Audit Planning for Investigating Cyber Crimes

Authors

  • Poonia AS Associate Professor, CSE, Govt. College of Engineering and Technology, Bikaner, Rajasthan, India

Keywords:

Information Society, Internet Services, Online Frauds, Hacking, Cyber Crime, Vulnerability

Abstract

The exponential growth of technology into many aspects of everyday life has led to development of the modern concept of information society. This development of the information society offers great opportunities which are accompanied by new threats. Attacks against information infrastructure, Internet services, online fraud and hacking attacks are just some examples of cyber crimes that are committed on a large scale every day and the financial damage caused by cybercrime is enormous. The risks of cyber crime are very real and too threatening to be ignored. Every franchisor and licensor, indeed every business owner, Internet service providers, domain name registries, universities, law enforcement agencies, and other crossindustry stakeholders has to face up to their vulnerability and do something about it. An organized effort toward fighting cyber crime is required. In this paper, an effort has been done in this direction.

References

Roshan, N., What is cyber Crime. Asian School of Cyber Law, 2008: Access at - http://www.http://www.asclonline.comindex.php?title=Rohas_Nagpal,

Govil, J., Ramifications of Cyber Crime and Suggestive Preventive Measures, in International Conference on Electro/Information Technology, 2007 IEEE. 2007: Chicago, IL. p. 610-615.

Poonia. A.S et Al., Ph.D Thesis, “Investigation and Precevtion of Cyber Crime in Context to India”, 2013

B.Middleton (2006) Cyber Crime Investigator‟s Field Guide

Downloads

Published

2024-02-26

How to Cite

Poonia, A. S. (2024). Audit Planning for Investigating Cyber Crimes. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(12), 1421–1424. Retrieved from https://ijact.in/index.php/j/article/view/246

Issue

Section

Original Research Article

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.