Hacking on Crime with Workable Solution: A Survey

Abstract

The study conducted to investigate the hacking crime & Workable solution. Hacking identifies vulnerabilities in computer systems or networks in order to exploit these vulnerabilities for access. Example of hacking: use of the password hacking algorithm to access a system. Computers have become a prerequisite for the success of a business. It is not enough to have an isolated computer system. They must be networked to facilitate communication with external companies. They must be networked to facilitate communication with external companies. Hacking means using computers to commit fraudulent acts such as fraud breach of privacy, theft of business / personal information, etc. Cybercrime costs many organizations millions of dollars each year. Businesses must protect themselves from such attacks.

Country : India

1 Payal Wade2 Radhika Joshi3 Prof. S. K. Totade

  1. P.G. Student, Final Year MCA, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati (M.S), India
  2. P.G. Student, Final Year MCA, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati (M.S), India
  3. Professor, Final Year MCA, Department of MCA, Vidya Bharati Mahavidyalaya, Amravati (M.S), India

IRJIET, Volume 4, Issue 1, January 2020 pp. 5-8

References

  1. Kharat, Shital Prakash. "Cyber Crime–A Threat to Persons, Property, Government and Societies." (2017).
  2. Cazier, Joseph A., and B. Dawn Medlin. "Password security: An empirical investigation into e-commerce passwords and their crack times." Information Systems Security 15.6 (2006): 45-55.
  3. Zakaras, Matthew R. "International computer crimes." Revue international de droit pénal 72.3 (2001): 813-829.
  4. Ye, Peisong, and Guangxue Yue. "Security Research on WEP of WLAN." Proceedings of the Second International Symposium on Networking and Network Security (ISNNS’10) Jinggangshan, PR China. 2010.
  5. Icove, David, Karl Seger, and William VonStorch. Computer crime: a crimefighter's handbook. California: O'Reilly & Associates, 1995.
  6. Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press, 2011.
  7. Carter, David L. "Computer crime categories: how techno-criminals operate." FBI law enforcement bulletin 64.7 (1995): 21.
  8. Garber, Lee. "Denial-of-service attacks rip the Internet." IEEE Computer 33.4 (2000): 12-17.
  9. Warren, Matthew, and William Hutchinson. "Cyber attacks against supply chain management systems: a short note." International Journal of Physical Distribution & Logistics Management 30.7/8 (2000): 710-716.
  10. Barber, Richard. "Hacking Techniques: The tools that hackers use, and how they are evolving to become more sophisticated." Computer Fraud & Security 2001.3 (2001): 9-12.
  11. Vladimirov, Andrew, Konstantin V. Gravrilenko, and Andrei A. Mikhailovskiy. Wi-Foo: the secrets of wireless hacking. Pearson Education, 2004.