You are on page 1of 7

A Study on Cyber Crime and Security Prevention

Mamata Joshi1, Asmita Udpikar2


Master of Computer Application
Sies College of Management Studies
Nerul , Navi Mumbai
Maharashtra 40070

Expanding reach of computers and the internet has


ABSTRACT made it easier for people to keep in touch across long
The Internet is a global system of interconnected distances and
computer networks that use the standard Internet Protocol Collaborate for purposes related to business, education and
Suite (TCP/IP) to serve billions of users worldwide. The culture among others. However, the means that enable the
Internet carries a vast range of information resources and free flow of information across borders also give rise to a
services, such as the inter-linked hypertext documents of the worryingly high incidence of irresponsible behaviour. Any
World Wide Web (WWW) and the infrastructure to support technology is capable of beneficial uses as well as misuse.
electronic mail. Cybercrime is evolving at an astounding pace, It is the job of the legal system and regulatory agencies to
following the same dynamic as the inevitable penetration of keep pace with the same and ensure that newer
computer technology and communication into all walks of technologies do not become tools of exploitation and
life. Whilst society is inventing and evolving, at the same time, harassment.
criminals are deploying a remarkable adaptability in order to However, substantial legal questions have arisen in
derive the greatest benefit from it. To avoid giving many contexts. The World Wide Web allows users to
cybercriminals the initiative, it is important for those involved circulate content in the form of text, images, videos and
in the fight against cybercrime to try to anticipate qualitative sounds. Websites are created and updated for many useful
and quantitative changes in its underlying elements so that purposes, but they can also be used to circulate offensive
they can adjust their methods appropriately. content such as pornography, hate speech and defamatory
materials. In many cases, the intellectual property rights of
I. INTRODUCTION authors and artists are violated through the unauthorized
circulation of their works. There has also been an upsurge
These days’ computer and internet becomes very common in instances of financial fraud and cheating in relation to
and necessary for our daily life. Back in 1990, less than 1, commercial transactions conducted online.
00,000 people were able access Internet worldwide. Now The digital medium provides the convenient shield of
around 2,405,518,376 people are hooked up to surf the net anonymity and fake identities. Errant persons become
around the globe. The present time of fast computing more emboldened in their offensive behaviour if they think
brings a new world known as cyber world. The increasing that they will not face any consequences. In recent years,
use of information technology facilitate common people to there have been numerous reports of internet users
get information, store information, share information etc. receiving unsolicited e-mails which often contains obscene
The cyber world is an online world where users have a lot language and amounts to harassment. Those who post
of information technology mechanisms to do personal personal information about themselves on job and marriage
activity as easily and freely as they can transact them in the to websites or social networking websites are often at the
physical world. receiving end of ‘cyber-stalking’. Women and minors who
The "cyber" environment includes all forms of digital post their contact details become especially vulnerable
activities, regardless of whether they are conducted since lumen elements such as sex-offenders can use this
through networks and without borders. This extends the information to target potential victims
previous term "computer crime" to encompass crimes
committed using the Internet, all digital crimes, and crimes
involving telecommunications networks. This more recent
terminology covers a wide variety of facets, leading to
different approaches, depending on the dominant culture of
the experts, making it appear either reduced or expanded,
in different dimensions, dealing with emerging issues that
also reflect its diversity.
A crime may be said to be any conduct accompanied
by act or omission prohibited by law and consequential
breach of which is visited by penal consequences. The
the network or internet. In the current era Internet is a very
hazardous weapon of hackers of so many types of cyber
crimes occurs in current scenario like E-mail spoofing,
Virus dissemination, hacking, phishing, credit card frauds,
software piracy etc…There are so many modes of criminal
activity on the internet that the traditional policing methods
and the laws that bind criminals at times lose jurisdiction
in cybercrime cases. This is why there are so many crimes
being committed online A Cyber law is the law governing
cyber space. Cyber space is a very broad term and it
includes all things which are related with cybercrimes and
laws such as Computers, networks, hardware, software,
data storage devices, internet, E-mails and all intelligent
devices. The growth of Electronic commerce has propelled
the need for vibrant and effective regulatory mechanisms
which would further strengthen the legal infrastructure, so
Fig.1. Trend of global ICT development (2001-2014) crucial to the success of electronic commerce. All these
(Source: ITU World Telecommunication/ICT Indicators regulatory mechanisms and legal infrastructure come
database) within the domain of cyber law.
Surveillance systems, and other technologies, including
nanotechnology and robotics, which must be taken into
account from now on. These electronic media will be
targeted increasingly more often and will also be used to
conceal, commit, or support crimes and offenses. Only the
positive actions for which one or more means were used to
commit one of the elements of the offense can be included.

III. WHAT IS CYBER CRIME


As the use of internet is increasing, a new face of
crime is spreading rapidly from in-person crime to
nameless and faceless crimes involving computers.
Cybercrime includes all unauthorized access of
information and break security like privacy, password, etc.
with the use of internet. Cybercrimes also includes
criminal activities performed by the use of computers like
virus attacks, financial crimes, sale of illegal articles,
pornography, online gambling, e-mail spamming, cyber
phishing, cyber stalking, unauthorized access to computer
Fig.2. County wise use of internet facility system, theft of information contained in the electronic
(Source:www.internetworldstats.com/stats3.htm) form, e-mail bombing, physically damaging the computer
system, etc.

In tenth United Nations congress on “prevention of crime


II. OBJECTIVES OF THE RESEARCH and treatment of offenders” which is devoted to issues of
crimes related to computer networks, cybercrime was
First we are trying to explain the objectives of research in broken into two categories and defined as:
Common terms, the objective of research is to find the
answers to certain questions through the application of A.Cyber crime in a narrow sense (computer crime): Any
Scientific procedure. The general objective of a study illegal behaviour directed by means of electronic
states what researchers expect to achieve by the study in operations that targets the security of computer systems
general terms. It is possible to break down a general
objective into smaller, logically connected parts. These and the data processed by them.
are normally referred to as specific objectives. Specific B. Cybercrime in a broader sense (computer-related
objectives should systematically address the various
crime): Any illegal behaviour committed by means of, or
research questions. They should specify what you will do
in your study, where and for what purpose. The purpose of in relation to, a computer system or network, including
our research is first to study and analysis of different types such crimes as illegal possession and offering or
of cybercrimes and illegal activities which is done through
distributing information by means of a computer system or someone else’s ISP user ID and password, either by
network. hacking or by gaining access to it by illegal means,
uses it to access the Internet without the other
person’s knowledge.
Cyber Crime Includes
Following are the few examples of cybercrime: Cracking: It is a dreadful feeling to know that a
stranger has broken into user computer systems
Cyber stalking: Online harassment and online abuse without user’s knowledge and consent and has
all comes under stalking. It generally involves tampered with precious confidential data and
harassing or threatening behaviour that an individual information. Cracker are differ with hacker because
engages in repeatedly, such as following a person, hacker are hired by companies to audit network
appearing at a person's home or place of business, security or test software but cracker do same work
making harassing phone calls, leaving written for their own profit or to harm others.
messages or objects, or vandalizing a person's
property. Cyber stalking shares important Phishing: Phishing means acquire information such
characteristics with offline stalking; many stalkers as usernames, passwords, credit card details,
(online or off) are motivated by a desire to control personal detail etc. by electronic communication.
their victims. A major damaging effect of online Phishing commonly uses fake emails or fake
abuse is a victim avoiding his/her friends, family and messages which contain link of virus/ malware
social activities. infected fake websites. These website request user to
enter their personal detail.
Intellectual Property Crimes: Intellectual property
consists of a bundle of rights. Any unlawful act by Voice Phishing: The term is a combination of
which the owner is deprived completely or partially "voice" and phishing. Voice phishing is use to gain
of his rights is an offence. The common form of IPR access of private, personal and financial information
violation may be said to be software piracy, from the public. Voice phishing uses a landline
infringement of copyright, trademark, patents, telephone call to get information.
designs and service mark violation, theft of
computer source code, etc. Carding: It means false ATM cards i.e. Debit and
Credit cards used by criminals for their monetary
Bot Networks: The word botnet made from the two
benefits through withdrawing money from the
words robot and network. A cybercrime called 'Bot
Networks', when hackers remotely take control upon victim’s bank account.
computers by using malware software. Computers E-Mail/SMS Spoofing: A spoofed E-mail/ SMS
can be co-opted into a botnet when they execute may be said to be one, which misrepresents its
malicious software. A botnet's originator can control origin. It shows it’s origin to be different from which
the group remotely. actually it originates. Here an offender steals identity
of another in the form of email address, mobile
Transmitting Virus: Viruses are programs that attach phone number etc. and send message via internet.
themselves to a computer or a file and then circulate
themselves to other files and to other computers on a Cross-site Scripting: Cross-site scripting (XSS) is a
network. They usually affect the data on a computer, type of computer security vulnerability. By cross-
either by altering or deleting it. Worm attacks plays site scripting attacker can bypass the predefine
major role in affecting the computerize system of the access permissions of website. Reflected XSS is the
individuals. most frequent type of XSS attack. Reflected XSS
attack is also known as non-persistent XSS.
Hacking: In general words hacking means seeking
Scripting languages like java script, VBScript etc.
and exploiting weakness and security of a computer
are used for Reflected XSS attack.
system or a computer network for unauthorized
access. The person who does hacking is known as Cyber Squatting: Squatting is the act of occupying
hacker. Hacker use computer expertise and some an abandoned or unoccupied space. Cybersquatting
tool or scripts to hack any computer system. is the act of registering a famous domain name and
then selling it to needy in high cost. It means where
Internet Time Thefts: Basically, Internet time theft two persons claim for the same Domain Name either
comes under hacking. It is the use by an by claiming that they had registered the name first
unauthorized person, of the Internet hours paid for on by right of using it before the other or using
by another person. The person who gets access to something similar to that previously.
On 17th October 2000 the Information Technology
Child Pornography: It involves the use of computer (Certifying Authorities) Rules, 2000 and Cyber
networks to create, distribute, or access materials Regulations Appellate Tribunal (Procedure) Rules, 2000
that sexually exploit underage children. Child came into force. On 17th March 2003, the Information
pornography is divided into simulated child Technology (Qualification and Experience of Adjudicating
pornography and pornography which was produced Officers and Manner of Holding Enquiry) Rules, 2003
with direct involvement of the child (also known as were passed. The Information Technology (Security
child abuse images). Procedure) Rules, 2004 came into force on 29th October
2004. They prescribe provisions relating to secure digital
Cyber Vandalism: Vandalism means destroying or signatures and secure electronic records. An important
damaging property of another. Thus cyber vandalism order relating to blocking of websites was passed on 27th
means destroying or damaging the data when a February, 2003. According to which, Computer Emergency
network service is stopped or disrupted. It may Response Team (CERT-IND) can instruct Department of
include within its purview any kind of physical harm Telecommunications (DOT) to block a website.
done to the computer of any person.
The Indian Penal Code (as amended by the IT Act)
Cyber Trespass: It means to access someone’s penalizes several cybercrimes. These include forgery of
computer without the right authorization of the electronic records, cyber frauds, destroying electronic
evidence etc. Digital Evidence is to be collected and
owner and does not disturb, alter, misuse, or damage
proven in court as per the provisions of the Indian
data or system by using wireless internet connection. Evidence Act (as amended by the IT Act). In case of bank
records, the provisions of the Bankers’ Book Evidence Act
Cyber Trafficking: It may be trafficking in drugs,
(as amended by the IT Act) are relevant. Investigation and
human beings, arms weapons etc. which affects
adjudication of cybercrimes is done in accordance with the
large number of persons. Trafficking in the provisions of the Code of Criminal Procedure and the IT
cyberspace is also a gravest crime. Act. The Reserve Bank of India Act was also amended by
the IT Act.
Cybercrime & Social Networking: Cyber criminals
use social media not only to commit crime online, Penalty for Damage to Computer System
but also for carrying out real world crime owing to According to the Section: 43 of ‘Information Technology
“over-sharing” across these social platforms. The Act, 2000’ whoever does any act of destroys, deletes, alters
risk associated with our identities. Identity theft can and disrupts or causes disruption of any computer with the
happen to anyone who exposes too much personal intention of damaging of the whole data of the computer
information online on various social networking system without the permission of the owner of the
sites. Get to know the security and privacy settings, computer, shall be punishable. According to the
and configure them to protect from identity theft. Section:43A which is inserted by ‘Information
One in five online adults (21 present) has reported of Technology(Amendment) Act, 2008’ where a body
becoming a victim of either social or mobile corporate is maintaining and protecting the data of the
cybercrime and 39 present of social network users persons as provided by the central government, if there is
have been victims of profile hacking, scam or fake any negligent act or failure in protecting the data/
link. information then a body corporate shall be liable to pay
compensation to person so affected. Section 66 deals with
‘hacking with computer system’ and provides for
IV. CYBER LAWS IN INDIA imprisonment up to 3 years or fine, which may extend up
to 2 years or both.
Cyber law was first step taken by Government to stop
cybercrime. According to Indian law cybercrime has to be
voluntary and wilful, an act or omission that adversely
affects a person or property. Cyber law encompasses laws V. PRIVENTIVE MEASURES TO AVOID
relating to Cyber Crimes, Electronic and Digital CYBER CRIME
Signatures, Intellectual Property, Data Protection and
Privacy. Indian parliament passed its first “Information
Technology Act, 2000” on 17th October 2000 to deal with Below mentioned security guidelines and good practices
cybercrime in the field of e-commerce, e-governance, e- may be followed to minimize the security risk of
banking as well as penalties and punishments. The Cybercrime:
Information Technology (IT) Act, 2000, specifies the acts By updating the computer: To avoid cyber-attacks,
which have been made punishable. regularly update operating system of computers and
antivirus. While keeping computer up to date will
not protect user from all attacks, it makes it much
more difficult for hackers to access computer Be Social-Media Savvy: Make sure social
system, blocks many basic and automated attacks networking profiles (e.g. Facebook, Twitter, etc.) are
completely etc. set to private. Check security settings with in
By choosing strong passwords: Passwords are frequent intervals. Be careful what information post
online identity over internet. Always select a online.
password that have at least eight characters and use a
combination of letters, numbers, and symbols (e.g. # Secure Mobile Devices: Be aware that mobile
$ % ! ?). Avoid using easy password like name, city device is vulnerable to viruses and hackers.
name etc. use non dictionary words. Keep passwords Download applications from trusted sources.
in safe place and not use same password for every
Secure wireless network: Wi-Fi (wireless) networks
online service. Change passwords on a regular basis,
at least every 90 days. at home are vulnerable to intrusion if they are not
properly secured. Review and modify default
By protecting computer with security software: settings. Avoid using public Wi-Fi spots.
Security software commonly includes firewall and
antivirus programs. A firewall controls who and
Call the right person for help: If computer crime is
what can communicate with computer online. suspected by a way of identity theft or a commercial
Antivirus software monitors all online activities and scam then immediately report this to local police. If
protects computer from viruses, worms, Trojan help is needed for maintenance or software
horses, and other types of malicious programs. installations on computer then consult with
Antivirus and antispyware software should be authenticated service provider or a certified
configured to update itself, and it should do so every computer technician.
time connect to the Internet.

Shield personal information: To take advantage of


VI. CYBER CRIME CELLS IN INDIA
many online services, users will have to provide
personal information in order to handle billing and
shipping of purchased goods. The following list To solve cybercrime cases, Indian police developed
contains some advice for how to share personal cybercrime investigation cells all over India. These Cyber
information safely online: Crime cell investigates in respect of cases pertaining to
hacking, spread of virus, pornography, manipulation of
A Phishing messages will often tell that to act
accounts, alteration of data, software piracy, creation of
quickly to keep account open, update security, or
false Web sites, printing of counterfeit currency, forged
else something bad will happen. Don't respond
visas, theft of intellectual property, email spamming, denial
them.
of access, password theft, crimes with cell phones and
B Don't respond to email messages that ask for
palmtops, cyber terrorism etc.. The following table shows
personal information. True companies will not
the phone numbers and email address of few cybercrime
use email messages to ask for personal
cells operational in India:
information.
C When visiting a website, type the URL directly
into the Web browser rather than follow a link CITY CONTACT DETAILS
within an email or instant message. Mumbai
D Guard email address from unwanted emails. +91-22-22630829
+91-22-22641261
Online offers that look too good to be true usually Website: http://www.cybercellmumbai.com
are: The free software or service asked for may have E-mail id: officer@cybercellmumbai.com
been bundled with advertising stuff that tracks Bangalore
+91-80-2220 1026
behaviour and displays unwanted advertisements. Be
+91-80-2294 3050
careful while downloading free stuff.
+91-80-2238 7611 (FAX)
Review bank and credit card statements regularly:
Web
The impact of identity theft and online crimes can be
greatly reduced if user can catch it shortly after their site: http://www.cyberpolicebangalore.nic.in
data is stolen or when user gets symptoms. Email-id: ccps@blr.vsnl.net.in, ccps@kar.nic.in
Regularly check bank and credit card’s statements. Pune
+91-20-2612 7277
Now, many banks and services use fraud prevention
+91-20-2616 5396
systems that call out unusual purchasing behaviour.
required, as there many application of the technology that
+91-20-2612 8105 (Fax)
can be used for the betterment of the mankind, similarly it
Website: equally true that such application can also be used for the
http://punepolice.com/crime branch.html detriment of the mankind as has been demonstrated by the
Spy–cam case. The bottom–line is that the law should be
E-Mail: punepolice@vsnl.com made flexible so that it can easily adjust to the needs of the
Hyderaba society and the technological development. 20 Cyber cell
+91-40-2324 0663
d of the law enforcement agencies have started operating in
+91-40-2785 2274 metropolitan cities like Pune, Mumbai, Hyderabad,
+91-40-2329 7474 (Fax) Chennai, Bangalore etc.
Web
site:http://www.cidap.gov.in/cybercrimes.aspx
E-mail
id: cidap@cidap.gov.in, info@cidap.gov.in
Delhi
+91-11-4362203
+91-11-4392424
Web site: http://cbi.nic.in
E-Mail: cbiccic@bol.net.in

VII. REFERENCES
VII. CONCLUSION
[1]
Change is inevitable and the dilemmas that advancement in Introduction to Indian Cyber Law (2014) by Rohas
technology poses cannot be avoided, the truth is that the Nagpal, Asian School of Cyber Laws, Pune, India
criminals have changed their method and have started
relying of the advanced technology, and in order to deal [2]
with them the society the legal and law enforcement Cyber Crime (2003) by R.K. Suri and T.N. Chhabra,
authorities, the private corporations and organizations will Pentagon Press, New Delhi, India.
also have to change. Further such experts must not only be
knowledgeable but must also be provided with necessary [3]
technical hardware and software so that they can International Journal of Basic and Applied Sciences
efficiently fight the cyber criminals. Thus necessary Kandpal & Singh Vol. 2. No.4 ISSN: 2277-1921
facilities must be established in various parts of the country 156 Online version available at: www.crdeep.org
so that crime in the virtual world can be contained20.
Another aspect which needs to be highlighted is that a [4]
culture of continuous education and learning needs to be Cyber Security: Understanding Cyber Crimes, Computer
inculcated amongst the legal and the law enforcement Forensics and Legal Perspectives (2012) by Nina Godbole
authorities because the Information Technology field is a and Sunil Belapure, Wiley India Pvt. Ltd, New Delhi,
very dynamic field as the knowledge of today becomes India.
obsolete in a very short time. Lastly the preamble of the
Information Technology Act 2000 provides that the act was [5]
passed with the objective to give legal recognition for http://www.philstar.com/business/2013/03/12/918801/stud
transactions carried out by means of electronic data y-social-networks-new-haven-cybercrime
interchange and other means of e-commerce, further the http://www.symantec.com/en/in/about/news/release/article.
act has also made amendments to the Indian Penal Code jsp?prid=20130428_01
1860, Indian Evidence Act 1872, The Bankers Books of http://www.internetworldstats.com/stats.htm
Evidence Act 1891, and the Reserve Bank of India Act http://en.wikipedia.org/wiki/Computer_crime
1934 for facilitating legal recognition and regulation of the
commercial activities. Though this objective of the act is
not to suppress the criminal activity, this act has defined
certain offences and penalties to smother such omissions,
which is understood to come within the characterization of
cybercrimes. From this it can be inferred that the law
cannot afford to be static, it has to change with the
changing times and viz. cyber space this is all the more

You might also like