Professional Documents
Culture Documents
Submitted by:
Aman Gupta
aman.gupta.9492@gmail.com
ABSTARCT3
INTRODUCTION4
LITERATURE REVIEW 4
METHODOLOGY 5
ANALYSIS 5
FINDINGS AND RECOMMENDATION7
CONCLUSION 8
BIBLIOGRAPHY8
ABSTRACT
Cyber crime is a generic term that refers to all criminal activities done using the medium of
computers, the Internet, cyber space and the worldwide web. The internet in India is growing
rapidly. It has given rise to new opportunities in every field we can think of be it
entertainment, business, sports or education. There are two sides to a coin. Internet also has its
own disadvantages. One of the major disadvantages is Cybercrime illegal activitiy committed
on the internet. The internet, along with its advantages, has also exposed us to security risks
that come with connecting to a large network. Computers today are being misused for illegal
activities like e-mail espionage, credit card fraud, spams, software piracy and so on, which
invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise.
Here we publish an article by Nandini Ramprasad in series for the benefit of our netizens.
To look further into this matter I have collected data of previous years cybercrime records
,And conducted a research to see the current scenario.
INTRODUCTION
With growth of internet and world connected to the internet, there is a rise in crime against
internet or cyber-crime which has severally affected several individuals and groups.
Today we hear about many security breaches that affect organizations and individuals.
information
computers
allowing
that
LITERATURE REVIEW
Over the past few years, the global cyber-crime landscape has changed dramatically, with
criminals employing more sophisticated technology and greater knowledge of cyber security.
Cyber-crimes are technology based crimes and the computer or internet itself can be used as
a weapon or means to do such crimes quite freely. They are organized and white collar
crimes like cyber frauds, hacking, data theft, phishing, identity theft etc.
India truly lacks representative and democratic nature of the existing systems of internet
governance, including the management of critical internet resources, and called for cyber
jurisprudence to ensure security of the cyberspace. With over 200 million internet users,
soon going to cross half in billion in coming years, over 900 million mobile telephone
subscribers, and a thriving and robust internet ecosystem. India surely needs an effected
system to cope up with increasing cyber-crime and internet security issues.
Number of targeted attacks increased dramatically from an average of 77 per day to 82 per
day. In the past, India used to be a target of cyber-attacks for political motivation only. Over
the past few years, the global cybercrime landscape has changed dramatically, with criminals
employing more sophisticated technology and greater knowledge of cyber security. Until
recently, malware, spam emails, hacking into corporate sites and other attacks of this nature
were mostly the work of computer geniuses showcasing their talent. These attacks, which
were rarely malicious, have gradually evolved into cybercrime syndicates siphoning off
money through illegal cyber channels. Rising at alarming rate, the number of cyber-crimes in
India may touch a humungous figure of 3,00,000 in 2015, almost double the level of last
year causing havoc in the financial space, security establishment and social fabric, an
ASSOCHAM-Mahindra SSG study warned. Cyber Crime refers to all activities done with
criminal intent in cyberspace. These fall into three slots.
Those against persons.
Against Business and Non-business organizations.
Crime targeting the government
1. According to reports sponsored by the Better Business Bureau Online, over 80% of
online shoppers cited security as a primary worry when conducting business over
the Internet. About 75% of online shoppers terminate an online transaction when
asked for the credit card information. The perception that the Internet is rife with
credit card fraud and security hazards is growing. This has been a serious problem
for e-commerce.
2. As todays consumer has become increasingly dependent on computers, networks,
and the information these are used to store and preserve, the risk of being subjected
to cyber-crime is high. Some of the surveys conducted in the past have indicated as
many as 80% of the company surveyed acknowledged financial losses due to
computer breaches.
CYBER CRIME AGAINST USERS
Computers as target of crimes- Due to the Home PC the use of computers has grown
widely, such computers can become target of crime either in the physical or in the
virtual manner, i.e. parts of the computer can be stolen example the hard disk thus
leading to physical break-ins. Unauthorized access to the computer leading to
confidential data loss will amount to virtual targeting of the computer, this will
amount to a 15 crime of data theft, which is termed as hacking in the ordinary
parlance. Other forms of crimes in which the computer is the target include offences
the way in which images and videos will be exchanged, with greater availability and
concealment. Child pornographers often argue that they are not doing anything wrong.
Attacks on Infrastructures-Critical infrastructures will be targeted by cyberterrorism
for various reasons. Power distribution networks, transportation networks, and
communication networks are expected to undergo attacks intended to paralyse a
nation by depriving it of its vital services. Such attacks could cause unprecedented
crises on many levels, including the economy, safety, health, sanitation, civil peace,
and more. In addition, hackers and other cybercriminals (even governments
themselves) could further target their opponents. They may include attempts to attack
informational sites, with a growing number of counterattacks by some governments or
resistance group.
METHODOLOGY
DATA ANALYSIS
Hacking, publication of obscene contents, credit card and banking frauds among other cybercrimes have registered an annual increase of more than 40% in the country in the past two
years.
According to Home Ministry statistics, as many as 71,780 cyber frauds were reported in
2013, while 22,060 such cases were reported in 2012. There have been 62,189 incidents
of cyber frauds till June 2014
40,000
30,000
20,000
10,000
0
2012
2013
2014(till june)
In 2013, a total of 28,481 Indian websites were hacked by various hacker groups spread
across the globe. The number of hacking incidents were 27,605 in 2012 and 21,699 in
2011
Number of crimes
30,000
25,000
20,000
Number of crimes
15,000
10,000
5,000
0
2011
2012
2013
A total of 1,791, 2,876 and 4,356 cases were registered under the Information Technology
Act in 2011, 2012 and 2013, respectively. A total of 422, 601 and 1,337 cases were
registered under cyber crime related sections of the Indian Penal Code in 2011, 2012 and
2013, respectively.
5,000
4,500
4,000
3,500
3,000
Cases under IT act
2,500
2,000
1,500
1,000
500
0
2011
2012
2013
Ministry of Home Affairs has released Cyber Crime Statistics for the 2013 year, which again
shows rapid increase in cyber-crime by 50% on year to year basis from 2012 to 2013. The
statistics mainly show cases Registered under Cyber Crimes by Motives and Suspects (States &
UTs): The maximum offenders came from the 18-30 age group. Among states, the highest
incidents of cyber-crime took place in Maharashtra (907) followed by Uttar Pradesh (682) and
Andhra Pradesh (651).
The maximum cyber-crime arrests of four hundred twenty six (426) under the IT Act took place
in Maharashtra and Andhra Pradesh was a distant second with 296 arrests, followed by Uttar
Pradesh with 283 arrests.
In percentage terms, the state that saw the most dramatic increase in cases registered under the
IT Act was Uttarakhand at 475% (from 4 cases to 23); Assam a close second with 450% (from
28 cases to 154). Interestingly, the picture postcard union territory, Andaman and Nicobar
islands, registered an eye-popping increase of 800% (two cases in 2012 to 18 in 2013) in the
same category.
Always avoid sending any photograph online particularly to strangers and chat friends
as there have been incidents of misuse of the photographs.
Always use latest and update anti-virus software to guard against virus attacks.
always keep back up volumes so that one may not suffer data loss in case of virus
contamination
Never send your credit card number to any site that is not secured, to guard against
frauds.
Always keep a watch on the sites that your children are accessing to prevent any kind
of harassment or depravation in children.
It is better to use a security programme that gives control over the cookies and send
information back to the site as leaving the cookies unguarded might prove fatal.
Web site owners should watch traffic and check any irregularity on the site. Putting
host-based intrusion detection devices on servers may do this.
web servers running public sites must be physically separate protected from internal
corporate network.
CONCLUSION
Change is inevitable and the dilemmas that advancement in technology poses cannot be
avoided, the truth is that the criminals have changed their method and have started relying of
the advanced technology, and in order to deal with them the society the legal and law
enforcement authorities, the private corporations and organizations will also have to change.
Further such experts must not only be knowledgeable but must also be provided with
necessary technical hardware and software so that they can efficiently fight the cyber
criminals. Thus necessary facilities must be established in various parts of the country so
that crime in the virtual world can be contained20. Another aspect which needs to be
highlighted is that a culture of continuous education and learning needs to be inculcated
amongst the legal and the law enforcement authorities because the Information Technology
field is a very dynamic field as the knowledge of today becomes obsolete in a very short
time. Lastly the preamble of the Information Technology Act 2000 provides that the act was
passed with the objective to give legal recognition for transactions carried out by means of
electronic data interchange and other means of e-commerce, further the act has also made
amendments to the Indian Penal Code 1860, Indian Evidence Act 1872, The Bankers Books
of Evidence Act 1891, and the Reserve Bank of India Act 1934 for facilitating legal
recognition and regulation of the commercial activities. Though this objective of the act is 18
not to suppress the criminal activity, this act has defined certain offences and penalties to
smother such omissions, which is understood to come within the characterization of cyber
crimes. From this it can be inferred that the law cannot afford to be static, it has to change
with the changing times and viz. cyber space this is all the more required, as there many
application of the technology that can be used for the betterment of the mankind, similarly it
equally true that such application can also be used for the detriment of the mankind as has
been demonstrated by the Spycam case. The bottom line is that the law should be made
flexible so that it can easily adjust to the needs of the society and the technological.
BIBLIOGRAPHY
http://www.ijecs.in/issue/v2-i8/41%20ijecs.pdf
http://www.ijemr.net/DOC/AStudyOnCyberCrimeAndSecurityScenarioInINDIA(1318)48f66c6f-4d11-4f64-95ec-a3600f6cd9d3.pdf
http://cybercellmumbai.gov.in/html/cyber-crimes/index.html