CYBER BULLIES: THE HIDDEN TERRORIST

CYBER BULLIES: THE HIDDEN TERRORIST

Author : Prapti Derasari

“Can we secure the world from a bloodless war? I’m talking about cyber security. India must take the lead in cyber security trough innovations.” – Honorable PM Narendra Modi

Introduction:

Here, the word cyber means relating to or characteristics of the cultural of computer, information technology and virtual reality. And the word crime means an action or omission which constitutes an offence and is punishable by law. Together, “Cyber Crime” is a criminal activities carried out by means of computer or the internet.

 Before going in to the details about what is cyber crime, I would like to share my experience which I have faced yesterday. Due to COVID19, my university has decided to take online examination, which was going to start from 6th August 2020 and before that, university has declared mock test on 1st and 2nd August 2020. Suddenly on 1st August at 10:30 am when we opened our website, website didn’t work. After few minutes, the university declared that mock test and our upcoming examinations are postponed and the reason for being postponed was “CYBER ATTACK.” Yes ! Our university has faced cyber attack, whole software has been damaged. I am not much aware about the details of crime. But yes the cyber attack was taken place by DDOS. University is trying to resolve the problem, but here the main topic is not our examinations being postponed, the main topic is why we were not having security against this type of crime. Every day in India billions of people are becoming victims of cyber attack result some suffers by losing their crores of rupees, some are being affected personally.

Cyber crime, is a type of crime that is committed in the cyber world. This crime is very new type of crime which has spreaded its roots to almost every aspects of life of the Citizens. Our India has defines in detail about cyber crime and its types in Information Technology Act 2000 or the IT Act 2000.  According to a survey by IPSOS, the frequency of complaint filed by Indians are much higher, that is 32% higher than compared to U.S., U.K. and other technology advances countries where it ranges only about 11-15%. Cyber crimes are such crimes are done using internet and face less crimes and without any type of time limited. The word cyber crime is very widen term. It includes so many detail broad aspects. If we talk about our current situation, where whole world  is suffering from COVID 19, all people have started using e-shopping and e-banking transactions, with these crime of cyber has also increased. India took a big step into the world of cyber laws by making amendments in the already existing four laws i.e. Indian Penal Court, Indian Evidence Act 1870, Bankers Books Evidence Act 1891, Reserve Bank of India Act 1934, and these brings us into so many advantages like

  • Access Control
  • Authentication
  • Data Privacy
  • Confidentiality
  • Integrity
  • Non-Repudiation

Audit of electronic transaction are useful in area of e-commerce, e-banking, e-governors, tele-medicine, etc. the cyber crimes can be divided into two groups- computer crimes and computer relates crimes. (let us see in details)

Unauthorized Access Interception  

  • Hacking
  • Interception
  • Time Theft

Alteration of Computer Data

  • Logic Bomb
  • Trojan-horse
  • Virus
  • Worm
  • False Data Entry (Data Diddling)
  • Salami technique
  • Trapdoors
  • Data linkage

Computer related frauds

  • Cash Dispensaries
  • Computer Forgery
  • Program Manipulation
  • Program Piracy
  • Fraud at payment points

Unauthorized Reproduction 

  • Software Piracy

Computer Sabotage

  • Hardware Sabotage
  • Software Sabotage

Miscellaneous Cyber Crime

  • Theft of Trade Secret
  • Distribution of Anti Social Material
  • Eavesdropping and Spying
  • Diggybacking and Tailgastion
  • Scanning
  • Scavenging and Reuse
  • Masquerading  (impersonation)
  • Asynochronous
  • Computer Component Thefts

Other Computer related Offences

  • Unauthorized Modification of Data
  • Blackmail
  • Pornography
  • Computer Viruses
  • Forgery and Counterfeiting
  • Tele Communication Frauds
  • Threatening Emails
  • Online Bank Frauds
  • Program Frauds

Networks and Forensics also plays important roles in Cyber Crime like Windows event logs, internet information server, Unix system log, web servers, network services, etc. Crimes and mobile evidence can be useful in crime which is divided into GSM, CDMA, TDMA-TECH, GPRS, EDG, SATTELITE PHONES.

Various rules and regulations which are developed under cyber crime are:

  • THE DIGITAL SIGNATURE (END ENTITY) RULES, 2015
  • IT (RECOGNATION OF FOREIGN CERTIFYING AUTHORITIES OPERATING UNDER A REGULATORY AUTHORITY) REGULATION,2013
  • IT (NATIONAL CRITICAL INFORMATION INFRASRTUCTURE PROTECTION CENTRE AND MANNER OF PERFORMING FUNCTIONS AND DUTIES) RULES, 2013
  • IT (INTERMEDIARIES GUIDELINES ) RULES, 2011
  • IT ( GUIDELINES FOR CYBER CAFÉ ) RULES, 2011
  • IT ( RESONABLE SECURITY AND PROCEDURES AND SENSITIVE PERSONAL DATA OR INFORMATION ) RULES< 2011
  • IT ( PROCEDURE AND SAFEGUARDS FOR BLOCK IN FOR ACCESS OF INFORMATION BY PUBLIC) RULES, 2009

Few landmark judgments under IT Act:

  • National Association of Software and Service Companies v. Ajay Sood And Ors
  • Firoz v. State of Kerela , AIR 2006 Ker 279
  • Avnish Bajaj v. State

Conclusion:

At last I would like to say that, though not all people are victims to cyber crime, they are still at risk. Crimes by computer vary, and they don’t always occur behind the computer but they executed by the computer. The hacker’s identity is ranged between twelve years young to 67years old. The hacker could live three continents away from its victim, and they wouldn’t even know they were being hacked. Crimes done behind the computer are the 21st centuries problem. with the technology increasing, criminals don’t have to rob banks, nor do they have to be outside in order to commit any crime. There weapons aren’t guns any more; they attack with mouse cursors and passwords.

“It takes 20 years to build a reputation and few minutes of cyber incident to ruin it.”

Be careful with Cyber Crimes!