Open Access Open Access  Restricted Access Subscription Access

Short Communication Downloading a File Effective Path for Previous

Nikhil Rajput, Dhaval Chudasama

Abstract


The internet is complete of data and the entirety is withinside the sun. Therefore, humans generally tend to down load one or materials. However, now that cyber protection is a pinnacle priority, it's miles very vital to pay near interest to what you're surfing the Internet. You want to exercise exact behavior to defend your non-public data. Always download new software or apps directly from the website that hosts these files. However, if you do not pay close attention to the location from which the file was downloaded, you will be vulnerable to hacking. I don't know what will happen because even trusted platforms can be hacked.


Keywords


Cyber security, Cybercrime, Social media, Global Risks, cyberspace.

Full Text:

PDF

References


https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emerging_Trends_On_Latest_Techologies

Thomas W. Edgar, David O. Manz. Research Methods for Cyber Security. Cyber Security Research. 2017. Available from https://www.sciencedirect.com/topics/computer-science/cyber-security-research

Abhishek Shah, Dhaval Chudasama. Investigating Various Approaches and Ways to Detect Cybercrime. Journal of Network Security. 2021; 9 (2): 12–20.

V Bhuse, A Gupta, A Al-Fuqaha. Detection of masquerade attacks on wireless sensor networks. 2007 IEEE International Conference on Communications. Glasgow, UK. 2007, June 24–28. 15.

Kaspersky. Tips on how to protect yourself against cybercrime [Online]. Available from https://www.kaspersky.co.in/resource-center/threats/what-is-cybercrime

J Balkin, J Grimmelmann, et al. Cybercrime: Digital cops in a networked environment. Journal of Information Privacy and Security. 2007; 3 (1): 65–66.

FBI. Common scams and crimes [Online] Available from https://www.fbi.gov/scams-andsafety/common-scams-and-crimes.

Blackhawk Intelligence. How to identify cybercrime [Online] Available from: https://www. blackhawkintelligence.com/forensic-services/digital-forensics/cyber-crime-digitalforensics-1/iden tify-cyber-crime-1/.

Us Norton. 11 ways to help protect yourself against cybercrime [Online]. Available from: https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-yourself-fromcybercrime.html.

Soham Shah, M a Lokhandwala, and DM Chudasama. Decoding Farm Laws. International Journal of Scientific Research and Engineering Development. 2021; 4 (2): 590–595.

Nihal Gulammahiyuddin Shaikh, Dhaval Chudasama. Research on cyber offenses under Information Technology Act, 2000. Recent Trends in Parallel Computing. 2021; 8 (1): 14–20.

Raj Singh Deora, Dhaval Chudasama. Brief study of cybercrime on an internet. Journal of Communication Engineering & Systems. 2021; 11 (1): 1–6




DOI: https://doi.org/10.37591/joces.v11i3.867

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Communication Engineering & Systems