Protecting Ourselves From Digital Crimes
Protecting Ourselves From Digital Crimes
National Journal of
DOI (Journal): 10.37591/NJCSL
Research NJCSL
Keywords: Digital Crime, Cyber Security, Honey pots, Trip wires, Anomaly location, Case Study,
Regulation Acts, Online security tips.
INTRODUCTION
“Ever since men began to change their lives by using technology they need found themselves
during a series of technological traps”. One of the most effective examples for technological trap is
cyber crime. Cyber crime also referred as computer crimes, electronic crimes or e crimes. “Cyber “is
brief for “cyber space”. The electronic medium of network. In which online communication takes
place. “Cyber crime is considered computer-mediated activities which are either illegal or considered
illicit by certain parties and which may be conducted through global electronic networks. Cybercrimes
describe criminal activity within which the pc or network could be a necessary part of the crime”.
Cyber crime was broken into two categories and defined thus [1–3]
1. Cybercrime in a very narrow sense (computer crime): Any illegal behavior directed by means
of electronic operations that targets the protection of computer systems and the data processed
by them.
2. Cybercrime in an exceedingly broader sense (computer-related crime): Any illegal behavior
committed by means of, or in reference to, an ADPS or network, including such crimes as
criminal possession and offering or distributing information by means of a system or network
[1–3]
common in our contemporary world. While these issues don't carry potential monetary loss, they're
even as harmful in the possibility of losing files, information and access to your computer. This is
often why Cyber Security is required. Cyber security means protecting information, equipment,
devices, computer, computer resources, communication device and knowledge stored therein from
unauthorized access, use, disclosure disruption, modification or destruction [4, 5] Preventive measures
to curb cyber crimes are illustrated in Table 2.
Tripwires: Snooping
Tripwires are software programs that take snapshots of key system characteristics which may be used
to detect critical file changes. In this regard, tripwires provide evidence of electronic crimes because
most of the intruding hackers make modifications after they install backdoor entry points or alter
classification system and directory characteristics unknowingly while snooping [6].
patterns of system miss configuration that may be malicious in nature. Admittedly further
investigations are going to be necessary to determine if a system miss configuration is an electronic
crime [7].
Honey Pots
Honey pots or Honey pot lures are employed to entrap and keep an electronic criminal occupied
long enough to permit for identification and even apprehension of the preparatory. These lures are
often bogus system administration accounts, fictitious product or client information, or a myriad of
created files that appear to contain sensitive information. In addition to facilitating perpetrator
identification, honey pots also store the evidence of the electronic crime itself [8].
Package Commands
Intrusion detection is additionally possible through the use of certain package commands, for
instance checking log files and comparing outputs of comparable programs are among the many
manual techniques involving software commands. Typically these commands are used on daily bases
by system administrators to look for evidence suggesting the possibility of electronic crimes [10].
CONCLUSION
The web is integral asset and powerful methods for correspondence yet it is weak very much like
whatever else. To shield against Cyber wrongdoings, interruption recognition strategies ought to be
planned, carried out, and administrated. The best approach to ensure it until further notice is for
everybody to be brilliant and to follow preventive measures, people, foundations, and government the
same should all follow these actions.
REFERENCES
1. Sekgwathe V., Talib M. (2011) Cyber Crime Detection and Protection: Third World Still to Cope-
Up. In: Yonazi J.J., Sedoyeka E., Ariwa E., El-Qawasmeh E. (eds) e-Technologies and Networks
for Development. ICeND 2011. Communications in Computer and Information Science, vol 171.
Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22729-5_15
2. Chawki, M.: Cybercrime in France: an overview. Computer Crime Research Center. (December,
2005) ( accessed, March 13, 2021), http://www.crime-research.org/articles/cybercrime-in-france-
overview/
3. Kratchman, Stanley & Smith, Jacob & Smith, Murphy. (2008). the Perpetration and Prevention of
Cybercrimes.
4. Alansari, Mariam & Aljazzaf, Zainab & Sarfraz, Muhammad. (2019). On Cyber Crimes and
Cyber Security. 10.4018/978-1-5225-8304-2.ch001.
5. National Strategy for Cyberspace Security by S R RAiyengar
6. Gordon, S., Ford, R.: On the definition and classification of cybercrime. Journal of Computer
Virology 2, 13–20 (2006)
7. Four predictions for India’s national cyber security strategy 2020 by GunjanChawla,
SharnganAravindakshan
8. Wall, D.S.: Policing Cybercrime: Situating the public police in networks of security in
cyberspace. Police Practice and Research: An International Journal 8(2) (2007 - forthcoming)
9. D M Chudasama, L K Sharma, N C Solanki, Priyanka Sharma , "A Comparative Study of
Information Systems Auditing in Indian Context", IPASJ International Journal Of Information
Technology (IIJIT) , Volume 7, Issue 4, April 2019, pp. 020-028 , ISSN 2321-5976. UGC
Approved (S. No 45786).
10. D M Chudasama, L. K. Sharma, N. C. Sonlanki, Priyanka Sharma, "Refine Framework of
Information Systems Audits in Indian Context", International Journal of Computer Sciences and
Engineering, Vol.7, Issue.5, pp.331-345, 2019. ISSN: 2347-2693UGC Approved (S. No 63193).
11. D M Chudasama, Kathan Patel, Parshwa Dand, "Awareness of Data Privacy Breach in Society",
International Journal of All Research Education and Scientific Methods (IJARESM), Vol.8,
Issue.10, pp.303-307, 2020. ISSN: 2455-6211UGC Approved.
12. D M Chudasama, Darsh Patel, Abhishek Shah and Nihal Shaikh, “Research on Cybercrime and
its Policing ", American Journal of Computer Science and Engineering Survey, Vol.8, Issue.10,
pp.3-5, 2020. ISSN: 2349-7238.
13. Soham Shah, Mohammed Abiali Lokhandwala, D M Chudasama, "Decoding Farm Laws",
International Journal of Scientific Research and Engineering Development, Vol.4, Issue.2,
pp.590-595, 2020. ISSN: 2581-7175. Impact Factor: 4.999
14. Nihal Gulammahiyuddin Shaikh, Dhaval Chudasama. Research on Cyber Offenses under
Information Technology Act, 2000. Recent Trends in Parallel Computing. 2021; 8(1): 14–20p.