadarshini, E. Kaviya


Presently, Cybercrime is one of the major crimes done by computer expert. In this paper, need of cyber security impacts of the cybercrime is clearly mentioned. Cyber security refers providing prevention against the cybercrime. Cybercrime refers that group of activities made by the people by creating disturbance in network, stealing others private information, documents, hacking the bank details and accounts and transferring money. The paper includes types, needs and issues in cyber security, its advantages and disadvantages, history of cybercrime, types of cybercrime.


Cybercrime, Cyber Security, Hacking, Data, Information Security, Network Security, Operational Security, Communicational Security, Application Security.

Full Text:



Sergey, Melnik, Smirnov Nikolay, Erokhin Sergey. Cyber security concept for Internet of Everything (IoE).

Systems of Signal Synchronization, Generating and Processing in Telecommunications. 2017. IEEE, 2017

Shang H, Jiang R, Li A. A Framework to Construct Knowledge Base for Cyber Security. 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC). IEEE, 2017.

Manmohan Chaturvedi, AynurUnal, ShilpaBahl. International cooperation in cyber space to combat cyber crime and terrorism. 2014 IEEE Conference on Norbert Wiener in the 21st Century (21CW). IEEE, 2014.

Rayne Reid, Johan Van Niekerk. From information security to cyber security cultures. Information Security

R. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber-security analysis of smart SCADA systems with game models. Proceedings of the 9th annual cyber and information security research conference, ACM, 2014, pp. 109–112.

Von Solms, Rossouw, Johan Van Niekerk. From information security to cyber security. Computers and Security. 2013; 38: 97–102. 8. Eric A. Fischer. (2106). Cybersecurity Issues and Challenges: In Brief. [Online]. Available from sc/R43831.pdf [Accessed on October 2017].

"SAFER INTERNET DAY". Commonwealth of Australia 2013. Archived from the original on 2014-07-02. Retrieved 2013-09-24. "Get Safe Online". Internet Phishing Alert". Archived from the original on 2018-10-10. Retrieved 2013-10-01.

"Cyberstalking". Oxford University Press. Retrieved 2013-12-10.

Litwiller, Brett; Brausch, Amy (2013). "Cyber Bullying and Physical Bullying in Adolescent Suicide: The Role of Violent Behavior and Substance Use". Journal of Youth and Adolescence. 42 (5): 675–84. doi:10.1007/ s10964-013-9925-5. PMID 23381779. S2CID 30966940. ProQuest 1326638707.

]Bonanno, Rina; Hymel, Shelley (2013). "Cyber Bullying and Internalizing Difficulties: Above and Beyond the Impact of Traditional Forms of Bullying". Journal of Youth and Adolescence. 42 (5): 685–97. doi:10.1007/ s10964-013-9937-1. PMID 23512485. S2CID 21315215. ProQuest 1326638708.

Cyberbullying". eSafety Commissioner. Retrieved 2020-08-19.

a b Krolik, Aaron; Hill, Kashmir (2021-04-24). "The Slander Industry". The New York Times. ISSN 0362-4331. Retrieved 2021-04-26.

a b "Sextortion (webcam blackmail)". Archived from the original on 9 January 2019. Retrieved 12 March 2017.

a b "Webcam blackmail cases have doubled, police say". BBC News. 30 November 2016. Retrieved 12 March 2017.

[10]a b "The Skype sex scam - a fortune built on shame". 27 October 2016. Retrieved 12 March 2017.

'Sextortion': NCA releases awareness video". BBC News. 30 November 2016. Retrieved 12 March 2017.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.