CYBER CRIME
1. Ms. Ritika Khanna, Lecturer, IFTM, MBD.
2. Ms. Nishtha Sharma, Lecturer, IFTM, MBD.
3. Mr. Ankur Bhatnagar, Lecturer, SIMT, Kashipur
Crime is a social and economic phenomenon and is as old as the human society. As, every coin has its two sides, so is the Internet, it contains positives and negatives both. For all the good it does to us, cyberspace has its dark sides too. Widely publicized attacks by the hackers on the internet have splashed the open electronic playground with a dose of cold reality and sent newcomers scrambling to beef up network security plans. Cyber crime is the newest and possibly the most convoluted trouble in the cyber world.
Whereas the universal picture on cyber crime looks miserable, the situation in India isn't any better. Cyber crimes in India are slowly sprouting from a simple e-mail crime to more grave crimes like hacking and source code theft.
So, in the paper an attempt has been made to describe the reasons of cyber crime and what modes are being used for this and also addresses the ways in which cyber security threats and risks have changed in recent years, how to more accurately assess them, and how to more effectively combat them.
Key Words: - Crime, Criminals, Hacking, Theft, Security, Internet, Cyber
The world of Internet today has become a parallel form of life and living. People are now competent of doing things which were not feasible few years ago. The competence and chance provided by the Internet have transformed many genuine business activities, enhancing the speed, ease, and range with which transactions can be conducted while also lowering many of the costs. The Internet is fast becoming a way of life for millions of people and also a way of living because of growing dependence and reliance of the mankind on these machines.
The dim side of the Internet contains not only deception and theft, pervasive pornography and pedophile rings, but also drug trafficking and criminal organizations that are more concerned about exploitation than the kind of interruption that is the focus of the impostor community.
Hart in his work “The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Relating this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the susceptibility of computers may be said to be:
1. Capacity to accumulate data in relatively small space-
The computer has exclusive characteristic of storing data in a very small space. This affords to eliminate or derive information either through physical or implicit medium makes it much easier.
2. Easy to access-
The problem came upon in safeguarding a computer system from unauthorised access is that there is every possibility of violate not due to human fault but due to the intricate technology. By secretly implanted logic bomb, key loggers that can whip access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.
3. Complex-
The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is mortal and it is not achievable that there might not be a drop at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.
4. Negligence-
Negligence is very strongly associated with human behaviour. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.
5. Loss of evidence-
Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
Tools of Cyber-Crime
What are some of the most common tools of cyber-crime? Under one approach, known as the “denial of service attack,” computer hackers flood a company's Web site with too much computer traffic. Sometimes, this forces the company's computer network to shut down completely until the attack can be brought under control.
Computer viruses, another common tool, plague corporations and consumers alike. These pieces of malicious software are especially written to make computers act in odd and often unpredictable ways.
The Melissa virus first struck in March of 1999, after being released to an Internet newsgroup in a Microsoft Word document containing a list of pornographic Web sites. Corporate e-mail sites around the world were soon swamped. Even high-tech giants such as Microsoft, Intel and Lucent Technologies had to shut down Internet access.
New Methods Always Lurking
More methods of cyber-crime are always around the corner. Over the past few years, for instance, PCs have become equipped with USB ports. Unlike old-fashioned parallel ports, which were designed mostly for connecting printers, or serial ports, which were used mainly for modems, USBs are meant for plug-and-play connectivity to multiple types of attachable devices: storage products, cameras, and DVDs, for example, along with printers and modems..
“Social Engineering”
Cyber-criminals also use a variety of “social engineering” maneuvers to obtain users' Internet passwords, and even to get into the inner workings of network servers.
As the new conducts of cyber crime are on the rise same with this the new technologies to fighting back with these are also budding. Some of them are:-
Anti-virus software
This software is used to find viruses on a computer system, as well as to “quarantine” or “kill” these viruses.
Internet firewalls
Available as either hardware or software, Internet firewalls are used to keep private networks separate from the Internet.
Intrusion detection systems
These systems are designed to stay on the lookout for break-ins to the computer network. If a network intrusion is detected, IS personnel can be alerted instantaneously, either by e-mail or pager.
Conclusion
Computer crime is a new phenomenon all-encompassing the world as well as our economy. It is a new-fangled obsession that has people, companies, and now the government in fits of laughter.
Albeit the fact that there are many imperative problems in our country which are needed to be set on, the problem of skirmishing the cyber – crime can not be placed out of attention. It is necessary to develop methodological, theoretical and practical basis for information shield within global Internet network. The current burning need is the complex resolution of the indicated problems. Their resolution will allow to overcome most risks.
References:-
1. Dr. B. Muthukumaran, Chief Consultant, Gemini communication Ltd., Cyber Crime Scenario in India.
2. Ethical hacking, by C. C. Palmer, IBM systems journal, vol 40, no 3, 2001
3. Organized Crime and Cyber-Crime: Implications for Business Phil Williams, CERT® Coordination Center.
4. Cyber Crime . . . and Punishment? Archaic Laws Threaten Global Information December 2000, A Report Prepared By Mc Connell International.
5. Management Information System 7th addition by, James O’brien
6.http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
1. Ms. Ritika Khanna, Lecturer, IFTM, MBD.
2. Ms. Nishtha Sharma, Lecturer, IFTM, MBD.
3. Mr. Ankur Bhatnagar, Lecturer, SIMT, Kashipur
Crime is a social and economic phenomenon and is as old as the human society. As, every coin has its two sides, so is the Internet, it contains positives and negatives both. For all the good it does to us, cyberspace has its dark sides too. Widely publicized attacks by the hackers on the internet have splashed the open electronic playground with a dose of cold reality and sent newcomers scrambling to beef up network security plans. Cyber crime is the newest and possibly the most convoluted trouble in the cyber world.
Whereas the universal picture on cyber crime looks miserable, the situation in India isn't any better. Cyber crimes in India are slowly sprouting from a simple e-mail crime to more grave crimes like hacking and source code theft.
So, in the paper an attempt has been made to describe the reasons of cyber crime and what modes are being used for this and also addresses the ways in which cyber security threats and risks have changed in recent years, how to more accurately assess them, and how to more effectively combat them.
Key Words: - Crime, Criminals, Hacking, Theft, Security, Internet, Cyber
The world of Internet today has become a parallel form of life and living. People are now competent of doing things which were not feasible few years ago. The competence and chance provided by the Internet have transformed many genuine business activities, enhancing the speed, ease, and range with which transactions can be conducted while also lowering many of the costs. The Internet is fast becoming a way of life for millions of people and also a way of living because of growing dependence and reliance of the mankind on these machines.
The dim side of the Internet contains not only deception and theft, pervasive pornography and pedophile rings, but also drug trafficking and criminal organizations that are more concerned about exploitation than the kind of interruption that is the focus of the impostor community.
Hart in his work “The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Relating this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the susceptibility of computers may be said to be:
1. Capacity to accumulate data in relatively small space-
The computer has exclusive characteristic of storing data in a very small space. This affords to eliminate or derive information either through physical or implicit medium makes it much easier.
2. Easy to access-
The problem came upon in safeguarding a computer system from unauthorised access is that there is every possibility of violate not due to human fault but due to the intricate technology. By secretly implanted logic bomb, key loggers that can whip access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.
3. Complex-
The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is mortal and it is not achievable that there might not be a drop at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.
4. Negligence-
Negligence is very strongly associated with human behaviour. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.
5. Loss of evidence-
Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
Tools of Cyber-Crime
What are some of the most common tools of cyber-crime? Under one approach, known as the “denial of service attack,” computer hackers flood a company's Web site with too much computer traffic. Sometimes, this forces the company's computer network to shut down completely until the attack can be brought under control.
Computer viruses, another common tool, plague corporations and consumers alike. These pieces of malicious software are especially written to make computers act in odd and often unpredictable ways.
The Melissa virus first struck in March of 1999, after being released to an Internet newsgroup in a Microsoft Word document containing a list of pornographic Web sites. Corporate e-mail sites around the world were soon swamped. Even high-tech giants such as Microsoft, Intel and Lucent Technologies had to shut down Internet access.
New Methods Always Lurking
More methods of cyber-crime are always around the corner. Over the past few years, for instance, PCs have become equipped with USB ports. Unlike old-fashioned parallel ports, which were designed mostly for connecting printers, or serial ports, which were used mainly for modems, USBs are meant for plug-and-play connectivity to multiple types of attachable devices: storage products, cameras, and DVDs, for example, along with printers and modems..
“Social Engineering”
Cyber-criminals also use a variety of “social engineering” maneuvers to obtain users' Internet passwords, and even to get into the inner workings of network servers.
As the new conducts of cyber crime are on the rise same with this the new technologies to fighting back with these are also budding. Some of them are:-
Anti-virus software
This software is used to find viruses on a computer system, as well as to “quarantine” or “kill” these viruses.
Internet firewalls
Available as either hardware or software, Internet firewalls are used to keep private networks separate from the Internet.
Intrusion detection systems
These systems are designed to stay on the lookout for break-ins to the computer network. If a network intrusion is detected, IS personnel can be alerted instantaneously, either by e-mail or pager.
Conclusion
Computer crime is a new phenomenon all-encompassing the world as well as our economy. It is a new-fangled obsession that has people, companies, and now the government in fits of laughter.
Albeit the fact that there are many imperative problems in our country which are needed to be set on, the problem of skirmishing the cyber – crime can not be placed out of attention. It is necessary to develop methodological, theoretical and practical basis for information shield within global Internet network. The current burning need is the complex resolution of the indicated problems. Their resolution will allow to overcome most risks.
References:-
1. Dr. B. Muthukumaran, Chief Consultant, Gemini communication Ltd., Cyber Crime Scenario in India.
2. Ethical hacking, by C. C. Palmer, IBM systems journal, vol 40, no 3, 2001
3. Organized Crime and Cyber-Crime: Implications for Business Phil Williams, CERT® Coordination Center.
4. Cyber Crime . . . and Punishment? Archaic Laws Threaten Global Information December 2000, A Report Prepared By Mc Connell International.
5. Management Information System 7th addition by, James O’brien
6.http://www.naavi.org/pati/pati_cybercrimes_dec03.htm