many technical reasons behind these crimes. Some technical reasons behind cyber
crimes are as follows:
of reporting and standards
marginal cost of online activity due to global
very few rate of Official investigation and criminal prosecution
of computer to store data in comparatively small space.
in oparetiing systems code
information in online
The threats of cybercrime to the
network security are not only for several organizations, but can be observed
all over the world in
Relative risk of running computer
networks around the worlds are shown bellow:
Name of the Country
Its very alarming for our country also…Now, its
urgent to prevent cyber crime.So we all should try to use proper network
Some common types of
Information Security Network
Protection( ISNP) packages
are as follows:
6.Win Route Pro
Network securities are very essential to prevent
cyber crime due to many benefits such as:
1.Reduces unauthorized lawless
individuals from accessing your
2.Gives transparent & legal
access to Internet-enabled users.
3.Provides the surity that
sensitive data & informations is transferred safely by the
4.Provide your managers to search
and fix security
5.Gives a effective system of
attempt to access your network.
Besides Network securities we can also reduce cyber
crimes by taking some proper steps such as:
1. Proper Investigation
2. Strong Legislation
4. Increasing Awareness
5. Intelligent activities
We have known about cybercrime as well as its types,
impact, technical reasons by previous discussion.
But it is also very important to
know about the behavior or psychology of criminals behind cyber crime. Because
who involves in this
behaviour have also become a part
of our society. But there is a
difference between computer criminals and
non-computer criminals moral
and exploitive or manipulative
behaviors. Self-reported computer criminals
were always higher on
manipulative behaviors but
on moral choice internal and
moral choice social,they were lower.
A research had done by an
organization with 77 participants from a mid western university
Enrolled in the college of
technology .Among these participants 87%
were male and 13% were
female(Table-1) .The mean age was
taken 21years.Mainly ,participants
are the representative of the
largest population of interested individuals of 17–30 years age who make up the majority of
those individuals engaged in criminal behavior.
It have been also found by this
research that they had engaged in these following activities such as:
1.trying to guess passwords.
2.trying to use other’s password
3.creating or using a virus.
4 Obtaining a device for free phone calls.
5. Trying to get someone’s credit card data without
6.. Observing at others’ files without
7.Modifying or changing others’ files without
Actually, there are some reason behind these behavior
investigation and criminal prosecution is rare.
by law and enforcement agency is less effective and more expensive.
the sake of recognition.
of making quick money
• New opportunity to do legal acts using
new form of Crimes
became a major part of our life for various purposes. But its very alarming
that, websites may be hacked by hackers.Website
hacking has became a great threat for businesses
developing an online presence.
Heckers are stealing secret
data,informations, taking control ,even shutting down any website. the popularity of Web site hacking is mystifying. Actually, Hacking of a Web site can affect the credibility and
reputation of the organization as a whole. But among many types of cyber crimes
, Why do hackers give effort to deface a Web site? There are some reasons
behind this.Hackers can hack websites in many ways such as:
Attack(Distributed Denial of Service Attack): Make unavailable a website t the users.
2. Remote code
execution attacts:Make secuirity weak either the server side or client side
request forgery attacks:Hackers send to users a forged HTTP request to collect
their cookie information of users while they are logged into a session or
insider attack: when a hacker positions the symlink Which is a special file
that “points to” a hard link on a mounted file system, the user or application
that access the endpoint thinks that they are accessing the correct file but
they’re really not.
Poisoning: DNS Cache Poisoning attatched old cache data, hackers can identify
vulnerabilities in a domain name system thats allow to form traffic from legit
servers to a fake website .
Attacks( UI Redress Attack): to
trace a user into clicking the top layer without them knowing by using multiple
Authentication and session management attacks:Passwords, key management,
session IDs, cookies are consists in authentication systems that can allow a
hacker to access the whole information from any website.
also known as cross site scripting attacts : It can occur when an application,
file packet, url “get request” is sent to any web browser window and bypassing
the validation process, for example, user may see a page asking for their
credit card info or any other private informations.
9.Injection Attacks: it happens when
there are flaws in the SQL Database, SQL libraries or the operating system by
itself.users might open the files
with hidden commands that’s make an opportunities to hackers to get unauthorized access to
secret informations as well as data as like credit card number ,social security
numbersor other financial data.
A hacker can
exploit vulnerabilities by applying multiple and various techniques to hack a Web
techniques must be applied to To prevent website hacking as well as keep
any website safe.
techniques are as follows:
1. Keep software up to date
2. Toughen up access control.
4.Use HTTP attack protection
5. Use Web
server resources protection
standard Transact SQL.
7. Give strong
8. Use HTTPS protocol to provide security over the
security tools such as Netsparker, OpenVAS, SecurityHeaders.io Xenotix XSS Exploit Framework etc.
10. Tighten network security.
a web application firewall.
Hide admin pages.
Limit file uploads.
can not think our daily life without compter as well as internet. The
advantages of internet and computer can not be described in one word. But they
have also some demerits as like cyber crimes.Its also became a part of our
life. Criminals and victims both are the part of our society.Now, the rate of
various types of cyber crimes increases rapidly. It must be reduced by keeping
proper steps that’s are already discussed in this paper for keeping safe our
personal and private informations,ensure the security of all types of websites and
making our society clean & peaceful.