A Study of Cybercrime and Cybersecurity

Shabiya Noor Mansuri*, Alkar Hussain**
*-** Department of Linguistics, Indira Gandhi National Tribal University, Amarkantak, Madhya Pradesh, India.
Periodicity:January - June'2023
DOI : https://doi.org/10.26634/jdf.1.1.19082


At present, millions of people use mobile phones and computers in their daily lives. They are using these devices for online shopping, banking transactions, online gaming, share market, etc. Sometimes people have no knowledge of cybercrime and are easy victims of cyber-related fraud. This paper discusses different types of cybercrime, such as identity theft, cyberstalking, cyberbullying, financial fraud, and the importance of cybersecurity techniques including risk management, internal audit, and the benefits of a cybersecurity audit. The conclusion emphasizes the importance of expanding cybersecurity measures to protect against evolving cyber threats.


Cybersecurity, Cyber Threat, Cybersecurity Audit, Cybercrime, Cyberbullying.

How to Cite this Article?

Mansuri, S. N., and Hussain, A. (2023). A Study of Cybercrime and Cybersecurity. i-manager’s Journal on Digital Forensics & Cyber Security, 1(1), 15-20. https://doi.org/10.26634/jdf.1.1.19082


[1]. Ashwini, S., Bhosale, S., & Farish, K. (2021). Research paper on cyber security. Contemporary Research in India, (pp. 246-251).
[2]. Gordon, L. A., & Loeb, M. P. (2006). Managing Cybersecurity Resources: A Cost-Benefit Analysis. McGraw-Hill, New York.
[4]. Khurana, S. (2017). A review paper on cyber security. International Journal of Engineering Research & Technology (IJERT), 5(23), 1-2.
[7]. Reddy, G. N., & Reddy, G. J. (2014). A study of cyber security challenges and its emerging trends on latest technologies. International Journal of Engineering and Technology, 4(1).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 40 40 300
Online 40 40 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.