2022
DOI: 10.31185/wjcm.48
|View full text |Cite
|
Sign up to set email alerts
|

A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies

Sahar Khadim,
Oday Ali Hassen,
Hussein Ibrahim

Abstract: There is no doubting that contemporary technology creates new hazards, and these threats are many and significant, directly harming people's lives and threatening their stability. Because of the increased use of computers and Internet-connected cellphones in recent years, the problem of cybercrime has expanded substantially. Unquestionably, this kind of crime is now a reality that jeopardizes people's reputations and lives, therefore we must be aware of it to prevent being a victim. The exponential growth in i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 71 publications
(124 reference statements)
0
2
0
Order By: Relevance
“…Among the problems PaaS encounters are interoperability, privacy, authorization, host sensitivity, extensibility, and reliability. However, SaaS security issues include dependability, data security, authorization, authentication, and network monitoring [8][9][10][11][12][13]. These security issues need to be taken seriously by cloud providers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Among the problems PaaS encounters are interoperability, privacy, authorization, host sensitivity, extensibility, and reliability. However, SaaS security issues include dependability, data security, authorization, authentication, and network monitoring [8][9][10][11][12][13]. These security issues need to be taken seriously by cloud providers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Nevertheless, browsers are not immune from vulnerabilities [116], [117]. As a result of these vulnerabilities, attackers often gain access to a victim's computer, steal PII, corrupt files, or use the hacked machine to attack others, potentially becoming a part of a botnet [118].…”
Section: ) the Cloud Layermentioning
confidence: 99%