ABSTRACT
Today, due to the modern life style people have joined technology life and using more technology for shopping as well as financial transactions in their cyber space. At the same time, safeguarding of knowledge has become increasingly difficult. In addition, the heavy use and growth of social media, online crime or cybercrime has increased. In the world of information technology, data security plays a significant role. The information security has become one of today’s main challenges. Whenever we think of cyber security, we first of all think of ‘cybercrimes,’ which expand tremendously every day. Different government and businesses take various steps to avoid this form of cybercrime. In addition to numerous cyber protection initiatives, many people are also very worried about it. This paper focuses primarily on cyber security concerns related to the new technology. It also concentrates on the new technologies for cyber security, ethics and developments that impact cyber security.
Keywords: Cyber security, cybercrime, android apps social networks,
INTRODUCTION
Today man is able to send and receive any form of data may be an e-mail or an audio or video just by the click of a button but did he ever think how securely his data id being transmitted or sent to the other person safely without any leakage of information?? The answer lies in cyber security. Today Internet is the fastest growing infrastructure in everyday life. In today’s technical environment many latest technologies are changing the face of the mankind. But due to these emerging technologies we are unable to safeguard our private information in a very effective way and hence these days cyber-crimes are increasing day by day. Today more than 60 percent of total commercial transactions are done online, so this field required a high quality of security for transparent and best transactions. Hence cyber security has become a latest issue. The scope of cyber security is not just limited to securing the information in IT industry but also to various other fields like cyber space etc.
Even the latest technologies like cloud computing, mobile computing, E-commerce, net banking etc also needs high level of security. Since these technologies hold some important information regarding a person their security has become a must thing. Enhancing cyber security and protecting critical information infrastructures are essential to each nation’s security and economic wellbeing. Making the Internet safer (and protecting Internet users) has become integral to the development of new services as well as governmental policy. The fight against cybercrime needs a comprehensive and a safer approach. Given that technical measures alone cannot prevent any crime, it is critical that law enforcement agencies are allowed to investigate and prosecute cybercrime effectively. Today many nations and governments are imposing strict laws on cyber securities in order to prevent the loss of some important information. Every individual must also be trained on this cyber security and save themselves from these increasing cyber crimes
CYBER CRIME
Cyber-crime is a term for any illegal activity that uses a computer as its primary means of commission and theft. The U.S. Department of Justice expands the definition of cyber-crime to include any illegal activity that uses a computer for the storage of evidence. The growing list of cyber-crimes includes crimes that have been made possible by computers, such as network intrusions and the dissemination of computer viruses, as well as computer-based variations of existing crimes, such as identity theft, stalking, bullying and terrorism which have become as major problem to people and nations. Usually in common man’s language cyber-crime may be defined as crime committed using a computer and the internet to steel a person’s identity or sell contraband or stalk victims or disrupt operations with malevolent programs.
Cyber security
The technique of protecting internet-connected systems such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity. We can divide cybersecurity into two parts one is cyber, and the other is security. Cyber refers to the technology that includes systems, networks, programs, and data. And security is concerned with the protection of systems, networks, applications, and information. In some cases, it is also called electronic information security or information technology security.
Research methodology:
The interactive structure of the financial environment will be a direct impact on one aspect of the institution’s infrastructure and the sensibilities of the financial sector to cybercrimes, in particular attacks on Denial-of-Services. In order to secure all the confidential information from falling into wrong hands, the finance sector should continually track and innovate its systems. The banking sector has always been the leading player in implementing safety systems and behaviour and has also been the leading cyber security investment sector.
Review of literature
Mohsin, M.; Anwar et al, [1] Whether the established techniques of feature models can be
implemented or adapted for cyber security is the challenge in the fields of cyber security. In an
approach is proposed in order to enhance the production and the derivative products of safe software product lines (SPLs).
Veeona Upadhyay [2] The wizard asks the user to add “labels” of privacy to select friends, and he uses this feedback to create a classifier using the machine learning pattern, which can be used to allocate privileges to the other user friends automatically. The insight for the design stems from the observation that actual users understand their privacy habits and that friend can see which details they use and reproduce in other friends’ settings, based on an implicit set of rules.
Kutub Thakur [3] Cyber security was used interchangeably for the security of knowledge, were later it sees the human’s role in the safety process, although formerly finding this an additional dimension. However, such a debate on cyber safety has major consequences, since it reflects on the ethical part of the whole society. Various systems and models have been developed to solve the problem of cyber security.
Cyber Security Techniques:
Cyber-attacks on cyberspace can grow by capitalizing on new techniques. Cybercriminals will most frequently change the current malware signatures to take advantage of new technical faults. In other instances, they actually search for special features of emerging technology to detect weaknesses in malware injection. Cyber criminals are taking advantage of emerging Internet technology and millions and billions of active users to access a huge amount of people easily and effectively using these new technologies.
Access Control and Password Security: Security provided by the means of username and password is a simple way of providing security for the private information to preserve privacy. This means of providing security is one of the most critical cyber security initiatives.
Authentication of Data: Until the transmitted information needs to be attested that it has come from a reputable supply that was not changed. These documents are often authenticated using a gift from the opposing virus software package inside computers. An honestly opposed virus software package is more essential to protect devices from viruses.
Malware Scanners: A software system which sometimes scans all files and documents for malicious code or harmful viruses inside the system. The samples of malicious software systems in this field are generally sorting and noted as malware by viruses, worms, and the Trojan horses.
Firewall: Firewall is a software or hardware package which helps separate hackers, viruses and worms trying to access your PC through the web. The firewall checks all messages that come in and blocks those that fail to meet the security requirements compatible with all messages. Firewalls plays a very vital role in malware detection.
Role of Social Media in Cyber Security:
In recent modern world, there is a need of interactive businesses which needs to find new ways to secure personal information in more entangled environment. Social media has important role to play in cyber security and in personal cyber-attacks. Adoption of social media among employees is growing and threat of attack is therefore increasing since most of them nearly use social media or social networking sites everyday it is now a massive forum for cyber criminals to hack private information and steal valued information. In recent days, it’s very easy to share personal information easily and businesses must make sure that recognise, react in real time and prevent breaches of any kind as quickly as possible. These social media have easily made people to share their private information and hackers can use this information. therefore, people have to take reasonable steps to avoid misuse and loss of their information through these social media.
Recent Survey Issues on Cyber Security Trends
Cyber Security concerns the awareness concerning various cyber threats and the implementation of defence policies (i.e. countermeasures) to safeguard confidentiality, credibility and availability of digital or IT technologies Many cyber security experts consider Malware is the main option for malicious arms to violate the cyber protection efforts of cyberspace. Malware is the widespread class of attacks loaded upon a device, generally without the knowledge of the rightful owner. Like viruses, worms, Trojan horses, spyware and bot executable, malware infects computers in several ways for example propagating from infected devices, trick users into opening tactile file or enticing users to visit websites of malware spreading. Malware could load itself into a USB drive inserted into an infected computer in more concrete cases of malware infection, and then infect any machine into which the computer is then inserted. Malware can spread from the embedded systems and computational logic of devices and equipment. Malware can be introduced in the device life cycle at any time. The victim of malware may vary from end-users, servers and network devices (e.g. routers, switching, etc.) to process control systems like the SCADA. The increase in the number of malware and its complexity are today a major concern in the Internet.
Phishing Attacks: According to Verizon’s latest data violation survey, 32% of the data violations confirmed were attributable to phenomena. The purpose of the assaults is to collect confidential information such as usernames, passwords, the social security numbers and card details by duplicating the victims into believing they connect with a trustworthy person, by either email or by text, and increasingly by means of telephone.
Io Ransomware:
The internet of things contains several devices, i.e. home equipment and service sensors, which are connected to the network. Climate control devices and refrigerators do not often contain confidential information through their own devices; they may be kept as hostages and are possible targets for hackers to access information in backend systems such as those in power supplies and communication facilities.
Increased Data Privacy Regulation:
The General Data Protection Regulations for Europe (GDPR) was introduced in May 2018 to
strengthen European citizens’ rights of data privacy and to implement compliance with more rigorous global regulations or severe financial penalties for non-compliance.
Cyber Attacks on Mobile Devices:
Recent RSA research has concluded that in 2018 “80% of fraudulent mobile transactions “have risen exponentially with mobile app fraud since 2015 with mobile devices touching each part of our life and working life, their risk perceptions also grow higher.
Increased Investment in Automation:
Automation technology is gaining ground in organisations by allowing underemployed cyber security teams to focus on more complex problems, not on routine, often worldly work According to a recent phenomenon Institute survey, 79% of respondents use security automation tools and frameworks and 50% expect to use security automation in their businesses. In these situations, the first approach to data protection provides an ultimate defence against Cyber-attacks such as database fraud and fitness, and its profound effect on a business. It may enhance efficiency, but skills and expertise are still necessary to minimize cyber security risk.
Preventive measures to avoid Cybercrimes:
The five latest emerging trends in cyber security
1. Cyber security skills and organizations are also changing.
2. Protection in the cloud is a top priority.
3. Shift your attention from security and prevention
4. Production centres manage the application and data protection.
Next generation safety digital environments can only determine cybercrime through technological measures; capacity building, organizational structure and global collaboration, along with legislative steps, were also required.
SUGGESTIONS
- Never open connections or associations in messages from obscure senders. Messages distinguished as sent by somebody you trust are perhaps the most mainstream ways for organizations and users to be exposed to malware and viruses
- Just make sure your gadgets are up to date. Fundamental security fixes are remembered for programming refreshes. Digital hoodlums can likewise target old PCs that aren’t running the most modern security programming.
- Back up your documents consistently for added security on account of a digital protection penetrate. On the off chance that you need to clean your PC off due to cyber-attack, having your records in a safe, separate area would help.
CONCLUSION
This paper concludes that the cyber-crime has significant consequences for national and economic security. It is pervasive, violent, ubiquitous and increasingly sophisticated. There are significant risks for many industry agencies, public and private organization’s (especially critical infrastructure) for companies and governments alike, it will be necessary for future growth, innovation and competitive advantage to have a cyber-security role in all its components. Every New Year, the security of data, continues to differ from cybercrime by entirely different methods. The newest and most turbulent innovations, along with emerging cyber techniques and regular attacks, are difficult organisations that not only protect their infrastructure but also need new channels and intelligence. However, we do have to do our hardest to attenuate cybercrime so that we can have a healthy and stable future in cyber houses. The technologies of stable Internet and efficient systems of the next century have been proposed as important research fields for the future. The advancement of global identity management and monitoring techniques to monitor opponents have also become an important issue in the future.
The enormous increase in Internet access and the progress of Internet-enabled devices, the rising numbers of the population and wide spread use of the Internet, frequently showing highly sensitive personal data with little realization of the implications of information leakage.
- We speculate that concerns relating to end user confidentiality will rise in line with the increasing amount of knowledge accessible on the internet in the future.
- Furthermore, usability issues are becoming ever more relevant as a way of intuitively learning about and using end-user-oriented protection mechanisms without complicating or profound learning curves to secure the data. Cyber safety practice in the community is built up with innovative patches that rectify existing security and confidentiality problems and move on to them.
- Some believe that this revolutionary strategy has failed and will be unable to fulfil future requirements, because the original Internet has been invented in a somewhat different context from how it is used today. An approach to “thinking beyond” is suggested to make better use of the increasingly-demands of the future without referring to the existing computing system and future, but to start again.
REFERENCE
- https://www.academia.edu/53606464/IRJET_A_STUDY_OF_CYBER_SECURITY_CHALLENGES_AND_ITS_EMERGING_TRENDS_ON_LATEST_TECHNOLOGIES?hb-sb-sw=59079666
- https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emerging_Trends_On_Latest_Technologies
- Ravi Sharma Study of Latest Emerging Trends on Cyber Security and its challenges to Society
International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012
1ISSN 2229-5518.
NAME: KIRTI RAJ
COLLEGE /UNIVERSITY: SRT CAMPUS, HNBGU, TEHRI, UTTRAKHAND 249199
EMAIL: KIRIRAJ7909@GMAIL.COM
