Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Review Of Literature:

Cybercrime is an escalating information technology concern in the 21st century, and this
three-volume reference work provides broad coverage of the subject, along with details about
specific technologies and issues. Divided into eight topical sections ranging from
fundamental concepts and current tools to organizational, social, and managerial impacts to
emerging trends, the 102 chapters are all written by academic experts. Technical illustrations
augment the chapters, which frequently include a glossary of key terms along with
recommended reading thus supporting the research needs of both undergraduate and
graduate students.
Changes in technology have resulted in corresponding changes in white-collar crime in the
United States during the past two decades years. Computer crime was rare twenty years ago,
primarily because there were fewer computers. Personal computers were not invented, midrange computers were becoming more affordable and popular. Computer technology,
performance and capacity have changed drastically.

Computers are becoming more

accessible. With the advent of less expensive personal computers and the popularity of using
telecommunications to access other computers via high-speed modems, society is faced with
the challenge of computer crime and abuse. This literature review focuses on computer
security, crime and abuse. The area of IBM AS/400 security is of special interest.

Abstract:
Cyber law enforcement effectiveness is one of the instruments that can be used to evaluate
the effect and performance of the initial goals and objective from UU ITE implementation.
The question might arise regarding the effectiveness of UU ITE 11/2008 after being signed
by legislative. Do the existing control sufficient to limit any possibility of damages to occur?
And what kind of strategies has been performed to support the cyber law enforcement.
Understanding the implication of the cyber law enforcement in the cyber communities will
depict how well the strategy has accomplished.

Research

Cyber Security
Cyber security is a research area that crosses multiple research areas, including Information
Security, in particular for critical systems and end-users, or Identity & Privacy, where the
strong identification provides a trust root and privacy the safeguards for citizens. Our cyber
security research focuses mostly on combating cybercrime and protecting the social fabric.
Cybercrime is a composition of crime and cyberspace.

Crime
The crime component implies the presence of a perpetrator, an adversary whose actions are
harmful or costly for society. Crime also implies the involvement of a physical entity, for
instance the victim or the capitalization in physical money, which implies in turn that there is
no cybercrime entirely in cyberspace, in which we follow the defenition of Benenson et al.
[Benenson2011]. There are always human beings that act or are acted upon, which raises the
question of human factors in security.

Cyberspace
The cyberspace component implies that there is a cyber element present, where the most
likely case may be hurt done by cyber means. Cyberspace may be the medium for the
crime or be used by the perpetrator to gain more scalability. Newman [Newman2009]
categorizes the role of cyberspace into tool, target or place for the crime.

Research Areas
In Newcastle, we research security against cybercrime, organized in the CCCS, along four
themes:

Understanding cyber adversaries and their attack vectors.

Protecting critical infrastructures, such as the cloud or the identity infrastructure, and
increasing the dependability and security of systems.

Supporting investigators,

Protecting victims, for instance with privacy tools.

The Role of Human Factors


Human decision making impacts cyber security, this is part of the research hypothesis of the
Cyber Security Research Institute on Choice Architecture for Information Security. We
believe that human users, e.g., victims in a cybercrime, are affected by decision biases, even
if they are supported by rigorous decision making methods. Our work aims at integrating
human factors in cyber security work.

HYPOTHESIS:
begin by eliminating the obvious. There will be a lot of chaos around a crime scene and try to
focus on meaningful information immediately. Also, many observers will have theories
which can serve to confuse the important issues, making your job as an investigator much
more difficult. A piece of eliminating the obvious is to ensure that nothing can happen to
pollute the crime scene. It is at this point you need to take steps to secure the crime scene so
that you can gather evidence and preserve it correctly. next step is to begin the process of
hypothesizing how the attack took place. Use preliminary information gathered to develop an
early theory of what happened and how it occurred. Its too early, in most cases, to start

thinking about a culprit at this point. Begin with process of evidence collection. proceed as
carefully as possible. As the evidence collect should help refine the intrusion hypothesis. It
will also lead to alternative explanations, which must analyze as well.
Begin your incident analysis by attempting to reconstruct the crime. The field of computer
incident investigation is one of the few today where we can reconstruct the crime.
Incident analysis has three major objectives:
1. Refining your hypothesis
2. Examining alternative explanations
3. Generating additional leads for further investigation
Next, perform any tracebacks that our analysis suggests. Tracebacks, are very difficult and
time-consuming. Dont even attempt a traceback unless the intruder is online, or you have
preserved your evidence and can proceed safely to trace the intruder without damaging
evidence. Remember, when you obtain assistance from intermediate sites (those between the
victim and the original source of the attack), you must take steps to ensure that the evidence
you collect from them will stand up to scrutiny. The final phase is performing a detailed
analysis of the source, intermediate, and victim computers. Perform analysis on images of
these computers. Our objective is to collect more evidence.
Evidence analysis and report preparation. This is where you will collect all of your findings
and evidence, refine and document your hypothesis, and present the whole package to your
management, client, or, perhaps, law enforcement. This is very important because your
audience is likely to try to shoot down your conclusions. Neither your management or law
enforcement wants to proceed with an investigation, litigation, and/or prosecution based upon
a weak conclusions unsupported by strong evidence.

QUESTIONNAIRE
However, some common questions include:
1. Have you ever gotten an e-mail that you were certain of being spam?
2. If yes, what did you do about the spam e-mail?
3. Have you met any person whom you encountered only in a chat room?
4. Has your identity ever been stolen? Or, do you know anyone who has suffered from
identity theft online?
5. Has your PC ever been infected by a computer virus that damaged your PC components
or stored data considerably?
6. Have you ever received any e-mail that advertised child pornography?
7. Do you feel like your PC has ever been hacked?
8. Have you ever had any problem with any online merchant account?
9. Do you feel like there is any other type of cybercrime that has not been covered in this
questionnaire?
10. Do you feel like you are well protected against cybercrimes?
11. Are you male or female?
Are you male or female? Male
Female

12. Age:

12.
13. Age:
14. *
15. How often do you use the Internet?
How often do you use the Internet? Everyday
Two to three days a week
Once a week
Twice a month
Once a month
Never
16.
16. Are you aware of the RA 10175 also called as "The Cybercrime Prevention Act of 2012"?
Are you aware of the RA 10175 also called as "The Cybercrime Prevention Act of
2012"? Yes
No
17. Have you read the RA 10175 "The Cybercrime Prevention Act of 2012"?
Have you read the RA 10175 "The Cybercrime Prevention Act of 2012"? Yes
No
18. Did you understand the full context and objectives of the RA 10175 "The Cybercrime
Prevention Act of 2012"?
Did you understand the full context and objectives of the RA 10175 "The Cybercrime
Prevention Act of 2012"? Yes
No
Kind of
19. Are you for or against the law?

Are you for or against the law? For the law


Against the law
20. *
21. 8. Is there something you wish to change with the law?
Is there something you wish to change with the law? Yes
No
22. *
23. 9. If yes, do you wish to change some provisions of the said law?
If yes, do you wish to change some provisions of the said law? Yes
No
24. *
25. 10. If yes, what parts do you particularly want to change or to amend?
If yes, what parts do you particularly want to change or to amend? Libel Clause
Penalties
Both
Other (please specify)

Summary
In this paper, the three main categories of cybercrime are introduced.: (1) target cybercrime:
crimes in which a computer is the target of the offense. In this category, three main target
cybercrimes are presented, including hacking, malware and DDoS attack. Actually, target
cybercrime is the most professional crime on cyberspace. The defense of target cybercrime
always has time lag, since we always take actions to patch an exploit after a novel method is
revealed. In other words, the active defense is difficult. (2) tool cybercrime: crime in which a
computer is used as a tool in committing the offense. In this category, crime against property,

including theft, fraud and extortion, and crime against persons, including physical harm and
psychological harm are examined. (3) computer incidental: crimes in which a computer plays
a minor role in committing the offense. In this category, the challenges for collecting the
evidence are presented, which include evidentiary challenge and digital privacy. In all,
cybercrime is a new type of crime, compared with traditional crimes, but the harm caused by
the former is not less than the latter. Thus, we hope people obtain a general concept of
cybercrime so that protect our cyber-security better from now.

Conclusion
Cyber crime and digital crime is increasing rapidly. Is difficult for law enforcement to battle
and helping the professions to treat both the victims and the offenders. Hoping that in near
+future the government will come out with some rules and law to combat these cyber threat.
Train more forensics specialist and getting other countries onboard would also increase the
security. Promote cyber security globally and helping other nations become more cyber
secure.

You might also like