.

Saturday, January 26, 2019

Cyber Laws and Cyber Crime

Presented by Kale Sandeep N. Gaikwad Avinash R. S. E. (Comp) S. E. (I T) e-mail telecommunicate&clxprotected com E-mail avi. email&160protected com Mob 919970061442 Mob 919960308551 G H Raisoni Institute of engineering science and Management, Jalgaon (M. S) Index Topics Page No. 1 Abstract 1 2 Introduction 2 3 Cyber offensive 2 4 smorgasbord of Cyber offence 2 5 Status of Cyber wickedness 6 6 Cyber honor 7 7 Cyber law in India 8 8 Advantages of Cyber Law 9 9 General Suggestions and reading 10 0 Suggestions for better earnest 10 11 closedown 11 12 Reference 12 Abstract Cyber practice of law and cyber execration is becoming an chief(prenominal) issue for social and economical concerned. The intake of reck whizzr, electronic devices and softw be is motley magnitude the motivation to protect these devices and softw be properly is inherently appeared with this. To protect these, it becomes needful to know ab break through cyber villainy and cyber law. Cyber crime is un lawful act in which figurer is either rotating shaft or target. After development of cyberspace tout ensemble data processor is subject access data and in ricochetation from totally over the world.This in addition lead to the misuse of ready reckoner and meshwork for Crime such as Financial crimes, Cyber pornography, Online gambling, adroit dimension crimes, Forgery, Cyber Defamation, Cyber s lecture, e-mail spoofing, electronic mail bombing, Denial of Service attack, Salami attacks, Virus / worm attacks, Web jacking, Data diddling and so forth Now days most of financial and non-financial activities are d genius with computer and computer think services such as network. Also the purpose of e-Governance coming in picture, where the confidential document of an organization is process and stored.The need of protection Cyber security resulted into development of cyber law in India and all most the world. Cyber law is important because it touches well-nigh all aspects of profound proceeding and activities on and concerning the Internet, the knowledge base Wide Web and net. The paper throw light on the abbreviated types of cyber crime, status of cyber crime and cyber awareness in India, Cyber law in India , Advantages of it in brief. Also this paper suggests the precaution measures and tips for cyber security for the users of computer and internet. 1. Introduction The de nonation recorded cyber crime took key out in the year 1820That is not affect considering the fact that the abacus, which is thought to be the earliest form of a computer, has been well-nigh since 3 vitamin D B. C. in India, Japan and China. The era of unexampled computers, however, began with the analytical engine of Charles Babbage. Today, computers reach come a long way, what with neural networks and nano-computing promising to turn every atom in a glass of water into a computer capable of performing a billion operations per second. Cyber crime is an fiendish having its origin in the growing dependence on computers in modern life.In a day and age when everything from microwave ovens and refrigerators to nuclear powerfulness plants is being run on computers, cyber crime has assumed rather pitch-b leave out implications. 2. Cyber crime At the Tenth United Nations Congress on the effectual community of Crime and Treatment of Offenders, cyber crime was broken into two categories and delineate thus 2. 1. Cyber crime in a narrow sense Any flagitious behavior directed by instrument of electronic operations that targets the security of computer systems and the data treat by them. 2. 2. Cyber crime in a broader senseAny il efficacious behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession offering or distri exactlying data by means of a computer system or network. As per Indian law, Crime has to be voluntary and willful, an act or omission that adversely affects a soul or property. A simple translation of cyber crime would be unlawful acts wherein the computer is either a tool or a target or both. 3. Classification of Cyber crime Cyber Crime is classified into 4 major categories as (A) Cyber crime against respective(prenominal) B) Cyber crime Against Property (C) Cyber crime Against Organization (D) Cyber crime Against confederation 3. 1. Against Individuals 3. 1. 1. electronic mail spoofing A spoofed email is one that appears to originate from one source simply actually has been sent from an otherwise source. E. g Avinash has an e-mail address email&160protected com His enemy, Rohan spoofs his e-mail and sends obscene messages to all his acquaintances. Since the e-mails appear to arouse originated from Avinash, his friends could take criminal offence and relationships could be spoiled for life. 3. 1. 2. SpammingSpamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. 3. 1. 3. Cyber Defamation This o ccurs when defamation takes place with the help of computers and / or the Internet. E. g. soulfulness publishes defamatory matter nearly someone on a sack upsite or sends e-mails containing defamatory information to all of that soulfulnesss friends. 3. 1. 4. Harassment and Cyber stalking Cyber Stalking Means following the moves of an psyches exertion over internet. It tin can be done with the help of m either a(prenominal) protocols on hand(predicate) such at e- mail, chat rooms, user net groups. The Oxford dictionary defines talking as pursuing stealthily. Cyber stalking involves following a persons movements crosswise the Internet by posting messages (some epochs bratening) on the bare boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. 3. 2. Against Property 3. 2. 1. Credit Card Fraud You simply acquit to type mention razz subjugate into www page of vendor for online transaction. If el ectronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card proprietor. . 2. 2. Intellectual Property crimes These include Software piracy i. e. illegal write of designs, distribution of copies of software ,Copyright infringement Trademarks violations ,Theft of computer source code 3. 2. 3. Internet datetheft The routine of the Internet hours by an unlicenced person which is actually paid by another person. 3. 3. Against Organization 3. 3. 1. UnauthorizedAccessingofComputer Accessing the computer/network without permission from the admiter. This activity is comm save referred to as hacking.The Indian law has, however, given up a different connotation to the term hacking, so we will not use the term unauthorized access interchangeably with the term hacking. It can be of 2 forms one is Changing/deleting data i. e. unauthorized change in data and other is Computer voyeur where the criminal reads or copies confidential or branded information, but the data is neither deleted nor changed. 3. 3. 2. Denial Of Service When Internet emcee is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server.Denial of service attack involves fill a computer resource with more requests than it can handle. This causes the resource (e. g. a web server) to crash in that respectby denying authorized users the service offered by the resource. another(prenominal) variation to a typical denial of service attack is cognize as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very hard-fought to belowstand such attacks. Denial-of-service attacks leave had an impressive history having, in the past, brought down website like Amazon CNN, hayseed and eBay 3. 3. 3 VirusattackA computer computer virus is a computer design that can infect other computer political programs by modifying them in such a way as to include a possibly evolved replicate of it. Viruses can be file infecting or affecting boot arena of the computer. Worms, unlike viruses do not need the host to attach themselves to. 3. 3. 4. Email Bombing Email bombing refers to sending a large number of emails to the victim resulting in the victims email account (in eluding of an individual) or mail servers (in look of a company or an email service provider) crashing. 3. 3. 5. Salami Attack When negligible amounts are removed &038 accumulated in to something larger.These attacks are used for the commission of financial crimes. The key here is to convey the alteration so insignificant that in a wizard case it would go completely unnoticed. 3. 3. 6. Logic Bomb Its an plaint dependent program , as soon as the designated event occurs, it crashes the computer, release a virus or any other pernicious possibilities This implies that these programs are created to do something only whe n a certain event (known as a trigger event) occurs. E. g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date. . 3. 7. fifth column Horse A Trojan is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. on that point are many simple ways of installing a Trojan in someones computer. The Common Types of Trojan horse are Remote Administration Trojans (RATs) Password Trojans Privileges-Elevating Trojans Destructive Trojans Joke Programs 3. 3. 8. Data diddling This mannequin of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.Electricity Boards in India draw been victims to data diddling programs inserted when private parties were computerizing their systems. 3. 4. Against Society 3. 4. 1. Forgery Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Outside many colleges crossways India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are do using computers, and high quality scanners and printers. 3. 4. 2. Cyber TerrorismIt is use of computer resources to intimidate or coerce others. Computer crime has hit universe with unbelievable severity. Computer viruses, worms, Trojans, denial of service attacks, spoofing attacks and e-frauds have taken the historical and virtual worlds by storm. The term cyber terrorism can be defined as Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. 3. 4. 3 Web Jacking Hackers gain access and reassure over the website of another, even they c hange the content of website for fulfilling political objective or for money. This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website. 4. Status of Cyber Crime Back in 1990, less than 100,000 heap were able to log on to the Internet worldwide. Now a assault 500 gazillion people are using the net around the globe.UK has the largest number of infected computers in the world followed by the US and China. The US is the leading source farming for attacks. China is second and Germany is third. 4. 1. In India i) During 2003, a total of 411 cases were registered under IPC Sections as compared to 738 such cases during 2002 thereby reporting a significant go under of 44 share in 2003 over 2002. ii) A total of 475 persons were arrested in the country for Cyber Crimes under IPC during 2003. iii) The age-wise profile of the arrested person s showed that 45 percent were in the age-group of 30-45 years, 28. percent of the offenders were in the age-group of 45-60 years and 11 offenders were aged 60 years and above. higher up figures doesnt mean that cyber crime is declining in India, the fact is that people in our country do not report cyber crimes for the following reasons a) They dont want to face curse by police force. b) The fear of bad publicity which could hurt their reputation in society. Also, c) It becomes extremely difficult to convince the police to register any cyber crime, because of lack of awareness about cyber crime and cyber law and also about their registration and handling by the police.A recent survey indicates that for every 500 cyber crime incidents that took place, only 50 are reported to the police and out of that only one is actually registered. These figures indicate how difficult it is to convince the police to register a cyber crime. The establishment of cyber crime cells in different par t of the country was expected to boost cyber crime reporting and prosecution. However, these cells havent quite unploughed up with expectations. 5. Cyber law The cyber world has no physical boundaries, no single authority who governs the internet.The Internet is the average for freely sharing information and opinions It provides everyone with round the clock access to information, credit and financial services, and shopping. Even network information systems are being adopted by the government worldwide, thats why the governments across the world are recognizing the need to securing &038 regulating the cyber world. 5. 1. Why Cyber law? When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could transubstantiate itself into an all pervading revolution which could be misused for criminal activities and which required regulation.Today, there are many disturbing things happening in cyberspace. Due to the nameless nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence there is need for Cyber laws in India. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. Whether we greet it or not, every action and every reaction in Cyberspace has some legal and Cyber legal perspectives. . 2 Who should concern about Cyberlaw? Everyone, Cyber law is of everyones concern. As the nature of Internet is changing and this new medium is being seen as the ultimate medium ever evolved in forgiving history, every activity of yours in Cyberspace can and will have a Cyber legal perspective. From the time one register athletic field Name, to the time one set up a web site, to the time one promote a website, to the time when one send and receive email, to the time one conduct electronic commerce transactions on the say site, at every point of time, there are various Cyber law issues involved.One may not be bothered about these issues at once because one may ascertain that they are very distant from him/her and that they do not have an impact on Cyber activities. But sooner or later, you will have to tighten your belts and take note of Cyber law for your own benefit. 6. Cyber Law In India Cyber Crimes are a new class of crimes to India. It is quick expanding due to extensive use of internet. India is among few countries in the world that have a separate law for cyber crimes. Recently Nepal has passed Bill against Cyber crime.Indian parliament has passed the legislation known as Information Technology operation 2000 drafted by the Ministry of Communication and Information. The Information Technology Act came into force on seventeenth October, 2000. IT Act amends some of the existing legislation, such as Indian Penal Code,1860 I ndian Evidence Act, 1872 hopeers Book Evidence Act. 1891, Reserve Bank of India Act, 1934 6. 1. Features of The IT Act 2000 i)Legal recognition of electronic contracts, digital signature, digital certificates. ii) Various types of cyber crime committed in India and outside India is covered alongwithpenalties. ii) escort of Certifying Authorities(CA) to issue digital signature, digital certificates. iv)Controller of Certifying Authorities to act as depository for all Certifying Authorities. v) Appointment of Adjudicating Officer for holding enquiries under this Act. vi) EstablishmentofCyberAppellateTribunal. vii) Cyber Regulations Advisory Committee who will advice the key Government and CA. Technology. The act is based on the United Nations Commission on International Trade Law(UNCITRAL) model on electronic commerce. 6. 2. IT Act 2000 does not include ) Specific Definition of cyber crime is not given.. ii) Intellectual Property Rights such as trade Marks, Patents, digital Copyrig ht Issues. iii) Domain name disputes and their resolution, Data protection issues are not covered. iv)No provision is made for the Taxation issues arising due to e-commerce 7. Advantages of Cyber Laws The IT Act 2000 attempts to change outdated laws and provides ways to have sex with cyber crimes. We need such laws so that people can perform corrupt transactions over the Net through credit cards without fear of misuse.The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records. The IT Act 2000 and its render contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be punctually produced and approved in a court of law. Digital signatures have been given legal validity and sanction in the Act.The Act throws open the do ors for the entree of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates. The Act now allows Government to issue notification on the web thus heralding e-governance. It shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes change or copies data. The remedy provided by the Act is in the form of fiscal damages, not exceeding Rs. 1 crore. 8. General Suggestions against cyber crime Dont delete harmful communication theory (emails, chat logs, posts etc).These may help provide vital information about the identity of the person behind these. Try not to panic. If you feel any immediate physical danger of bodily harm, call your local anesthetic police. Avoid getting into huge arguments online during chat or discussions with other users. Be extremely careful about how you share personal information about yourself online. mystify sure that your ISP and Internet Relay Chart (IRC) network have an acceptable use policy that prohibits cyber-stalking. And if your network fails to respond to your complaints, consider electric switch to a provider that is more responsive to user complaints. If a posture online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact a local law enforcement agency. Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet System Administrators or Law Enforcement Officials. 9. Suggestions for better security Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all other accounts. Make regular back-up of decisive data. Back-up must be made atleast once in each day. Use virus protection software.Checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Use a firewall as a ga tekeeper between your computer and the Internet. Do not keep computers online when not in use. Either leave off them off or physically disconnect them from Internet connection. Do not open e-mail attachments from strangers, regardless of how enticing the subject line or attachment may be. Regularly download security patches from your software vendors. 10. Conclusion Thus, the awareness of cyber crime and cyber law has become a necessity for persons in cyberspace.The study of cyber crime and its different aspects will be helping to individual in cyberspace to avoid and restrict the cyber crime around them and related to them. Also the study of cyber crime will keep them alert against cyber crime. absence of Cyber security policy in organization may lead to critical problem for Management to maintain the data security of organization. Recent incidents relating to cyber crime have not just addd the vulnerability of various socio-economic constituents, but also brought forth the n eed for better managerial and operating capabilities of our legal framework in stopping this growing menace.Cyber law in India is cypher but the outcome of this need. Cyber law will be helpful to control the cases of cyber crime. IT act 2000 has given constitutional support to fight against cyber criminals. This act has also given legal status to e-business, digital signature cause to increase faith in online trading. The number of cases reported is much less than what it is in reality. This is because of unawareness of law. Awareness program on Cyber law and Cyber Crime should undertaken by Social Organisation.The program may include basic information of cyber law, internet security, and minimum hardware and software security measures required for an individual or organisation. Reference (1) Cyber and Information Technology Article By Talwant Singh (Judge) (2) Perspective of Cyber crime in India Kernila Seth (3) Cyber law ,Data Protection in India Article by Gurpreet Singh (4) w ww. cuil. com (5) www. cyberlawsindia. net (6) www. cybersmart. in (7) www. indlii. org (8) www. asianlaws. org (9) www. report cyber crime. com (10) www. scribd. com

No comments:

Post a Comment