IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Analysis of the Cyber Crime

Security Analysis of the Cyber Crime
View Sample PDF
Author(s): Ratnesh Kumar Shukla (Shambhunath Institute of Engineering and Technology, India)and Arvind Kumar Tiwari (Kamla Nehru Institute of Technology, Sultanpur, India)
Copyright: 2024
Pages: 15
Source title: The Ethical Frontier of AI and Data Analysis
Source Author(s)/Editor(s): Rajeev Kumar (Moradabad Institute of Technology, India), Ankush Joshi (COER University, Roorkee, India), Hari Om Sharan (Rama University, Kanpur, India), Sheng-Lung Peng (College of Innovative Design and Management, National Taipei University of Business, Taiwan)and Chetan R. Dudhagara (Anand Agricultural University, India)
DOI: 10.4018/979-8-3693-2964-1.ch016

Purchase

View Security Analysis of the Cyber Crime on the publisher's website for pricing and purchasing information.

Abstract

The primary driver of this expansion is the internet user, who is expected to connect 64 billion devices worldwide by 2026. Nearly $20 trillion will be spent on IoT devices, services, and infrastructure, according to Business Insider. Many cybercrimes and vulnerabilities related to cybercrime are committed with the use of data. Asset management, fitness tracking, and smart cities and homes are examples of internet security applications. The average person will most likely own two to six connected internet security devices by the end of the year, a significant increase over the total number of cell phones, desktop computers, and tablets. Although data provides a plethora of opportunities for its users, some have taken advantage of these advantages for illegal purposes. In particular, a great deal of cybercrime is made possible by the gathering, storing, analyzing, and sharing of data as well as the widespread gathering, storing, and distribution of data without the users' knowledge or consent and without the required security and legal protections. Furthermore, because data gathering, analysis, and transfer happen at scales that governments and organisations are unprepared for, there are a plethora of cybersecurity threats. Protection, privacy, and system and network security are all related.

Related Content

N. L. Swathi, Achukutla Kumar. © 2024. 17 pages.
Gurwinder Singh, Anshika Thakur. © 2024. 21 pages.
Ashok Singh Gaur, Hari Om Sharan, Rajeev Kumar. © 2024. 16 pages.
Sabyasachi Pramanik. © 2024. 17 pages.
Geetha Manoharan, Abdul Razak, C. V. Guru Rao, Sunitha Purushottam Ashtikar, M. Nivedha. © 2024. 28 pages.
Roop Kamal, Manpreet Kaur, Jaspreet Kaur, Shivani Malhan. © 2024. 10 pages.
Anu Sharma. © 2024. 8 pages.
Body Bottom