Chapter 1 - Cyber Security
Chapter 1 - Cyber Security
Chapter 1 - Cyber Security
Prof. P. S. Avadhani
M. Tech., PhD., F.I.E,FCSI, FAPAS.
Password Sniffing
Password Sniffers are programs that monitor and record
the name and password of network users as they login,
jeopardizing security at a site.
Whoever installs the Sniffer can then impersonate an
authorized user and login to access restricted
documents.
Credit Card Frauds
Millions of dollars may be lost annually by consumers
who have credit card and calling card numbers stolen
from online databases.
Bulletin boards and other online services are frequent
targets for hackers who want to access large databases
of credit card information.
Identity Theft
Identity theft is a fraud involving another person’s
identity for an illicit purpose.
This occurs when a criminal uses someone else’s
identity for his/her own illegal purposes.
The cyberimpersonator can steal unlimited funds in the
victim’s name without the victim even knowing about it
for months, sometimes even for years!
Cybercrime: The Legal Perspectives
Computer Crime: Criminal Justice Resource Manual (1979)
The first comprehensive presentation of computer crime
computer-related crime was defined in the broader
meaning as: any illegal act for which knowledge of
computer technology is essential for a successful
prosecution.
Cybercrime:
outcome of “globalization.” Globalized information
systems accommodate an increasing number of
transnational offenses. This problem can be resolved in
two ways:
1. Divide information systems into segments bordered by
state boundaries and 2. Incorporate the legal system into an
integrated entity obliterating these state boundaries.
Cybercrimes: An Indian Perspective: India has the
fourth highest number of Internet users in the world.
there are 45 million Internet users in India
37% - from cybercafes
57% of users are between 18 and 35 years.
A point to note is that the majority of off enders were
under 30 years.
About 46% cybercrime cases were related to
incidents of cyberpornography
In over 60% of these cases, off enders were between
18 and 30 years.
Cybercrime and the Indian ITA 2000: The first step
toward the Law relating to E-Commerce at international
level to regulate an alternative form of commerce and to
give legal status in the area of E-Commerce.
Hacking and the Indian Law(s)
Cybercrimes are punishable under two categories: the
ITA 2000 and the IPC.
A total of 207 cases of cybercrime were registered under
the IT Act in 2007 compared to 142 cases registered in
2006.
Under the IPC too, 339 cases were recorded in 2007
compared to 311 cases in 2006.
A Global Perspective on Cybercrimes
In Australia, cybercrime has a narrow statutory meaning as
used in the Cyber Crime Act 2001, which details offenses
against computer data and systems.
In the Council of Europe’s (CoE’s) Cyber Crime Treaty,
cybercrime is used as an umbrella term to refer to an array
of criminal activity including offenses against computer
data and systems, computer-related offenses, content
offenses and copyright offenses. There have been a number
of significant developments such as
1. August 4, 2006 Announcement: The US Senate ratifies
CoE Convention on Cyber Crime.
2. In August 18, 2006, there was a news article published
“ISPs Wary About ‘Drastic Obligations’ on Web Site
Blocking.”
A Global Perspective on Cybercrimes
3. CoE Cyber Crime Convention (1997–2001) was the
first international treaty seeking to address Internet
crimes by harmonizing national laws, improving
investigative techniques and increasing cooperation
among nations.
Cybercrime and the Extended Enterprise
It is the responsibility of each user to become aware of
the threats as well as the opportunities that
“connectivity” and “mobility” presents them with.
Extended enterprise - represents the concept that a
company is made up not just of its employees, its board
members and executives, but also its business partners,
its suppliers and even its customers (Fig. 5).
Cybercrime Era: Survival Mantra for the Netizens
Netizen is someone who spends considerable time online and also has a
considerable presence online (through websites about the person,
through his/her active blog contribution and/or also his/her participation
in the online chat rooms).
The 5P Netizen mantra for online security is: (a) Precaution, (b)
prevention, (c) Protection, (d) Preservation and (e) Perseverance.
For ensuring cybersafety, the motto for the “Netizen” should be
“Stranger is Danger!”