0% found this document useful (0 votes)
58 views2 pages

A Systematic Approach Toward Description and Classification of Cybercrime Incidents

The document proposes a system to comprehensively classify cybercrime incidents. It reviews existing approaches and identifies features of cybercrime incidents and offenses. The proposed system develops a schema to systematically combine cybercrime characteristics and classify related offenses in a two-level system. This comprehensive classification of cybercrime elements and incidents would enable better monitoring, handling, and prevention of cybercrime occurrences globally.

Uploaded by

jani28cse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views2 pages

A Systematic Approach Toward Description and Classification of Cybercrime Incidents

The document proposes a system to comprehensively classify cybercrime incidents. It reviews existing approaches and identifies features of cybercrime incidents and offenses. The proposed system develops a schema to systematically combine cybercrime characteristics and classify related offenses in a two-level system. This comprehensive classification of cybercrime elements and incidents would enable better monitoring, handling, and prevention of cybercrime occurrences globally.

Uploaded by

jani28cse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

A Systematic Approach Toward Description and

Classification of Cybercrime Incidents


ABSTRACT
It offers a comprehensive understanding of cybercrime incidents and their corresponding
offences combining a series of approaches reported in relevant literature.

EXISTING SYSTEM
The existing paper reviews and identifies the features of cybercrime incidents, their respective
elements and proposes a combinatorial incident description schema. The schema provides the
opportunity to systematically combine various elements—or cybercrime characteristics.
Additionally, a comprehensive list of cybercrime-related offences is put forward. The offences
are ordered in a two-level classification system based on specific criteria to assist in better
classification and correlation of their respective incidents. This enables a thorough understanding
of the repeating and underlying criminal activities.

DRAWBACKS
• It causes serious threat to the global economy, safety.
• A serious threat to the operations of businesses, organizations and national economies.

PROPOSED SYSTEM
The proposed system can serve as a common reference overtaking obstacles deriving from
misconceptions for cybercrimes with cross-border activities. The proposed schema can be
extended with a list of recommended actions, corresponding measures and effective policies that
match with the offence type and subsequently with a particular incident. This matching will
enable better monitoring, handling and moderate cybercrime incident occurrences. The ultimate
objective is to incorporate the schema-based description of cybercrime elements to a complete
incident management system with standard operating procedures and protocols.

Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email:
[email protected] | www.takeoffprojects.
ADVANTAGES
• It overtakes obstacles deriving from misconceptions for cybercrimes with cross-border
activities.
• It will enable better monitoring, handling and moderate cyber crime incident occurrences.

SYSTEM REQUIREMENTS
H/W System Configuration:-
➢ Processor - Pentium –IV
➢ RAM - 4 GB (min)
➢ Hard Disk - 20 GB
➢ Key Board - Standard Windows Keyboard
➢ Mouse - Two or Three Button Mouse
➢ Monitor - SVGA
S/W System Configuration:-
➢ Operating System : Linux
➢ Application Server : Tomcat5.0/6.X
➢ Backend coding : Java
➢ Tool : Virtual Box
➢ Environment : Ubuntu
➢ Technology : Hadoop

Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email:
[email protected] | www.takeoffprojects.

You might also like