You are on page 1of 15

CYBER CRIME &

ENFORCEMENT IN INDIA

 Seminar on Cyber Crimes on 26th August


2009 at GTEC, Vellore

- W.S.Guruprasath
- V.Palaniraja
- Sri Sankara Arts and Science College,
Kanchipuram.
Introduction to Cyber crime
 Computer Crime, E-
Crime, Hi-Tech Crime
or Electronic Crime is
where a computer is the
target of a crime or is
the means adopted to
commit a crime.
 Most of these crimes are
not new. Criminals
simply devise different
ways to undertake
standard criminal
activities such as fraud,
theft, blackmail, forgery,
and embezzlement using
the new medium, often
involving the Internet
Types of Cyber crimes
 Credit card frauds
 Cyber pornography
 Sale of illegal articles- Crime against Government
narcotics, weapons, wildlife
 Online gambling
 Intellectual Property
crimes- software piracy,
copyright infringement,
trademarks violations, Crime against property
theft of computer source
code
 Email spoofing
 Forgery
 Defamation Crime against persons
 Cyber stalking (section 509
IPC)
 Phising
 Cyber terrorism
Computer Viruses
 Viruses
 A computer virus is a
computer program Viruses
that can infect other
computer programs by
modifying them in
such a way as to
include a (possibly
evolved) copy of it.
Note that a program
does not have to
perform outright File Boot record
Boot and
file
damage (such as infectors infectors
viruses
deleting or corrupting
files) in order to be
called a "virus".
Cyber crimes

Web jacking

Denial of
Information E-mail Salami Trojan
Hacking Service
Theft bombing attacks attacks
attacks
1. Unauthorized Access

3. Packet Sniffing

5. Tempest Attack

7. Password Cracking

9. Buffer Overflow
Frequency of incidents of Cyber crimes in India

Denial of Service: Section


43
Virus: Section: 66, 43
Data Alteration: Sec. 66
U/A Access: Section 43
Email Abuse: Sec. 67,
500, Other IPC Sections
Data Theft: Sec 66, 65

Source: Survey conducted by ASCL


MALWARE

 Malicious Software
• Melissa, CIH/Chernobyl, Happy99, Explore Zip
• Chews up hard disks, corrupts files, disrupts
operations.
• Transmitted through the internet via popular e-mail
features to propagate itself
 Melissa through MS Word 97 and 2000

applications
 Happy99.exe Trojan Horse displays “Happy99”

and fireworks, and then mails itself to lots of


people with addresses on the victim’s browser.
 Melissa: cost $93 - 385 million in damage!
MSIA711.02 8
Protect your Computers!
 Use anti-virus software and  Don't share access to your
firewalls - keep them up to computers with strangers
date
 If you have a wi-fi network,
 Keep your operating system password protect it
up to date with critical security
updates and patches  Disconnect from the Internet
when not in use
 Don't open emails or
attachments from unknown  Reevaluate your security on a
sources regular basis
 Use hard-to-guess passwords.
Don’t use words found in a
 Make sure your employees
dictionary. Remember that and family members know
password cracking tools exist this info too!

 Back-up your computer data


on disks or CDs often
Wireless Security Concerns
1) Availability of free
WAP detection and
logging tools like
Netstumbler and Kismet

2) War Driving-where
individuals drive (or walk)
Around to find
unprotected and
accessible WAPs
3) Consumer and even
system administrators
fail to configure their
systems adequately
CYBER CRIME
INCIDENT HANDLING
1. Continuing Operations v.
Preservation of Evidence
2. Identify the Incident Manager and
Team – usually department heads or
officers
3. Assess Systems Impaired and
Damages
4. Review Adequate Logging/Tracking
5. Note Unusual Activities By
Employees or on Computer Network
WORKING WITH LAW
ENFORCEMENT
 Identify your LOSS, HARM, or DAMAGE
– lost asset, revenues, expenses,
repair cost
 Identify Capture or Quarantine
Electronic or Computerized Equipment,
Logs and Files
 Maintain a “Chain of Custody” for
Evidence
 Begin a written chronology of events
 Who may have to testify
 Identify one or two individuals to be
your main point of contact with LEOs
 Alert Your General Counsel or Attorney
1. Cyber laws punish the Cyber Criminals.

2. The Information Technology Act, 2000 defines all the


Cyber laws in India.

6. Unauthorized Access - 2 years of Jail or fine.

8. Computer Hacking - 3 years of Jail or fine up to


Rs. 2,00,000/-

11. Virus Attacks - 1 year of Jail & fine up to


Rs. 2,00,000/-
1. Firms, civil societies, governments should work
cooperatively to
strengthen legal frameworks for cyber security.

2. Governments should assure that their laws apply to cyber


crimes.

3. Firms should secure their networked information.


QUERIES??

THANK YOU

You might also like