Challaenges in Cybercrime

DOI : 10.17577/IJERTCONV3IS28017

Download Full-Text PDF Cite this Publication

Text Only Version

Challaenges in Cybercrime

Anju Jose Fifth Semester BCA Carmel college, mala

Krishna Priya P B Fifth Semester BCA Carmel college, mala

Abstract- As we all know the cyber crime has been one of the common practices made by the computer experts.In this paper we include the challenges which are faced by cyber crime. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crime is the activities made by the people for destroying organization network, stealing others valuable data documents hacking the bank account and transferring money to their own and so on .Our paper gives detailed information regarding cyber crime and its types, prevention of security and how far it will affect the user.

Keywords – Types of cybercrime, cyber criminals, security issues of cybercrime, security of cybercrimes, investigation challenges in cyber crime


    The internet in India is growing rapidly. It has given rise to new opportunities in every field. Cyber crime is an evil having its origin in the growing dependence on computer in modern life. Cyber crime or computer crime is any crime that involves a computer and a network.. There are different types of cyber crime. The term cyber crime can refers to offenses including criminal activities against data,, infringement of content and copyright, fraud, unauthorized access, child pornography and cyber-stalking. Crime is a social and economic phenomenon and is as old as the human society. A crime may be said to be any conduct accomplished by act or omission prohibited by law and consequential breach of which is visited by penal consequences.


    There are different types of cyber crime

    1. Hacking

      The tremendous growth of internet by business and individuals has been accompanied by internet security problems and breaches. The problem to the internet mainly comes from hackers who use the latest technology and their skills to break even the most the most secured computer system.

      Fig. 1. Types of Cybercrime

    2. E-mail bombing:

      E-mail bombing involves sending several thousand identical messages to an electronic mailbox in order to overflow it .E-mails are stored on a messaging server until they are picked up by the owner of the messaging account. In this case, when the owner collects his mail, the later will take way too much time and the mailbox will become unusable

    3. Salami attacks:

      This kind of crime is normally common in the financial institution or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.

    4. Information Theft:

      Information theft is a crime. It refers of crime in which someone wrongly obtains and uses another persons personal data in some way that involves fraud or deception, typically for economic gain. Personal data such as bank account or credit cards number or such other valuable personal information can be used at your expense, if they fall into the wrong hands. Victims may not only loss their money but also seriously hamper their financial reputation.

    5. Denial of service attack:

      Denial of service(DOS)attack is an attempt to make a machine or interrupt or suspend services of a host connected to the internet.

    6. Trojan attack:

      Trojan horse or Trojan in computing is any malicious computer program which misrepresents itself as useful routine or interesting in order to persuade a victim to install it.


    The cyber criminals belong to different groups. This categorization has made on the basis of the object that they have in their mind in committing crime. The following are the different types of cyber criminals.

      • Children and adolescents between the age group of 6-18 years

      • Organized hackers.

      • Professional hackers/crackers.

      • Discontented employees


    Data stored in electronic form faces number of threads than in manual form .These threats may take various forms such as technical organizational and environmental factors along with poor management decisions.Advancements in telecommunication system and networking help organizations to interconnect different computers installed at different geographical locations.Such interconnection facilities between the computers allow unauthorized access,abuse or fraud at any point in the network

    .Internet,the gigantic from the network ,creates some additional problems because it is exclusively designed to access easily by people from different computer system. In India the numbers of cyber crimes are increasing.

    Fig. 2. Number of Cyber Crime Cases in India

    Cyber security issues which occur in environment,

      • Explosion of computer and broadband internet availability (over a billion internet users today).

      • Low priority of security for software developers

      • Challenges of timely patching vulnerabilities on all systems.

      • Graphical user interface (GUI) based tools that exploit known software vulnerabilities.


    Internet security is a branch of computer security specifically related to the internet .security refers to policies ,procedures and technical measures and to prevent unauthorized access, alteration, theft or physical damage to information systems .Its objective is to establish rules and measure to use against attacks over the internet. The tips for cyber security are as follows:

      • Use antivirus softwares

      • Insert firewalls.

      • Uninstall unnecessary software

      • Maintain backup

      • Check security settings

      • Stay anonymous-choose a genderless screen name.

      • Never give your full name or addresses to strangers.

      • Learn more about internet privacy.


    Cyber crime is one of the evil threat that surround us in this world of modern technology .Prevention is always better than cure .It is also better to take certain precaution while operating the net .The 5P mantra for online security are :precaution,prevention ,protection,preservation and perseverance.A netizen should keep in mind the following things

      • One should avoid disclosing any personal information to strangers via e-mail or while chatting or any social networking site.

      • One must avoid sending any photographs to strangers by online as misusing or modification of photograph incidents increasing day by day

      • Updated anti-virus software to guard against virus attacks should be used by all the netizen.

      • A person should never send his credit card or debit card number to any site that is not secured, to guard against frauds.


The investigation of cyber crime is more complex. The evidence is often in an intangible form .The increased use of internet has added to this complexity.It is possible for a person sitting in India to steal a computer resource in Australia using a computer situated in south Africa as a launch paid for his attack.The challenges in such cases are not only technical, but also jurisdictional.Cyber crime being technology driven evolves continuously and ingeniously making it difficult for investigator to cope up with changes.


I can be seen that the threat of cyber crime is not a big as the authority clime .as someone rightly said that bytes are replacing bullets in the crime work .The growth of cyber crime in India as all over the world, is on the rise and

the curb its scope and complexity is the pertinent need today .Indias profile and wealth have riser enormously in the world due to the constructive use of the information technology .At the same time ,India ranks fifth in the world for the cyber crime according to your report last year by the US based internet crime complaint sender, a partnership between the federal bureau of investigation and the national white collar crime sender even under the IT ACT, investigation in India are not easy.

To sum up, India needs a good combination of laws and technology in harmony with the laws of other countries and keeping in mind common security stands. In the era of e- governance and e-commerce a lack of common security stands can create have for global trade as well as milliard matter.


We are thankful to Sr. SmittyVIsidhore head of the department of computer science for providing us such a nice work environment. We are thankful for miss. Hima Asst. Professor, dept of computer science for her help. I would also like to express my heartful gratitude or the sincere help, support and encouragement of my friends of my college. I am also very thankful to my parents and family members.



  2. General informatics dr Abdul AssisKoroth



Leave a Reply