Article Details

To study about the conceptual analysis of cyber-Crime | Original Article

Richa Tiwari*, Ganesh Dubey, in Journal of Advances and Scholarly Researches in Allied Education | Multidisciplinary Academic Research

ABSTRACT:

The majority of economic, commercial, cultural, social, and governmental activities and contacts of nations are now conducted in cyberspace at all levels, including people, non-governmental groups, and government and governmental institutions. Cyber-attacks and the hazards of wireless communication technologies are now a concern for many business organisations and government bodies throughout the world. In today's society, which is largely dependent on electronic technology, protecting data from cyber-attacks is a challenging undertaking. Businesses suffer financial losses as a result of cyber-attacks. In some circumstances, cyber-attacks might be utilised for military or political purposes. PC viruses, knowledge breaks (DDS), and other attack vectors are examples of these damages. To achieve this purpose, a range of tactics for mitigating the impact of cyber-attacks are used by many firms. Cyber security is built on the most up-to-date IT data in real time.Until date, scholars from across the world have proposed a range of strategies for avoiding cyber-attacks or minimising the damage they do. Some of the methods are now in use, while others are still under investigation. The purpose of this study is to look at the challenges, weaknesses, and strengths of the various techniques as well as to evaluate the current state of cyber security.