Cyber Crimes: A Literature Review

1284 Words6 Pages

In this paper, I will be analyzing bibliography of 10 authors. I have selected the following 10 articles for the bibliography: Article 1: An Annotated Bibliography Semaan, B. and Mark, G. 2011. Technology-mediated social arrangements to resolve breakdowns in infrastructure during the ongoing disruption. ACM Trans. Comput.-Hum. Interact. 18, 4, Article 21 (December 2011), 21 pages. DOI = 10.1145/2063231.2063235 http://doi.acm.org/10.1145/2063231.2063235 When societies experience disruption as caused by natural disasters, various official government agencies, relief organizations, and emergent citizen groups engage in activities that aid in the recovery effort—the process that leads to the resumption of normal life. In war environments, however, …show more content…

This article focuses on the current relationship between networked systems and cyber crimes, analyzes the nature of the relationship from a fundamental engineering perspective, and systematically explores where and how future advances in networked systems might influence the evolution of cyber-attacks, even inadvertently giving rise to new forms of cyber crimes. Historical data reveals that technological advances in engineering system design, including communications and transportation, have been often accompanied by a lack of foresight. The greater the extent of the advancement, the deeper the potential chasm and more severe the damage incurred when a clever perpetrator successfully exploits the weaknesses. My brief summary, this article covered challenges in computer crimes, computer network security computer viruses, computer security, DATA protection and CYBERTERRORISM. The greatest threat to any networked system comes from an intelligent individual or a team dedicated to harming the system. The most logical and perhaps the only recourse lies in the designers expending serious effort to uncover any flaws and errors in the system design before the perpetrators find them, through holistic thinking and simulation, both prior to developing the prototype and after the system is …show more content…

Although there is no doubt that the wireless communication architecture will play a significant role in smart grid, the wireless network introduces additional vulnerabilities, given the scale of potential threats. Therefore, the physical layer security issue is of first priority in the study of smart grid and has already attracted substantial attention in the industry and academia. In this paper, we aimed to present a general overview of the physical layer security in the wireless smart grid and cover the effective countermeasures proposed in the literature of smart grid to date. We first investigate the security challenges from malicious attacks. Specifically, two typical forms of malicious attack in smart grid, namely, jamming and bad data injecting, are studied. In addition, the related countermeasures against these malicious attacks are illustrated. Further, we analyze the state of the art of the privacy issues in the smart grid. The private information and privacy concerns are introduced, and then the effective solutions to privacy security are provided. Finally, voltage regulation, a security topic that has been hardly studied in the wireless smart grid domain, is

Open Document