Sociology Resarch Paper 2
Sociology Resarch Paper 2
Sociology Resarch Paper 2
1
INDEX
1 ABSTRACT 3
2 INTRODUCTION 3
6 6
RECENT CYBER CRIME IN INDIA
9 CONCLUSION 8
10 BIBLIOGRAPHY 9
2
ABSTRACT
Everything have their own drawback and cyber world also have its own drawback . Though it makes the
life so quick and easy , but hurled under the eclipse of threat from the deadliest type of criminality termed
as 'Cyber crime’ without computers, entire businesses and government operations would almost cease to
function. This propagation of cheap, powerful, user-friendly computers has enabled more and more
people to use them and, more prominently, rely on them as part of their normal way of life. Cyber crime
is emerging as a serious threat. Worldwide governments, police departments and intelligence units have
started to react. Initiatives to curb cross border cyber threats are taking shape.
INTRODUCTION:
cyber crime is the most complicated problem in the cyber world .a suitable definition for cyber crime is
"unlawful act wherein the computer is either a tool or target or both” Cyber criminal committed various
form of computer technology such as use of online social network bully other or sending sexually explicit
digital photos with a smart phones, hacking, copyright infringement, unwarranted mass-
surveillance, child pornography, and child grooming. He advent of computers and the expansion of the
Internet made likely the accomplishment of large improvement in research, surgery, expertise, and
communication. The Internet Tax Freedom Act (ITFA) was enacted on (October21, 1998) as Title XI of
Division C of the Omnibus Consolidated. In other phrases, the Internet is a large computer mesh, or a
string of connections of computers that are attached together. Now in present day cyber crimes in one of
the problems which cannot be easily solve. Cybercrime may make threats a person or a nation's security
and financial health.
RESEARCH METHODOLOGY
This research paper mainly collected information ,sources through the doctrine study or doctrine manner
of methodology .doctrine study have primary and secondary sources include newspaper ,magazines,
books
HYPOTHESIS
RESEARCH QUESTION
3
RESON FOR CYBER CRIMES:
Applying this to the cyberspace we may say that computers are vulnerable so rule of law is
required to safeguard them against cyber crime. The reasons for the vulnerability of computers
may be said to be:
1. Capacity to store data in small space: The computer has unique characteristic of storing data in
a very small space. This affords to remove or derive information either through physical or virtual
medium makes it much easier.
2. Access easy: The problem encountered in guard a computer system from unauthorized access is
that there is every possibility of breach not due to human mistake but due to the difficult
technology. in secret implanted logic bomb, key loggers that can steal access codes, advanced
voice recorders; retina imagers etc. bypass firewalls can be utilized to get past many a security
system and that can fool biometric systems .
3. Complex: The computers work in use systems and these operating systems in revolve are
composed of millions of codes. Human mind is not stable at every point and it is not possible that
there will be no lapse at any stage. The cyber criminals take advantage of these situation and
lacunas and penetrate into the computer system.
4. Negligence connected with human conduct. It ismany possible at many time that while we are
busy in protecting the computer system there might be any negligence, which in turn provide a
cyber criminal to add access and control over the computer system.
Cyber criminals
There are several type of people who commit cyber crimes. We can categorize them in the following
categories.
1. Script kiddies
These are mainly the children who are aged between 6-18 years. They don’t have much technical
knowledge. But they have enough knowledge and hacking programs developed by coder so that they can
hack less secure sites. The reason behind their activity is their curiosity and their wish to explore things.
Another possible reason is they want to show themselves superior amongst others of their age.
2. Organised group
These people are not much interested about gaining money. They form group by involving other hackers
who have the same ambition. They organized themselves to fulfill certain objectives. The reasons behind
the objectives may be political bias, caste discrimination, community issues etc. Some of the examples are
“stuxnet” worm (which was attacked against Iran’s atomic program), different malwares which attack on
different country’s government sites. Further big sites like NASA, MICROSOFT, GOOGLE always
found themselves under the hacker’s attack.
3. Paid hackers
The main intention of these people are to make money anyhow using any type of aillegal methods. Some
big companies also hire them to check if there is any loophole in their security system or not. For this they
4
pay a huge amount of money to the hackers. Even some companies or some group hire them to access
data of their rival groups and conquer them in respective field.
4. Insiders
These people are considered to be most dangerous. As they often work inside the organization so they
know about the loopholes. They do such things due to mainly one reason. That is to take revenge against
their employer or organization boss. If they get sacked or get humiliated in front of others or they are not
satisfied with their supervisor so they hack the system and misuse it.
CYBER CRIMES
CYBER TERIRORISM :
Cyber terrorism represent attack and thetas of attack against computer which is unlawful .the main
motive of cyber terrorism is create fear among the groups and further their own motive which is political
agenda or goals or gain fellowship by succeeding their attack. in the year 2002 showed that the most
dangerous nation for originating malicious cyber attack in the US with 35.4% of the case down from 40%
for the first half of the same years. south Korea came next with 12.8%,folled by china with 6.2%germany
,France and UK with6.1%, 45 and 2.2% respectively
Department of Information Technology has constituted The National Crisis Management Committee
(NCMC) monitors the progress & implementation of the plan. As per the plan every Ministry/Department
should create internal crisis management committee. According to NCMC plan, each state would also
have to create state crisis management committee under the state chief secretary.
Central Bureau of Investigation (CBI) started Cyber Crimes Research & Development Unit (CCRDU),
Cyber Crime Investigation cell (CCIC), Cyber Forensics Laboratory & Network Monitoring Centre.
Information Technology(Amendment) Act, 2008 has designated CERT-In to serve as the national agency
to perform the functions in the area of cyber security, CERT-in also has different components for critical
infrastructures like Defense, Finance and IT etc.
National Information Security Assurance Program (NISAP) was conducted by CERT-in to create
awareness in Government and critical sector organizations and to develop and implement information
security policy and information security best practices based on ISO/IEC 27001.
National Technical Research Organization (NTRO) under Prime minister’s office monitors, gathers
intelligence and keeps a watch on emerging and imminent cyber threats.
Though in India many have terrorist organizations and many more are there, worldwide but the utilization
of cyber attack is not directly reported, any important cases, except in case of Indian Mujahideen, which
has used e-mail system through Wi-Fi hacking to gain the media attention
5
Recent cyber crimes in India
1
In august, 2018 due to ransomware attacks a bank named Cosmos bank based on pune lost its 94 crore.
In the last few years computers using Microsoft were robbed by cyber criminal using such malwares.
According to Anurag Tiwary of HDFC ERGO General Insurance this type of crime has grown by almost
90% from 2015 to 2017.
Recently in chandivali, Mumbai a fraud case has been detected. Mainly the fraudsters aimed the Canada
based clients of the company. The criminals had been email spoofing with the company as they did a
minor change in their email id so that it was not observed and cheated them. Later they found that this
type of things happened with them earlier in june. A Client from Canada ordered spare parts of 8,120
Canadian dollars (Rs 4.33 lakh). So the criminals took the money by giving their own account details
through the slightly changed email.
In march, 2018 SonalMaheswari a bank employee of Borivali found theft of 1.56 lakh from her bank
account. She got the information by her email. Then she tried to access her atm card but she failed as the
entered pin was said invalid because the thieves changed her atm’s pin. They may have changed her RTN
as she was not getting any messages for transactions in her number. According to her bak statement from
7th of February to march 1 there was 14 withdrawals from her account.
In January, 2018 a case came into the notice when CEO of khadi village industries registered a complain
telling that someone asked money from his friends in his name. The fraudster cooked an emotional story
about surgery of his friend’s daughter and gave an alibi of being in abroad so he could not help. A friend
of Haresh Shah believed in the story and sent 1 lakh in the given account number. Later he found himself
being cheated as Haresh told he did not send such mails.
A woman who befriended a man on Facebook a few weeks ago got him arrested on March 22 after he
allegedly tried to extort money from her by threatening to post her semi-nude photographs on social
media. Police said the 24-year-old complainant, who is married and has a daughter, took the man to RAK
Marg police station where a case of criminal intimidation and extortion was registered and he was
arrested.
United Nations Commission on Trade Law. As a consequence of which the Information Technology Act
2000 was passed and enforced on 17th May 2000.The Information Technology Act deals with the various
cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67.
1Stay Updated : one thing we can do to prevent we should do operating system and browser updated.
We should Installing security patches which will help us to protect us from these flaws. Luckily, most
1
The Indian express,Wednesday,october24,2018
6
of the window and browsers have settings to update automatically, so we don’t have to do anything other
than stay protected.
2Use Strong, Unique Password: password is also one of the matters of prevention according to a
report by Verizon, 63% of data breaches were the result of weak or stolen passwords. but by using strong
password, we could prevented we should use unique passwords on every site and avoid social login to
prevent hackers from getting our login information once and using it everywhere.
If any one one send msg on email or other social network site or anything seems odd when we didn’t
recognize the sender then we should avoid the the sender or delete the massage Sadly, 30% of phishing
emails get opened, leading to identity theft, malware, and ransom ware. To prevent cyber crime we should
avoid them we can’t trust .If you receive a message from a site you use that tells you that something’s
wrong with your account, don’t click the link in the email. Instead, exit the email and visit the website
directly via your browser. If you can’t find any issues, contact customer service to explain the email. It’s
safer and prevents many phishing scams from succeeding.
Some time some web site can ask us for whole history of our life . its only just for marketing purposes.
However, we don’t have any idea what the site do with that information. The only details we should ever
need to provide while shopping online is our payment details and our shipping address.If any site asking
for additional personal details and we are not comfortable to sharing formation then we should go for
another site .
Always look for HTTPS in the address bar of your browser when visiting any sites where you’ll provide
personal or financial details, such as shopping and banking sites. This identifies that the website is using a
security certificate the encrypts the data sent between you and the site.
7
Most browsers provide details on a site’s security certificate to help you determine if a site’s legitimate or
not. Taking those few extra seconds is just one way to take charge of cybercrime prevention.
Conclusion
It is not possible to remove cyber crime from the cyber space. It is quite possible to ensure them. History
is the viewer that no legislation has succeeded in totally eliminating crime from the globe. Now day by
day cyber crime has been increased. hare are many provision which look over the cyber crime .everything
has their own benefits and drawback and we should carefully handle all this this form that we can all
prevent cyber crime .
8
BIPLIOGRAPHY
9
10