CYBER CRIME & ENFORCEMENT IN INDIA
-
Seminar on Cyber Crimes on 26th August 2009 at GTEC, Vellore W.S.Guruprasath V.Palaniraja Sri Sankara Arts and Science College, Kanchipuram.
Introduction to Cyber crime
Computer Crime, ECrime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet
Types of Cyber crimes
Credit card frauds Cyber pornography Sale of illegal articlesnarcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Defamation Cyber stalking (section 509 IPC) Phising Cyber terrorism
Crime against Government
Crime against property
Crime against persons
Computer Viruses
Viruses A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a "virus".
Viruses
File infectors
Boot record infectors
Boot and file viruses
Cyber crimes
Web jacking
Hacking
Information Theft
E-mail bombing
Salami attacks
Denial of Service attacks
Trojan attacks
1. Unauthorized Access
3. Packet Sniffing
5. Tempest Attack
7. Password Cracking
9. Buffer Overflow
Frequency of incidents of Cyber crimes in India
Denial of Service: Section 43 Virus: Section: 66, 43 Data Alteration: Sec. 66 U/A Access: Section 43 Email Abuse: Sec. 67, 500, Other IPC Sections Data Theft: Sec 66, 65
Source: Survey conducted by ASCL
MALWARE
Malicious Software • Melissa, CIH/Chernobyl, Happy99, Explore Zip • Chews up hard disks, corrupts files, disrupts operations. • Transmitted through the internet via popular e-mail features to propagate itself Melissa through MS Word 97 and 2000 applications Happy99.exe Trojan Horse displays “Happy99” and fireworks, and then mails itself to lots of people with addresses on the victim’s browser. Melissa: cost $93 - 385 million in damage! MSIA711.02
8
Protect your Computers!
Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources
Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist
Back-up your computer data on disks or CDs often
Don't share access to your computers with strangers
If you have a wi-fi network, password protect it
Disconnect from the Internet when not in use
Reevaluate your security on a regular basis
Make sure your employees and family members know this info too!
Wireless Security Concerns 1) Availability of free WAP detection and logging tools like Netstumbler and Kismet 2) War Driving-where individuals drive (or walk) Around to find unprotected and accessible WAPs 3) Consumer and even system administrators fail to configure their systems adequately
CYBER CRIME INCIDENT HANDLING 1.
2.
3.
4. 5.
Continuing Operations v. Preservation of Evidence Identify the Incident Manager and Team – usually department heads or officers Assess Systems Impaired and Damages Review Adequate Logging/Tracking Note Unusual Activities By Employees or on Computer Network
WORKING WITH LAW ENFORCEMENT
Identify your LOSS, HARM, or DAMAGE – lost asset, revenues, expenses, repair cost Identify Capture or Quarantine Electronic or Computerized Equipment, Logs and Files Maintain a “Chain of Custody” for Evidence Begin a written chronology of events Who may have to testify Identify one or two individuals to be your main point of contact with LEOs Alert Your General Counsel or Attorney
1. Cyber laws punish the Cyber Criminals.
2. The Information Technology Act, 2000 defines all the Cyber laws in India.
6. Unauthorized Access -
8. Computer Hacking
-
2 years of Jail or fine.
3 years of Jail or fine up to Rs. 2,00,000/-
11. Virus Attacks
-
1 year of Jail & fine up to Rs. 2,00,000/-
1. Firms, civil societies, governments should work cooperatively to strengthen legal frameworks for cyber security.
2. Governments should assure that their laws apply to cyber crimes.
3.
Firms should secure their networked information.
QUERIES??
THANK YOU