*Assistant Professor,
**Ph.D. Scholar,
An organization does not want unauthorized persons accessing its information or information belonging to others who share its system. Therefore it wants to protect its system from malicious or unintentional actions that could destroy stored information or halt its system. It doesn't want others masquerading as itself. The organization needs to be concerned about the security of other systems so it can have some faith in the information it retrieves from those systems, and so it can conduct business transactions. A lack of security results in damage, theft, and what may be worse in some cases, a lack of confidence or trust. Computer crime is the threat caused by the criminal or irresponsible actions of computer users who are taking advantage of the widespread of computer networks in our society. It thus presents a major challenge to the ethical use of IT. A few case studies are presented below to highlight the vulnerability of web services at the hands of attackers.Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.An important aspect of information security and risk management is recognizing the value of information and defining appropriate procedures and protection requirements for the information. Effective controls provide information system security, i.e., the accuracy, integrity, and safety of information system activities and resources.
Cyber crime, Case studies, Internetworking, Information security, Web security, Control