2018
DOI: 10.1155/2018/1798659
|View full text |Cite
|
Sign up to set email alerts
|

Cybercrimes: A Proposed Taxonomy and Challenges

Abstract: Cybersecurity is one of the most important concepts of cyberworld which provides protection to the cyberspace from various types of cybercrimes. This paper provides an updated survey of cybersecurity. We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of cybersecurity. We have proposed a new taxonomy of cybercrime which can cover all types of cyberattacks. We have analyzed various cyberattacks as per the updated cybe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(41 citation statements)
references
References 23 publications
0
41
0
Order By: Relevance
“…The method involves usage of unethical techniques of persuasion so an unsuspecting user downloads malware directing them to search engine pages of fake websites. In addition, the attackers may further exploit social networking platforms using fake profiles, message links, malicious URLs and application to launch an attack [37,44,49,50].…”
Section: Fig 2: Mechanism Of Social Engineering Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…The method involves usage of unethical techniques of persuasion so an unsuspecting user downloads malware directing them to search engine pages of fake websites. In addition, the attackers may further exploit social networking platforms using fake profiles, message links, malicious URLs and application to launch an attack [37,44,49,50].…”
Section: Fig 2: Mechanism Of Social Engineering Attacksmentioning
confidence: 99%
“…Social engineering exploits also include their ability to disguise malicious traffic payloads, making them look legitimate. With a large amount of data flowing through the networks, distinguishing between the traffic payloads becomes difficult [35,50,52].…”
Section: Network Infrastructurementioning
confidence: 99%
See 1 more Smart Citation
“…[1]. However, the association of chief police officers of England (ACPO) and the U.S Department of Justice (DOJ) define cybercrime as any crime committed by any electronic computing devices [2][3][4]. Likewise, CERT-In and CERT-US are providing services to the users by prior notifications on the list of vulnerabilities that causes them to become victims of the cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The terms 'computer crime' and 'cybercrime' are intertwined; their entities are intertwined and therefore difficult to disentangle (Ibrahim, 2016). The most common targets of cyber-attackers are: entertainment, hacktivism, financial gain, spying and revenge (Singh Brar and Kumar, 2018). According to the literature analyzed the term cybercrime includes all unlawful attacks and threats to attack computers, networks and information stored in them for the purpose of causing financial and non-financial harm to persons, the economy and society.…”
Section: Introductionmentioning
confidence: 99%