ACADEMICIA: An International Multidisciplinary Research Journal
  • Year: 2012
  • Volume: 2
  • Issue: 8

Cyber crime and web security

  • Author:
  • S. Kanchanaratnam, T.T. Rajkumar
  • Total Page Count: 9
  • Page Number: 302 to 310

*Assistant Professor, Department of Public Administration Presidency College, Chennai-600005, Tamilnadu, India.

**Ph.D. Scholar, Department of Public Administration Presidency College, Chennai-600005, Tamilnadu, India.

Online published on 6 August, 2012.

Abstract

An organization does not want unauthorized persons accessing its information or information belonging to others who share its system. Therefore it wants to protect its system from malicious or unintentional actions that could destroy stored information or halt its system. It doesn't want others masquerading as itself. The organization needs to be concerned about the security of other systems so it can have some faith in the information it retrieves from those systems, and so it can conduct business transactions. A lack of security results in damage, theft, and what may be worse in some cases, a lack of confidence or trust. Computer crime is the threat caused by the criminal or irresponsible actions of computer users who are taking advantage of the widespread of computer networks in our society. It thus presents a major challenge to the ethical use of IT. A few case studies are presented below to highlight the vulnerability of web services at the hands of attackers.Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.An important aspect of information security and risk management is recognizing the value of information and defining appropriate procedures and protection requirements for the information. Effective controls provide information system security, i.e., the accuracy, integrity, and safety of information system activities and resources.

Keywords

Cyber crime, Case studies, Internetworking, Information security, Web security, Control