Sarvesh Tanwar, T. Paul, Kanwarpreet Singh, Mannat Joshi, A. Rana
{"title":"印度网络威胁的分类和影响:综述","authors":"Sarvesh Tanwar, T. Paul, Kanwarpreet Singh, Mannat Joshi, A. Rana","doi":"10.1109/ICRITO48877.2020.9198024","DOIUrl":null,"url":null,"abstract":"Due to rapid flaring criminal activities and offences in the cyber world, a deep and detailed research and study on this grave matter was very necessary. This research paper brings attention to this serious issue which is only increasing with time. The paper describes various crimes and potential threats a user might face on the internet and in the cyber world which can cause loss of sensitive or important data and even put the device in dangerous and risky situations. With graphs and pie charts, the paper throws light on the cyber-crime statistics which shouldn’t be ignored. This paper compares data and information with previously written research papers on this matter.","PeriodicalId":141265,"journal":{"name":"2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Classification and Imapct of Cyber Threats in India: A review\",\"authors\":\"Sarvesh Tanwar, T. Paul, Kanwarpreet Singh, Mannat Joshi, A. Rana\",\"doi\":\"10.1109/ICRITO48877.2020.9198024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to rapid flaring criminal activities and offences in the cyber world, a deep and detailed research and study on this grave matter was very necessary. This research paper brings attention to this serious issue which is only increasing with time. The paper describes various crimes and potential threats a user might face on the internet and in the cyber world which can cause loss of sensitive or important data and even put the device in dangerous and risky situations. With graphs and pie charts, the paper throws light on the cyber-crime statistics which shouldn’t be ignored. This paper compares data and information with previously written research papers on this matter.\",\"PeriodicalId\":141265,\"journal\":{\"name\":\"2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO48877.2020.9198024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO48877.2020.9198024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Classification and Imapct of Cyber Threats in India: A review
Due to rapid flaring criminal activities and offences in the cyber world, a deep and detailed research and study on this grave matter was very necessary. This research paper brings attention to this serious issue which is only increasing with time. The paper describes various crimes and potential threats a user might face on the internet and in the cyber world which can cause loss of sensitive or important data and even put the device in dangerous and risky situations. With graphs and pie charts, the paper throws light on the cyber-crime statistics which shouldn’t be ignored. This paper compares data and information with previously written research papers on this matter.