Cyber-Attack Issues: Laws & Policies and The Role of Librarians
Cyber-Attack Issues: Laws & Policies and The Role of Librarians
Cyber-Attack Issues: Laws & Policies and The Role of Librarians
59002
www.nepjol.info
1. Kedar Ghimire is Deputy Director at National Judicial Academy, Nepal. He can be contacted
at <kedar_2222@yahoo.com>.
216 ACCESS : An International Journal of Nepal Library Association, Volume - 2; 2023
Cyber-Attack Issues: Laws & Policies and the Role of Librarians
accompanied by new and serious threats. Essential services such as water and electricity
supply now rely on ICTs. Cars, traffic control, elevators, air conditioning and telephones
also depend on the smooth functioning of ICTs. The ICTs with the combination of internet
technology jointly create the complex environment that is cyberspace. Cyberspace refers
to the virtual computer world, and more specifically, an electronic medium that is used to
facilitate online communication. Cyberspace typically involves a large computer network
made up of many worldwide computer sub-networks that employ TCP/IP (Transmission
Control Protocol/Internet Protocol) protocol to aid in communication and data exchange
activities. In other words the cyberspace describes any facility or feature that is linked to
the Internet. Attacks against information infrastructure and Internet services which is also
called cyberspace now have the potential to harm society in new and critical ways.
Online fraud and hacking attacks are just some examples of computer-related crimes
that are committed on a large scale every day. The financial damage caused by cybercrime
is reported to be enormous. Cyber crime is the biggest threat to the digital transformation
and is estimated to cost economies about USD 10 trillion by 2025 (Maheshwari, 2022).
Cyber crime reflects a peculiar type of techno-sophisticated criminality having different
features. This criminality is posing the challenges to existing national legal system and it
appears to be difficult to control and combat these crimes within the existing framework
of legal system. Specially, the problem of jurisdiction, identity crises and lack of legal
recognition of most of acts make it difficult for legal systems to deal effectively with
the crime (Verma & Sharma, 2014). The location and trans-national character of these
crimes again added the flavor makes it too dangerous to imagine. Cyber-crime may be
categorized in two classes, one where the computer is an instrument and another where
computer is an incidental (Cavelty, 2012). It is not difficult to control the cyber-crimes fall
in former categories as here, computer is only an instrument and traditional legal system
is better to cope up these problems by merely recognizing it, however, it is difficult to
deal with the later class of criminality as computer technology is itself new to the legal
system and it can't deal with the merely old principles which is territorially sensitive,
jurisdictionally responsive, and susceptible to paper based culture and identity.
2. Attributes of Cyber-Attack:
We all are very familiar to the computer and internet directly or indirectly. Initially
when man invented computer and then the internet technology for communicating between
computers was evolved, he would have never thought that this cyber space could be
misused for criminal activities and which required regulations. However, as we all know,
everything has its pros and cons and so computers and internet are not an exception. Now
almost all of us might have heard the term computer crime, cyber-crime, e-crime, hi-tech
crime or electronic crime which is nothing but an activity done with a criminal intent in
cyber space.
ACCESS : An International Journal of Nepal Library Association, Volume - 2; 2023 217
Cyber-Attack Issues: Laws & Policies and the Role of Librarians
At the outset, it is necessary to briefly distinguish between a computer crime and
a cyber-crime, the rationale being that more often times than not, the two concepts are
regarded as one and same, when in fact they are only similar, but are definitely different
(Verma & Sharma, 2014). Computer crimes, are those criminal acts perpetrated with the
use of a computer; stated in other words, computer crimes includes crimes committed
against the computer hardware, the materials contained or associated with the computer
which includes the software and data; typical examples of computer crimes includes but
not limited to embezzlement, fraud, financial scams and hacking etc. Cyber-crime is an
umbrella term used to describe two distinct, but closely related criminal activities: cyber
dependent and cyber-enabled crimes, the former are offences that can only be committed
by using a computer, computer networks, or other form of ICT. These acts include the
spread of viruses and other malicious software, and distributed denial of service (DDoS)
attacks. Cyber-dependent crimes are primarily acts directed against computers or network
resources, although there may be secondary outcomes from the attacks, such as fraud and
the latter, cyber-enabled crimes, are traditional crimes that are increased in their scale
or reach by the use of computers, computer networks or other ICT; this includes but not
limited to fraud (including mass-marketing frauds, phishing e-mails and other scams;
online banking and ecommerce frauds); theft (including theft of personal information and
identification-related data); and sexual offending against children (ITU, 2016).
Due to dichotomies in jurisdictions and yet addressing the same concept in legal
literature, cybercrimes to date, has no globally accepted definition that could possibly
encapsulate all the facets of this novel brand of crime, the definitional problem of
cybercrime subsists, but one thing that is certain is that most definitions of cybercrime
make reference to the Internet; for the sake overcoming the lacuna, cybercrime has been
defined as crime committed over the Internet which might include hacking, defamation,
copyright infringement and fraud (Duggal, 2019). On this basis we can listed out the
different attributes or characteristic of the cyber-attack.
2.1 Easy to commit, difficult to detect and even harder to prove: The cyber-attacks
are easier to commit, difficult to detect and even much harder to prove compare to
the physical attack. The preparations for cyber-attack are far less visible than that
for conventional warfare. For the latter, preparations are usually evident through a
military build-up and mobilization order which are easily detectable, but there are
no visible signs of preparations when it comes to cyber-attacks.
2.2 Cyber Attacks are asymmetric: They do not require sophisticated weaponry, and
neither do they have to build expensive platforms such as stealth fighters or aircraft
carriers, in order to compromise the network of interest and pose a significant
threat. Besides state actors, there are concerns that terrorists or organized criminal
7.2 The Proposed Information Technology Bill, 2019: In light of the advantages
of technological integration among different countries, the Government of Nepal
has felt the need for a progressive and updated law on information technology.
Accordingly, the new Information Technology Bill, 2075 (IT Bill) has been
drafted to replace the erstwhile Electronic Transaction Act, 2006 and provide
a comprehensive framework for information technology, cyber security, data
protection, and intermediary liability. The Bill seeks to regulate two major areas in