<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>1 R. M. Kamble. Cyber law and information technology. International
Journal of Scientific &amp; Engineering Research</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Cybercrimes, Cyber Law and Computer Programs for Security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Antonina Farion</string-name>
          <email>secretmail_antonina@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valentyna Panasyuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Economical Security and Financial Investigation, Ternopil National Economic University</institution>
          ,
          <country country="UA">UKRAINE</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of accounting in the industrial sphere, Ternopil National Economic University, UKRAINE</institution>
          ,
          <addr-line>Ternopil, Peremohy</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <volume>4</volume>
      <issue>5</issue>
      <fpage>1</fpage>
      <lpage>3</lpage>
      <abstract>
        <p>In this document we describe the situation that was formed at the information market colligates with the increasing the level of cybercrimes. Law regulation of this sphere can't follow the development of information technology that exacerbates the problems of cybercrime. At the individuals' level cybercrime is associated with the using of pirated software: malicious people can access the user's personal date.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>I. INTRODUCTION</p>
      <p>Law and Information Technology are parallel objects and
many scientists prove that they complement each other. A lot
of lawyers complain that law is always running behind the
process of developing information technology.</p>
      <p>II. THEORETICAL BASIS</p>
      <p>R. M. Kamble underlines that information technology
deals with information system, data storage, access, retrieval,
analysis and intelligent decision making. Information
technology refers to the creation, gathering, processing,
storage, presentation and dissemination of information and
also the processes and devices that enable all this to be done1.
And computers become inalienable part of our life.
Cybercrime is defined as crimes committed on the internet
using the computer as either a tool or a targeted victim.
Cybercrimes involve both the computer and the person
behind it as victims; it just depends on which of the two is the
main target2. So cyberspace spreads and become more
dangerous because many people can be involved in it.
Criminals roam freely in cyberspace than in other
environment.</p>
      <p>III. PRACTICE</p>
      <p>Cybercriminal activity is one of the biggest challenges that
humanity will face in the next two decades3. It is predicted
that cybercrime will cost the world $6 trillion annually by
2021. This increasing are based on hundreds of major media
outlets, universities and colleges, senior government officials,
associations, industry experts, the largest technology and
cybersecurity companies, and cybercrime fighters globally
(Fig.1).</p>
      <p>trillion annually up by, 2021
Fig. 1. Prediction for increasing of cybercrimes cost from
2015 annually by 2021</p>
      <p>It is direct connection of changing amount of internet
users: 100000 in 1990 and 500 million people in 2013. These
date rapidly changed (Fig. 2).
3,8
6</p>
    </sec>
    <sec id="sec-2">
      <title>Billions of internet users</title>
      <p>Fig. 2. Quantity of internet users changing (2015-2017)
Cybercrimes have unique structure that is connected with
information technologies (Fig.3).</p>
      <p>Many crimes that involve the use of cyber-technology are
not genuine cybercrimes. Cyber-related crimes could be
further divided into two sub-categories:
− cyber-exacerbated crimes;
− cyber-assisted crimes.</p>
      <p>Crimes involving cybertechnology could be
classified in one of three ways: cyber-specific crimes genuine
cybercrimes); cyber-exacerbated crimes; cyber-assisted
crimes.</p>
      <sec id="sec-2-1">
        <title>Cybercrimes</title>
      </sec>
      <sec id="sec-2-2">
        <title>Theft</title>
      </sec>
      <sec id="sec-2-3">
        <title>Intellectual</title>
        <p>property</p>
      </sec>
      <sec id="sec-2-4">
        <title>Personal and financial date</title>
        <p>Like other kinds of crime, which historically grew in
relation to population growth, cybercrimes grow in
proportion to digital targets. And cybercrimes are more
dangerous than the others because criminals can operate
anonymously over the computer networks.
The difference between crimes is the hackers steal
intellectual property. Law that connects with cybercrimes
must cover IT area (Fig. 4).</p>
        <p>Cybercrimes area
t
a
m
ro rfo
rep i
c
n
aP tro
c
e
l
e
n
o
i
t
a
m
r
o
f
n
I
g
n
i
t
s
a
c
d
a
o
r
B
n
o
i
t
a
c
i
n
u
m
m
o
C
s
n
o
ic ti
tron ican
c u
e
lE mm
o
c
s
- n</p>
        <p>o
om ti
lc ac
e i
e n
T u
m
ion gy
trfam lonoh
o c
In te
e
r
a
w
t
f
o
S
eand isc
r on
a r
w t</p>
        <p>c
rad le</p>
        <p>e
H
s
n
io y
itacn lgoo
u n</p>
        <p>h
omm tec
C
s
l
o
c
o
t
o
r
P
d
an re
e a
traw radw
fo h</p>
        <p>S</p>
        <p>During last 20 years many security software were invited
for electronic date protection because in the world’s practice
there is not the single law that can regulate all IT relations.</p>
        <p>There is a field of law that comprises elements of various
branches of the law4 (Fig. 5).</p>
        <p>
          But even these parts of law are not enough to control
cyberspace. Cybercrimes develop more quickly than others
crimes (Fig. 6) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]-[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Many countries have very few laws
addressing cybercrime.
        </p>
        <p>− Love Bug Virus;
− VB script that spread via email and corrupted many
different file types;
− FBI traced the virus to the Philippines.
4 What is IT law, ICT law or Cyber law? Michalsons. Electronic access:
https://www.michalsons.com/blog/what-is-it-law-ict-law-or-cyber-law/286
s
n
o
i
t
a
c
i
n
u w
m la
m
o
c
e
l
e
T</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Freedom of</title>
      <p>expression
law
Consumer
protection
law
w
a
l
t
c
a
r
t
n
o
C
w
a
l
t
n
e
t
a
P</p>
    </sec>
    <sec id="sec-4">
      <title>Elements of various branches of the law that connect with IT</title>
    </sec>
    <sec id="sec-5">
      <title>Intellectual</title>
      <p>property law
Privacy and
data
protection law
w
a
l
l
a
n
i
m
i
r
C
w
a
l
t
h
g
i
r
y
p
o
C</p>
    </sec>
    <sec id="sec-6">
      <title>Trade mark law</title>
    </sec>
    <sec id="sec-7">
      <title>Banking law Tax law</title>
    </sec>
    <sec id="sec-8">
      <title>Labour law The law of evidence</title>
      <p>
        But can legislation stop cyber crime. Research shows that the
costs of cyber crime for companies in financial services and
utilities and energy have the highest annualized cost. The most
expensive attacks are malicious insiders, denial of service and
Web-based attacks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In last 2017 year in the world the new
kinds of cybercrimes appeared – machine learning accelerates
social engineering attacks or cloud computing providers’
infection. But the necessary sections in the law that provide
security from cybercrimes are not adopted so quickly. So,
cybersecurity is the main instrument in securing date from threats
(Fig.7).
      </p>
      <p>Many computer criminals have been company employees, who
were formerly loyal and trustworthy and who did not necessarily
possess great computer expertise. To prevent increasing in
cybercrimes activity it is important to identify career criminals,
including those involved in organized crime, who are now
using cyberspace to conduct many of their criminal activities.</p>
      <p>Some cyber-related crimes can be carried out by
professional’s offenders and might be undetected because
professional criminals do not typically make the same kinds
of mistakes as hackers, who often tend to be amateurs.
n
e
l
o
t
s
d
n
a
y
t
r
e
p
o
r
p
y
o
r
t
s
e</p>
      <p>D
Who can
suffer
from
cybercri
mes?
y
t
r
e
p
o
r
auP frm
l o
t c
c i
tllee trcon
In lee
em ien
ts en
y c
s s</p>
      <p>b
n o
tio is
a h
rm ich
o w
f
In ,n
o
i
s ta
rod r
m
o
c f</p>
      <p>n
re i
nd fgo
a i
lifrse ilshnb
te uP
u
p
m
o
C
Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as
email or instant messaging, or messages posted to a Web site or a discussion group.</p>
      <p>Date diddling is the changing of date before or during entry into the computer system or altering the raw
date just before it is processed by a computer and then changing it back after the processing is completed.
A Trojan horse is a coded program which masks the existence of a virus or malware by making its
appearance look normal while containing malicious utilities transparent to the user; utilities that execute
unnoticed in the background until it is too late.</p>
      <p>Internet time theft. It is the use by an unauthorized person of the Internet hours paid for by another person.
Email spoofing is the forgery of an email header so that the message appears to have originated from
someone or somewhere other than the actual source
An email bomb is a form of Internet abuse which is perpetrated through the sending of massive volumes of
email to a specific email address with the goal of overflowing the mailbox and overwhelming the mail
server hosting the address, making it into some form of denial of service attack.</p>
      <p>A salami attack is when small attacks add up to one major attack that can go undetected due to the nature of
this type of cyber crime.</p>
      <p>Web-jacking - the hacker gains access and control over the web site of another.</p>
      <sec id="sec-8-1">
        <title>Owners of</title>
        <p>Mobile phones and gadgets</p>
      </sec>
      <sec id="sec-8-2">
        <title>Bank accounts Files on their computers</title>
        <p>
          Information age is so called because our life is codified by
date: almost everything we do or buy, and everything we
depend on, involves data and the technology that uses it.
Cyber criminals are building so called “an army of things”
that has the potential to impact the future of the digital
economy [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Impact of a cyber attack could include
substantial loss of revenue and margin, of valuable data, and
of other company assets. Quantity of cybercriminals
increases quickly around the world. Now cybercrimes are
connected international serious organized crime groups,
smaller-scale, domestic criminals and hacktivists.
        </p>
        <p>
          Although the most serious threat comes, directly or
indirectly, from international crime groups, the majority of
cyber criminals have relatively low technical capability.
Their attacks are increasingly enabled by the growing online
criminal marketplace, which provides easy access to
sophisticated and bespoke tools and expertise, allowing these
less cyber criminals to exploit a wide range of vulnerabilities
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. There is also situation when companies’ websites were
subject to the criminal access of a customer records database,
followed by a ransom demand asking for payment in
exchange for the return of stolen data. The wearables are
rapidly gaining popularity with smartwatches. Wearables are
tracking all sorts of personal information including GPS
location, blood pressure, heart rate, and anything else you
feed them such as weight or diet. Such personally identifiable
information could be used as a base to target you for
spearphishing, or aid in identity theft. But the real opportunity is
these devices linking to your smartphone, where phone
numbers, more personally identifiable information, emails,
web logins etc. could theoretically be compromised [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>
          Cybercrime activity is spreading around the world. For
decreasing the cybercrimes in Europe, Cooperation Group,
the Commission, the European Union Agency for Network
and Information Security should be established to support
information security within the EU countries [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. According
to Directive (EU) 2016/1148 the certain sectors of the
economy are already regulated or may be regulated in the
future by sector-specific Union legal acts that include rules
related to the security of network and information systems.
Each Member State shall designate one or more national
competent authorities on the security of network and
information systems.
        </p>
        <p>
          Member States shall ensure that digital service providers
identify and take appropriate and proportionate technical and
organizational measures to manage the risks posed to the
security of network and information systems which they use
in the context of offering services referred to in Annex III
within the Union. Having regard to the state of the art, those
measures shall ensure a level of security of network and
information systems appropriate to the risk posed, and shall
take into account the following elements: the security of
systems and facilities, incident handling, business continuity
management, monitoring, auditing and testing [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
      </sec>
      <sec id="sec-8-3">
        <title>Viruses and worms</title>
      </sec>
      <sec id="sec-8-4">
        <title>Viper</title>
      </sec>
      <sec id="sec-8-5">
        <title>G date</title>
      </sec>
      <sec id="sec-8-6">
        <title>Kaspersky</title>
      </sec>
      <sec id="sec-8-7">
        <title>Norton</title>
      </sec>
      <sec id="sec-8-8">
        <title>Trend micro CA</title>
      </sec>
      <sec id="sec-8-9">
        <title>PC tools Mc Afee</title>
      </sec>
      <sec id="sec-8-10">
        <title>F-secure</title>
      </sec>
      <sec id="sec-8-11">
        <title>Panda</title>
      </sec>
      <sec id="sec-8-12">
        <title>Password cracking Strong passwords and never used the same password for two different sites</title>
        <p>Microsoft Security Essentials</p>
      </sec>
      <sec id="sec-8-13">
        <title>Bit defender</title>
      </sec>
      <sec id="sec-8-14">
        <title>Quick heal</title>
      </sec>
      <sec id="sec-8-15">
        <title>Webroot</title>
      </sec>
      <sec id="sec-8-16">
        <title>Avast</title>
      </sec>
      <sec id="sec-8-17">
        <title>Trojan horses</title>
      </sec>
      <sec id="sec-8-18">
        <title>Hackers’ attacks</title>
      </sec>
      <sec id="sec-8-19">
        <title>Security suites</title>
      </sec>
      <sec id="sec-8-20">
        <title>Personal control</title>
      </sec>
      <sec id="sec-8-21">
        <title>Malware</title>
      </sec>
      <sec id="sec-8-22">
        <title>State control</title>
      </sec>
      <sec id="sec-8-23">
        <title>Passwords</title>
      </sec>
      <sec id="sec-8-24">
        <title>Firewalls</title>
      </sec>
      <sec id="sec-8-25">
        <title>Firewalls</title>
      </sec>
      <sec id="sec-8-26">
        <title>Antivirus</title>
      </sec>
      <sec id="sec-8-27">
        <title>Cyber monitoring</title>
      </sec>
      <sec id="sec-8-28">
        <title>Network security</title>
        <p>
          The top industries at the greatest risk of cyber attack (Fig.
8) [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>IV. CONCLUSION</p>
        <p>Cyber crimes are intrinsically challenging for business
companies and governments. Security has to be developed
quicker then types of cyber crimes because solutions that may
have worked last year may not necessarily work this year or
next.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Cyber stalking</article-title>
          . Available at: http://searchsecurity.techtarget.com/definition/cyberstalk ing
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Cybersquatting</surname>
          </string-name>
          . Available at: http://searchmicroservices.techtarget.com/definition/cybe rsquatting
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E</given-names>
            <surname>-mail spoofing</surname>
          </string-name>
          . Available at: http://searchsecurity.techtarget.com/definition/emailspoofing
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] What is a Trojan Horse Virus? - Definition, Examples &amp; Removal Options</article-title>
          . Available at: https://study.com/academy/lesson/what-is
          <article-title>-a-trojanhorse-virus-definition-examples-removal-options</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Aj. Maurya.</surname>
          </string-name>
          <article-title>What is a salami attack</article-title>
          ? Available at: https://ajmaurya.wordpress.com/
          <year>2014</year>
          /03/27/what-is
          <string-name>
            <surname>-</surname>
          </string-name>
          asalami-attack/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Email</given-names>
            <surname>Bomb</surname>
          </string-name>
          . Electronic access: https://www.techopedia.com/definition/1655/emailbomb
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] Cost of cyber crime study. Insights on the security investments that make a difference. Independently conducted by Ponemon Institute LLCand jointly developed by Accenture</article-title>
          . Available at: https://www.accenture.com/t20170926T072837Z__w__/ us-en/_acnmedia/PDF-61/Accenture-2017- CostCyberCrimeStudy.pdf
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[8] Cyber security</article-title>
          . Available at: https://www.slideshare.net/Siblu28/cyber-security36922359
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] Cyber criminals a growing threat to digital economy</article-title>
          . Available at: https://www.gtnews.com/
          <year>2017</year>
          /03/29/cyber-criminals
          <article-title>-agrowing-threat-to-digital-economy/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>NCA</given-names>
            <surname>Strategic Cyber Industry Group</surname>
          </string-name>
          .
          <source>Cyber Crime Assessment</source>
          <year>2016</year>
          .
          <article-title>Need for a stronger law enforcement and business partnership to fight cyber crime</article-title>
          . Available at: http://www.nationalcrimeagency.gov.uk/publications/70 9
          <article-title>-cyber-crime-assessment-2016/file</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>5 industries that top the hit list of cyber criminals in 2017</article-title>
          . Available at: http://www.infoguardsecurity.com/5
          <article-title>- industries-top-hit-list-cyber-criminals-2017/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>EUR-lex</article-title>
          .
          <source>Directive (EU)</source>
          <year>2016</year>
          /
          <article-title>1148 of the European Parliament and of the Council</article-title>
          . Available at: https://eur-lex.europa.eu/legalcontent/EN/TXT/?toc=
          <source>OJ%3AL%3A2016%3A194%3A TOC&amp;uri=uriserv%3AOJ.L_</source>
          .
          <year>2016</year>
          .
          <volume>194</volume>
          .01.0001.01.ENG
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>