0% found this document useful (0 votes)
37 views4 pages

Cyber Crime

Uploaded by

Surojit Mondal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views4 pages

Cyber Crime

Uploaded by

Surojit Mondal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Crime

Cybercrime is defined as a crime where a computer is the object of the crime or is used as a
tool to commit an offense.
Cybercrimes fall under State subjects as per the Seventh Schedule of the Cons tu on of India.
It involves illegal or unauthorized ac vi es that exploit technology to commit various forms
of crimes.
Cybercrime covers a wide range of offenses and can affect individuals, organiza ons, and even
governments.

Types:
Distributed Denial-of-Service (DDoS) A acks: These are used to make an online service
unavailable and take the network down by overwhelming the site with traffic from a variety
of sources.
Botnets: Botnets are networks from compromised computers that are controlled externally
by remote hackers. The remote hackers then send spam or a ack other computers through
these botnets.
Iden ty The : This cybercrime occurs when a criminal gains access to a user’s personal
informa on or confiden al informa on and then tries to tarnish reputa on or seek a ransom.
Cyberstalking: This kind of cybercrime involves online harassment where the user is
subjected to a plethora of online messages and emails. Typically, cyberstalks use social media,
websites, and search engines to in midate a user and ins l fear.
Phishing: It is a type of social engineering a ack o en used to steal user data, including login
creden als and credit card numbers. It occurs when an a acker, masquerading as a trusted
en ty, dupes a vic m into opening an email, instant message, or text message.

Challenges Related to Cyber Security in India


Profit-Friendly Infrastructure Mindset:
Post liberalisa on, the Informa on Technology (IT), electricity and telecom sector have
witnessed large investments by the private sector.
Operators are not inves ng in protec ve infrastructure, rather they are focused on the
profitable infrastructure only, because they think investment on cyber-a ack preparedness
may not generate good profits.
All operators are focused on profits, and do not want to invest in infrastructure that will not
generate profits (i.e. protec ve infrastructure).

Page 1
Absence of Separate Procedural Code:
There is no separate procedural code for the inves ga on of cyber or computer-related
offences.
Trans-Na onal Nature of Cyber A acks:
Most cybercrimes are trans-na onal in nature. The collec on of evidence from foreign
territories is not only a difficult but also a tardy process.
Expanding Digital Ecosystem:
In the last couple of years, India has traversed on the path of digitalizing its various economic
factors and has carved a niche for itself successfully.
The latest technologies like 5G and Internet of Things (IoT) will increase the coverage of the
internet-connected ecosystem.
With the advent of digitalisa on, paramount consumer and ci zen data will be stored in digital
format and transac ons are likely to be carried out online which makes India a breeding
ground for poten al hackers and cyber-criminals.
Limited Exper se and Authority:
Offenses related to crypto-currency remain under-reported as the capacity to solve such
crimes remains limited.
Although most State cyber labs are capable of analysing hard disks and mobile phones, they
are yet to be recognized as 'Examiners of Electronic Evidence' (by the central government).
Un l then, they cannot provide expert opinions on electronic data.

Measures Can be Taken to Tackle Cyber Crimes in India


Cybersecurity Awareness Campaign:
The governments at various levels need to conduct massive cybersecurity awareness
campaigns, regarding Cyber frauds, use strong, unique passwords, being careful using public
wi-fi, etc.
Cyber Insurance:
Develop cyber insurance policies that are tailored to the specific needs of different
businesses and industries. Customized policies will help ensure that organiza ons have
coverage for the most relevant cyber risks they face.
Cyber insurance provides financial coverage against losses resul ng from cyber incidents and
by mi ga ng the financial impact of these incidents, organiza ons can recover more quickly
and con nue their opera ons.

Page 2
Data Protec on Law:
Data is referred to as the new currency, thus is a requirement for a stringent data protec on
regime in India.
In this context, the European Union's General Data Protec on Regula on and India’s
Personal Data Protec on Bill, 2019 are steps in the right direc on.
Collabora ve Trigger Mechanism:
For a country like India where the ci zenry is more vulnerable to cybercrime, there is an
urgent need for a collabora ve trigger mechanism.
This mechanism would bind all par es and enable law enforcers to act quickly and safeguard
ci zens and businesses from a fast-growing menace.
In this context, the Indian Cyber Crime Coordina on Centre will assist in centralizing
cybersecurity inves ga ons, priori ze the development of response tools and bring together
private companies to contain the menace.

Government Ini a ves to Cope with Cyber Crimes in India


Indian Cyber Crime Coordina on Centre (I4C): This center coordinates efforts to tackle all
types of cyber-crimes across the country.

Na onal Cyber Forensic Laboratory: It provides early-stage cyber forensic assistance to


Inves ga ng Officers of all State/UT Police through both online and offline modes.
CyTrain Portal: A Massive Open Online Courses (MOOC) pla orm for capacity building of
police officers, judicial officers, and prosecutors through online courses on cri cal aspects of
cybercrime inves ga on, forensics, and prosecu on.
Na onal Cyber Crime Repor ng Portal: A pla orm where the public can report incidents of
cyber-crimes, with a special focus on crimes against women and children.
Ci zen Financial Cyber Fraud Repor ng and Management System: It is a system for
immediate repor ng of financial frauds and assistance in lodging online cyber complaints
through a toll-free helpline.
Cybercrime Preven on against Women and Children (CCPWC) Scheme: Financial assistance
provided to States/UTs for developing capabili es of Law Enforcement Agencies in
inves ga ng cyber-crimes.
Joint Cyber Coordina on Teams: Cons tuted to enhance coordina on among Law
Enforcement Agencies of States/UTs, par cularly in areas with mul -jurisdic onal issues
related to cyber-crimes.
Central Assistance for Moderniza on of Police: Providing financial support to States/UTs for
acquiring modern weaponry, advanced communica on/forensic equipment, and cyber
policing equipment.

Page 3
Conclusion
It is of cri cal importance to ensure global coopera on through informa on sharing and
strengthening joint efforts in cybersecurity research and development as most cybera acks
originate from beyond the borders.
It is important for the corporates or the respec ve government departments to find the gaps
in their organisa ons and address those gaps and create a layered security system, wherein
security threat intelligence sharing is happening between different layers.

Page 4

You might also like