Project
Project
CHAPTER-1
INTRODUCTION
1.1 Introduction
Cybercrime is a digital wrong doing any illegal activity committed using a computer
or using the net is known as cybercrime. Digital criminal acts are a variety of wrong
doings. Which utilize machines and network system for criminal exercises. The
distinction between customary unlawful acts (traditional crime) and digital wrong
doings is the digital law violations can be transnational in crime. Cyber crime is a
crime that is committed online in many areas using network and e-commerce. A
computer can be the used for an offense when an unapproved access of computer
system happens and on the other hand it influences e-commerce.
Computer crimes are criminal activity which involves the use of information
technology to give all illegal or all unauthorised access to computer system with
internet of damaging, deleting or altering computer data. Computer crime also
includes the activities such as electronic frauds, misuse of devises, identity theft and
data as well as system interference. The usage of internet service is india increasing
rapidly.
In developing economies cyber crime increased rapidly due to high usage of the
internet and digitalisation of economic activities. Need of strict statutory laws to
regulate the criminal activity in the cyber world was needed which should also aim to
protect technological advancement system as the misuse of technology was increasing
at a very high rate.
2. Phishing: phishing simply refers to steal information like passwords, credit card
details, use name etc. Over the internet. Phishing is typically carried out by email
spoofing and instant messaging. In this type of crime hackers make a direct link
which directs to the fake page / website which looks and feel like identical to the
legitimate one.
3. Denial of service: a denial service (―dos‖) is an attack or intrusion designed for use
against computer connection to the internet where by one user can deny service to
other legitimates users simply by flooding the site with so much traffic that no other
traffic that no other traffic can get in or out. The hacker isn‘t necessarily trying to
break in to the system or steal data but rather just prevent users from accessing their
own network for reason only the hackers know; revenge economical or political gain,
or just plain nastiness. For example, in feb 2000, a fifteen-year-old canadian boy
known as ―mafia boy‖ allegedly used a dos attack to shut down popular internet sites
such yahoo, amazon .com, buy.com and others.
4. Cyber stalking: cyber stalking in when a person in followed and pursued online.
Their privacy is invaded, their every move watched. It is a form of harassment, and
can disrupt the life of the victim and leave them feeling very afraid and threatened.
Stalking or being followed‘ are problems that many people, especially woman, are
familiar with. Sometimes these problems (harassment & stalking) can occur over the
internet. This is known as cyber stalking. The internet mirrors the real world.That
means it also reflects real life & real people with real problems. Although it is rare,
cyber stalking does occur, cyber stalking usually occurs with women, who are
stalking by men, or children who are stalked by adult predators or paedophiles.
5. Cyber pornography: this would include pornography website; pornography
magazines produced using computers (to publish, photos, writings etc.) Recent indian
incident revolving around cyber pornography include the air force balbharati school
case. A student of the air force bal bharati school, delhi, was teased by all his
classmate for having a pock marked face.
6. Email spoofing: a spoofing email is one that appears to originate one source bur
actually has been sent from another source. E.g. Pooja email sends and obscene from
pooja, her friend could take offence and relationship could be spoiled for life. Email
spoofing can also cause monetary damage. In an american case, a teenager made
millions of dollars by spoofing false information about certain companies whose
14. Voice phishing: the term is a combination of ―voice‖ and phishing voice
phishing is use to gain access of private, personal and financial information from the
public. Voice phishing uses a landline telephone call to information.
15. Malicious software: these are internet-based software or program that are use
to gain access to a system to steal sensitive information or data or causing damage to
software present in system.
1. Web service: the threat of attacks on web applications to extract data or to distribute
malicious code persists, cyber criminals distribute their malicious code via
legitimate wed servers they‘ve compromised. But data- stealing attacks, many of
which get the attention of media, are also a big threat. Now, we need a greater
emphasis on protecting wed servers and web application. Web servers are especially
the best platform for these criminals to steal the data. Hence one must always use a
safer browser especially during important transactions in order not to fall as a prey for
these crimes.
2. Could computing and its services: these days all small, medium and large
companies are slowly adopting could services. In other words, the world is slowly
moving towards the clouds. This latest this presents a big challenge for cyber security,
as traffic can go around traditional points of inspection. Additionally, as the
number of applications available in the cloud grows, policy control for wed
applications and cloud services will also need to evolve in order to prevent the loss
of valuable information. Through cloud services are developing their own models still
a lot of issues are being brought up about their security. Cloud may provide immense
opportunities but it should always be noted that as the cloud evolved so as its security
concerns increase.
3. Apt’s and targeted attacks: apt (advanced persistent threat) is a whole new level of
cyber crime ware. For years network security capabilities such as wed filtering or ips
have a key part in identifying such targeted attacks (mostly after the initial
compromise). As vague techniques, network security services must integrate with
other security services on order to detect attacks. Hence one must improve our
security techniques in order to prevent more threats coming in the future.
4. Mobile networks: today we are able to connect to any one in any part of the world.
But for these mobile network‘s security is a very big concern. These days firewalls
and other [security measures are becoming porous as people are using devices such as
tablets, phones, pc ‗s etc all of which again require extra securities apart from those
presents in the application used. We must always think about the security issues of
these mobile networks. Further mobile network is highly prone to these cyber crimes
a lot of care must be taken in case of their security
5. Ipv6: new internet protocol: ipv6 is the new internet protocol which is replacing
ipv4 (the older version), which has been a backbone of our networks in general and
the internet at large. Protecting ipv6 capabilities. While ipv6 is a wholesale
replacement in making more ip address available, there are some very fundamental
changes to the protocol which need to be considered in security policy. Hence it is
always better to switch to ipv6 as soon as possible in order to reduce the risks
regarding cyber crime.
6. Encryption of the code: encryption is the process of encoding messages (or
information) i such a way that eavesdroppers or hackers cannot read it. In an
encryption scheme, the message or information is encrypted using and encryption
algorithm, turning it into an unreadable cipher text, this is usually done with the use of
an encryption key, which specifies how the message is to be encoded, encryption at a
very beginning level protects data privacy and its integrity. But more use of
encryption brings more challenges in cyber security. Encryption is also used to protect
data in transit, for example data being transferred via networks (e. G. The internet, e-
commerce), mobile telephones, wireless microphones, wireless the code one cam
know if there is any leakage of information.
1. Access control and password security: the concept of user name and password has
been fundamental way of the first measures regarding cyber security.
2. Authentication of data: the documents that we receive must always be authenticated
be before downloading that is it should be checked if it has originated from a trusted
and a reliable source and that they are not altered. Authenticating of these documents
is usually done by the anti virus software present in the devices, thus a good anti
virus software is also essential to protect the devices from viruses.
3. Malware scanners: this is software that usually scans all the files and document
present in the system for malicious code or harmful viruses. Viruses, worms, and
trojan horses are example of malicious software that are often grouped together
and referred to as malware.
4. Firewalls: a fire is a software program or piece of hardware that helps screen out
hackers, viruses, and worms that try to reach your computer over the internet. All
message entering or leaving the internet pass through the firewall present, which
examines each message and blocks those that do not meet the specified security
criteria. Hence firewall play an important role in detecting the malware.
5. Anti-virus software: antivirus software is a computer program that detects, prevents,
and acts to disarm or remove malicious software program, such as include an auto-
update. Most antivirus enable the program to download profiles of new viruses so that
it can check for the new virus as soon as they are discovered. An anti virus software is
a must and basic necessity for every system.
6. Cyber ethics: cyber ethics are nothing but the code of the internet. When wepractice
these cyber ethics there are good chances of us using the internet in a proper and
safer way.
The above area few cyber ethics one must follow while using the internet. We are
always thought proper rules from out very early stages the same here we apply in
cyber space. Day, are challenging organisations with not only how they secure their
infrastructure, but how they require new platforms and intelligence to do so. There is
no perfect solution for cyber crimes bur we should try our level best and secure
future in cyber space.
―The concept of law‖ has said human beings are vulnerable so rule o law us required
to protect them. Applying this is the cyberspace we say that computers are vulnerable
so rule of law is required to protect and safeguard them against cybercrime. The
reasons for the vulnerability of computers may be said to be:
1. Capacity to store data in comparatively small space: the computer has unique
characteristics of storing data in a very small space. This affords to remove or
derive information either through physical or virtual medium makes it much easier.
2. Easy to access: the problem encountered in guarding a computer system from
unauthorized access is that there is every possibility of breach not due to human
error but due to the complex technology. By secretly implanted logic bomb, key
loggers that can steal access codes, advanced voice recorders: retina imagers etc. That
can fool biometric systems and bypass firewalls can be utilized to get past many a
security system.
3. Complex: the computers work on operating system and these operating system in turn
are composed of millions of codes human mind is fallible and its is not possible that
there might not be a lapse at any stage. The cyber criminals take advantage of these
lacunas and penetrate into the computer system.
4. Negligence: negligence is very closely connected with human conduct. It is therefore
very probable that while protecting the computer system there might be any
negligence which in turn provides a cybercriminal to gain access and control over the
computer system.
5. Loss of evidence: loss of evidence is a very common & obvious problem as all the
data are routinely destroyed. Further collection of data outside the territorial extent
also paralyses this system of crime investigation.
The cyber criminals constitute of various groups/ category. This division may be
justified on the basis of the category of cyber criminals
1. Children and adolescents between the age group of 6-18 years: the simple reason
for this type of delinquent behaviour pattern in children is seen mostly due to the
inquisitiveness to know and explore the things. Other cognate reason may be to
prove themselves to be outstanding amongst other children in their group. Further
the reason may be psychological even. E. G. The bal bharati (delhi) case was the
outcome of harassment of the delinquent by his friends.
2. Organised hackers: these kinds of hackers are mostly organised together to fulfil
certain objective. The reason may be to fulfil their political bias, fundamentalism, etc.
The pakistanis are said to be one of the best quality hackers in the world. They mainly
target the indian government sites with the purpose to fulfil their political objectives.
Further the nasa as well the microsoft sites is always under attacks by the hackers.
3. Professional hackers/ crackers: their work is motivated by the colours of money.
These kinds of hackers are mostly employed to hack the site of the rivals and get
credible, reliable and valuable information. Further they are employed to crack the
system of the employer basically as a measure to make it safer by detecting the
loopholes.
4. Discontented employees: this group include those people who have been either
sacked by their employer or are dissatisfied with their employer. To average they
normally hack the system of their employee.
The mantra of any good security engineer is; ‗security is a not a product, but a
process.‘ it‘s more than designing strong cryptography into a system: it‘s designing
the entire system such that all security measures, including cryptography, work
together.
1. User account access controls and cryptography can protect system files and data,
respectively.
2. Firewalls are by far the most common prevention system from network security
perspective as they can ( if properly configured) shied access to internal network
services, and block certain kinds of attacks through packet filtering.
3. Intrusion detection system (idss) are designed to detect network attacks in progress
and assist in post attack forensic, while audit trails and logs serve a similar function
for individual systems.
4. ―response‖ is necessarily defined by the assessed security requirements of an
individual system and may cover the range from simple upgrade of protections to
notification of legal authorities, counter-attacks, and the like.
1.10 Cyber crime is impacts various sectors:
1. Banking
2. Business
3. Education
4. Government / military
5. Medical / healthcare
6. Preparing across industries
1. Banking: the banking / finance arena is a clear target for cyber criminals, and this
year hackers certainly haven't been about launching wide-ranging attacks on every
type of financial business out there. As of october 13, there type have been 58
breaches in this sectors that the idfrc has recorded, and all told, more than 5 million
records have been compromised so for this year
2. Business: enterprises in the business sector also felt victim to multitude of cyber-
attacks this year, as ifrc‘s breaches, the business sector represent 39.1 percent of
incidents, although the number of actual breaches records was small when compared
to industries government and medical. When you consider the kind of information
that education networks- particularly post secondary institutions- have on record
information for students, staff, and alums as academic records) it becomes easier to
see why make such a prime target. Educational organizations are, as security expect
chad a. Holmes explained, ―really a playground for hackers.‖ As of october 20, there
have been 754,100 education records breaches this year. Here are some of the more
notable incidents.
3. Government / military: government and military enterprises have certainly not been
spared the burden of having to deal with major hacks this year. All told, there have
been government records breached so for in 2015, which comprises 19.3 percent of
total compromises records. Unfortunately for government and military entities, these
number are only set to rise, since cyber criminals see particular value in government
targets, which can often even more privileged data than which could be collected from
an attack on a different sector. Here is some of significant government and military
hacks to take place this year.
4. Medical / healthcare: medical and healthcare –based breaches currently result in the
greatest number of breached records. Accounting to the ifrc‘s data, incidents from this
sector resulted in 119,908,807 compromised records- or 68.3 largely explained by the
value of information contained within these networks. Within the cyber –criminal
realm, person health records represent some of the most sough – after data out there
due to health records often being able to provide identity – based data –such as
social security numbers – that are permanently tied to an individual, and therefore
cannot be cancelled in the way, say, a debit card can be, as electronic health reporter
stated.
Chapter-2
5. Liaqat ali, faisal ali, priyanka surendran and bindhya thomas a study on the
effects of cyber threats on customer‘s behaviour in e-banking services. This paper
critically analysis and discusses the effects of cyber threats when dealing with online
banking services. It is concluded that by the research there is a need to increase
customer‘s awareness about available cybercrimes when dealing with online
banking.
6. Simran, akshay, manvikar, vaishnavi joshi and jatin guru a study on cyber crime
a growing threat to indian banking sector. This paper focuses on the technical aspects
of various types of cyber crime concerting the banking units and their related impacts.
Additionally, it identifies the threat vectors supporting their crimes and develops
measures to aid in combating the resulting cyber-attack can be better prevented in the
future for enhanced security.
7. Mrs. V. Bhargavi and dr.m. lokanandha reddy a study on cyber security attacks in
banking sector. Emerging security challenge and threats. This paper seeks to provide a
view of the current cyber threats targeting the banking industry in order to promote
dialogue on collective protection strategies. The cyber challenge will remain
complex. Threat will evolve rapidly with the development of new technologies the
ever-changing geo-political landscape and not surprisingly from our efforts to counter
them.
8. A.r. raghavan and latha parthiban a study on the effects of cybercrime on a bank‘s
finances. The information communication technology (ict) has revolutionized
different aspects of human life and has made our lives simpler. It has been applied in
different industries and has made business processes simpler by sorting summarizing
coding and customizing the processes. Cybercrimes have affected different industries
and banking sector is one of these which have witnessed different forms of
cybercrimes like atm fraud, phishing, identity theft, denial services
2.2 Objectives
Secondary data
The present study is purely a secondary data. Case study method is being used in the
present study. The data for the present study is being collected through various
articles, journals, websites like rbi and cyber security etc.
The present study focuses on impact of cybercrime in banking industry. The study is
purely based on secondary sources and majorly focus on the problems faced by
banking industry from cybercrime, the challenges arising, and the strategies to be
implemented about minimize the cybercrime are discussed.
Review of literature, objectives of study, statement of the problem, scope of the study,
methodology, limitations of the Study ,
Online credit card fraud on e-bay, Indian website is target of hackers, tamil tiger
credit card scam spread to chennai, city principal seek policy help to stop cyber, upi
bank hacked up in phishing attack
Annexure
Bibliography
Page 15
―A Study On Impact Of Cyber Crime In Banking Sector‖
CHAPTER-3
BANKING SECTOR
3.1 Introduction
Economy is one of the pillars which defines the progress and growth of a nation.
Banking sector is considered as the backbone of the economy. For our day-to-day
transactions, we enter into monetary transaction in the form of cash payments,
cheques or demand drafts. However, this trend has paved the way to a modern system
of payment in the form of swiping of debit cards or credit cards. On the
recommendation of the committee on financial system (narasimha committee) 1997-
1998, information and technology in banking sector was used
.on the hand technology has created advantages for banks and financial institutions
but on the other hand, there have been risks involved in it as well. Technology risks
not only have a direct impact on a bank as operational risks but can also exacerbate
other risks like credit risks. Given the increasing reliance of customer on electronic
delivery channels to conduct transactions, any security related issues have the
potential to undermine public confidence in the use of e-banking channels and lead to
reputation risks to the banks. Inadequate technology implementation can also induce
strategic risk in terms of strategic decision making based on inaccurate
data/information.
Banking sectors has witnessed expansion of its service and strives to provide better
customer facility through technology but cyber-crime remains an issue. Information
which is available online is highly susceptible to be attacked by cyber criminals .4
cyber-crime results in huge monetary losses which are incurred not only by the
customer but by the banks also which affected economy of a nation. Non –
monetary cyber –crime occurs when viruses are created and distributed on another
computer or internet. The mostcommon of it is phishing and pharming.
1. Stolen checks:
Fraudsters may seek access to facilities such as mailrooms, post offices, offices of
tax authority, a corporate payroll or a social or veterans benefits office, which process
cheques in large numbers. The fraudsters then may open bank accounts under
assumed names and deposit the cheques, which they may first alter in order to appear
legitimate, so that they can subsequently withdraw unauthorized funds. Alternatively,
forge seemingly legitimate signatures on the cheques, also in order to illegally gain
access to unauthorized funds.
2. Cheque kiting:
Cheque kiting exploits a banking system known as ―the float‖ wherein money is
temporarily counted twice. When a cheque is deposited to an account at bank x, the
money is made available immediately removed from the account at bank y at
which the cheque is drawn. Thus, both banks temporarily count the cheque amount as
an asset until the cheque formally clears at bank y. The float serves a legitimate
purpose in banking but intentionally exploiting the float when funds at bank yare
insufficient to cover the amount withdraw from bank x a form of fraud.
Fraudsters have altered cheques to change the name (in order to deposit cheques
intended for payment to someone else) or the amount on the face of cheques, simple
altering can change $ 100.00 into $ 100,000.00 (however, transactions for such large
values are routinely investigated as a of policy to prevent fraud.)
4. Accounting fraud:
In order to hide serious financial problem, some businesses have been known to use
fraudulent book keeping to overstates sales and income, inflate the worth of the
company‘s assets, or state a profit when the company is operating at a loss. These
tapered records areas then used to seek investment in the company‘s bond or security
issues or to make fraudulent loan application in a final attempt to obtain more money
5. Rogue traders:
6. Fraudulent loan:
One way to remove money from a bank is to take out a loan, which bankers are more
than willing to encourage if they have good reason to believe that the money will be
repaid in full with interest. A fraudulent loan, however, is one in which the borrower
is a business entity controlled by a dishonest bank officer or an accomplice the
―borrower‖ then declares bankruptcy or vanishes and the money is gone. The
borrower may even be a non- existent entity and the loan merely an artifice to conceal
a theft of a large sum of money from the bank. This can also see as a component
within mortgage fraud.
These take a number of forms varying from individual using false information to hide
a credit history filled with financial problem and unpaid loans to corporation using
accounting fraud to overstates profits in order to make a risky loan appears to be a
sound investment for the bank.
Forged documents are often used to conceal other theft; banks tend to count their
money meticulously so every penny must be accounted for. A document claiming
that a sum of money has been borrowed as a loan, withdrawn by an individual
depositor or transferred or invested can therefore be valuable to someone who
wishes to conceal the fact that the bank‘s money has in fact been stolen.
Each of these actors and their characteristics have been define below:
1. Cyber criminals
Based on the oecd report (2007), these malicious exploiters can be categorized into
five sub categories, 1) innovators (who seek to find security holes in the system to
overcome protection measures adopted by the banks). 2) amateur (who are beginners
in this area their expertise is limited to computer skills, exploited by the cyber
criminals). 3) insider (who are working within the bank to leak out important
information in order to take some kind of revenge). 4) copy cats (they are interested in
recreating simple tasks). 5) criminals (highly organize and very knowledgeable who
may use all the above-mentioned stake holders for their own profit).
2. Money mules
As per the definition given by oecd report (2007), money mules are individuals
recruited wittingly and often unwittingly by criminals, to facilitate illegal funds
transfers from bank accounts.
3. Victims
Victims, according to oecd (2007), in the banking sectors can be categories into
two categories; banks and users of these banks. The users or customers can be
individual, sme‘s who do so by not employing risky online behaviour or by not
employing security measures during transactions.
4. Security guardians
They are the most important actor of this system as they improve the existing banking
system and help in removing the vulnerabilities and development of system so that
banking frauds can be mitigated. The security guardians in case of banking sector
could be the bank itself or some third party hired by the bank in order to ensure
security from such threats.
Finances the banking industry across the globe is facing a challenging situation
which is though provoking due to the geopolitical and global macro economic
conditions. The banking sectors is forced to evaluate its current practices in order to
analyse an manage their risks effectively. Technology – driven approaches have been
adopted for the management of risk due the growth of information and technology
(it), penetration of mobile networks in everyday life, the financial services have
extended to, asses. Technology has made sure that banking services reach masses as
it made these services affordable and accessible (kpms, 2011).
However, this has also increased the risk of becoming targets of cyber attacks
cybercriminals have developed advanced techniques to only cause theft of finances
and finances but also to espionage businesses and access important business
information which indirect impact the banks finances.
In order to fight these cybercrimes, the banking sector needs to collaborate with
global authorities and watchdog organisations so that a model can be developed
which can helpin controlling. There are many frauds and cyber crime digital era made
in banking sectors and dealing with such threats. The main issues of concern here is
that there is absence of effective completion service in the banking sectors which can
identify the trends in cyber- crime and compile a model according to it.
3.5. History:
The history of Indian banking can be divided into three main phases
The first banks were the general bank of india, which started in 1786, and bank of
hindustan, both of which are now defunct. The oldest bank in existence in india
is the state bank of india, which originated in the ―the bank of bengal‖ in calcutta in
june 1806. This was one of the three presidency banks, the other two being the bank
of bombay and the bank of british east india company. The three banks merged in
1921 to form the imperial bank of india. For many years the presidency banks acted as
quasi- central banks, as did their successors. The first fully indian owned bank was
the allahabad bank, established in 1865. However, at the end of late 18th century,
they were hardly any banksin india in the modern sense of the term. Banking in india
remained the exclusive domain of europeans for next several decades unit the
beginning of the 20th century. Foreign banks too started to arrive, particularly in
calcutta in the 1860s. The compote d‘es completed paris opened a branch in calcutta
in 1860, and another in bombay in 1862; branches in madras and pondicherry, then
french colony followed. Calcutta was the most active trading port in india, mainly
due to the trade of the british empire, and so become a banking centre. The reserve
bank in india formally took on the responsibility of regulating the indian banking
sector from 1935. After india‘s independence the reserve bank in india. Under the first
the rbi act 1984 and given broader powers. Before 1969. State bank of india (sbi) was
the only public sector bank in india. Under the first phase of nationalization of banks,
it was nationalized in 1995 under the sbi act of 1996.
After india‘s independence, the imperial bank of india became the state bank of india
in 1995. The second phase of nationalization of banks took place in 1969. Fourteen
banks were nationalized in this year by the then prime minister of india mrs.
Indiragandhi. In the year 1980, six more banks were nationalizing with deposits over
200 crores. The major objectives behind nationalization was to spread banking net
work in the rural areas and make available cheap finance to indian farmers. Until the
1990s, the nationalized banks grew at a pace of around 4% closer to the average
growth rate of the indian economy.
Today, indian banking sector is mature with banks having strong and transparent
balance sheets. The major growth drivers are increase in retail credit demand,
proliferation of atms and debit – cards, decreasing npas due to securitization,
improved macro economic conditions, diversification, interest rates, regulatory and
policy changes (e.g. A risk management to the banking regulation act). Certain trends
like growing competition, product innovation and branding, focus on strengthening
risk management system, emphasis on technology have emerged in the recent past.
Larger banks would have a relatively advantages, here recently the union cabinet on
15-02-2017 approved the merger of states bank of india with five of its associate
banks including states bank bikaner and jaipur, states bank of travancore. The merger
is likely to result in recurring savings, estimated at more than rs 1,000 crore in the first
yea, through a combination of enhanced operational efficiency and access to sbi‘s
global network. There are currently 27 public sector banks in india out of which 19
are nationalized banks and 6 are sbi and its associate bank, and rest two are
nationalized banks bhartiya mahila bank, which are categorised as other public
sector banks, 23 private sector banks and 46 foreign banks with 325 branches (as on
31st dec. 2015), 61 regional rural banks (rrbs) and more than 90,000 credit
cooperatives.
As per section 5 (b) of the banking regulation act 1949, ―means the accepting, for the
purpose of lending or investment, of deposits of cheque, draft, order or otherwise.‖
All banks which are included in the second schedule to the reserve bank of india act.
1934 are scheduled banks. These banks comprise schedule commercial banks and
scheduled cooperative banks schedules commercial banks in india are categories into
five different groups according to their ownership or nature of operation. These banks
groups are:
Government had so taken into account the establishment of the board for financial
supervision (bfs) as the apex supervisory authority for commercial banks, financial
institutions and non-banking financial companies rating system, corporate
governance,enhanced due diligence on important share holders, fit and proper tests for
directors, and setting up of indian financial network (infinf) as the communication
backbone for the financial sector, introduction of negotiated dealing system (nds) for
screen-based trading in government securities and real time gross settlement (rtgs)
system.
Real time settlement system, introduced in india since march 2004, is a system
through which with the help of internet instructions can be given by banks totransfer
of funds from on bank account to another bank account. The rtgs system is
maintained and operated by the rbi and provides a means of efficiency and faster
funds transfer among banks facilitating their financial operations. As the name
suggests, funds transfer between banks takes place on a ‗real time‘ basis. Therefore,
money can reach the beneficiary‘s account within two hours.
It is a retail payment system that can be used to make bulk payments / receipts of
similar nature especially where each individual payment is of repetitive nature and of
relatively smaller amount. This facility is meant for companies and government
departments to make / receive large volumes of payments rather than for funds
transfers by individual
It is the most popular devise in india, which enables the customers to withdraw their
money 24 hours a day 7 days a week. It is a devise that allows customer who has an
atm card to perform routine banking transactions without interacting with a human
teller. In addition to cash withdrawal, atms can be used for payment of utility bills,
funds transfer between accounts, deposit of cheques and cash into accounts, balance
enquiry etc.
6. Tele – banking:
8. Net banking:
It is done through internet by individuals and firms for transfer of funds, booking
rail tickets, shopping, purchasing cinema tickets, purchasing shares etc.
9. Mobile banking:
3.9 Challenges:
1. Non – performing assets (npas): today, is the era of globalization banks have
cope with the competitive forces and strengthen their balance sheet. Now a days,
banks are groaning with burden of npas. If npas are not recovered, they will be
banking industryis the high transaction cost of carrying non-performing assets in their
books. The resolution of the npa problem requires greater accountability on the part
of the corporate, greater disclosure in the case default, an efficient credit information
sharing system and an appropriate legal framework pertaining to the banking system
so that court procedures cam be streamlined and actual recoveries made within an
acceptable time frame. The banking industry cannot afford to sustain it self with
such high levels of npa‘s thus. ―lend, but lent for a purpose and with a purpose ought
to be the slogan for salvation.‖
2. Information technology (it) in banking: indian banking industry, today is in
the midst of an it revolution. A combination of regulatory and competition reasons has
led to increasing importance of total banking automation in the indian banking
industry. Information technology has basically been used under two different avenues
in banking. One is communication and connectivity and other is business process
reengineering. Information technology enables sophisticate‘s product development,
better market infrastructure, implementation of reliable techniques for control of risks
and helps the financial intermediaries to reach geographically distant and diversified
markets.
3. World wide banking (wwb): as an extreme case of e- banking world wide
banking (wwb) on the pattern of world wide web (www) can be visualized. That
means all banks would be interlinked and individual bank identity, as far as the
customer is concerned, does not exist.
4. Cyber crime: today the major cybercrimes which plague the banking sectors
are atm frauds, hacking of bank accounts, denial of service, credit card frauds,
phishing
etc. Are challenges to the banking industry. The rapid growth to global
electronic crimeand complexity of its investigation requires a global presence.
5. Future outlook: banking landscape is changing very fast. The reserve bank
in its bid to move towards the best international banking practices will further
sharpen the prudential norms and strengthen its supervisor mechanism. There will be
more transparency and disclosures.
Traditionally, bank have learned on their physical branch locations to be the primary
touch point of engagement with their customer. But with the explosion of smart
phones and associated application, customers are much more inclined to complete
their banking online whenever possible. With this in mind, having mobile – friendly
banking experience coupled with application that aid the customers financial life will
be strategically paramount for banks to retain their current customer, and attract new
ones. A mobile strategy is no longer a nice to have for banks – it is now a necessity
for those who hope to remain competitive for years to come.
2. Mobile payment:
These trends build on the previous two, as security and authentication will become
significant strategic challenges as consumer continue to adopt the mobile ecosystem
foe their banking needs. Banks will have to take a closer look at how they confirm
the identities of their customers who are accessing accounts remotely. With security
breaches and identity theft on the rise, the protection and security of banking
information is paramount to instilling trust in the minds of consumers, so banks will
have to devise strategic plans accordingly to ensure the safety of all their customer‘s
financial data.
Experts do not anticipate new financial technologies to take substantial market share
from the banking industry as a whole, but it does pose a significant strategic challenge
to the industry given its recent cost – containment and growth struggles. Fintech is
software that serve to displace some of the most profitable offerings of a traditional
bank like financial advising, loan alternatives, payment processing, and money
transfers. Additional, fintech includes very disruptive innovations like crypto –
currency, which threatens the underpinning of the banking industry as a whole. As
fintech companies continue to innovate and challenge the status quo of the banking
industry, there may be a groundswell of further peril. Look foe banks to make
strategic manoeuvres to ward off competition from fintech, such as building
competitive products in-house or acquiring these companies to add their portfolio of
offerings.
With the increased pressure on new customer acquisition across the industry, banks
have to become more innovative in their acquisition strategies. One area that is
projected to yield significant return on investment is multichannel marketing. Using a
combination of traditional, digital, and social channels, banks can expand their
marketing reach and get their messaging in front of the cohorts of new customers they
hope to attract.
Be aware that your mobile device is vulnerable to viruses and hackers. Download
applications from trusted sources. Do not store unnecessary or sensitive information
on your mobile device. It is also important to keep the device physically secure;
millions of mobile devices are lost each tear. If you do lose your device, it should
immediately be reported to your carrier and / or – organisation. There are some
devices that allow remote erasing of data. Be sure to keep your mobile device
password protected.
Keep your application and operating system with the latest system updates. Turn on
automatic updates to prevent potential attacks on older software.
Use encryption for your most sensitive files, such as health records, tax returns, and
financial records. Make regular back – ups of all your important data.
Wi-fi (wireless) network at home are vulnerable to intrusion if they are not properly
secured. Review and modify default settings. Public wi-fi, also known as ―hot sports‖,
may be vulnerable. Avoid conducting sensitive transactions on these networks.
Be cautions when giving out personal information, such as your name, address,
telephone number, or financial information on the internet. Make sure that website is
secure, especially when making online purchases, or that you have enabled privacy
settings for (for example: when accessing/using social networking sites, such as face
book. Twitter, you tube, etc) once something is posted on the internet, it may be there
forever.
7. Avoid being scammed: never reply to emails that ask you to verify your information
or confirm your user id or password. Don‘t click on a link or file of unknown origin.
Check the secure of the message; when in doubt, verify the source.
CHAPTER– 4
12.5 lakh. The modus operandi of the accused was to hack into the ebay india
website andmake purchases in the names of credit cardholders.
Two persons, including alleged mastermind debasis pandit a bca student, were
arrested and forwarded to the court of the sub divisional judicial magistrate, rourkela.
The other arrested person in rabi narayana sahu.
Superintendent of police d.s. kutty said the duo was later remanded in judicial
custody but four other persons allegedly involved in the racket were untraceable. A
case has been registered against the accused under section 420 and 34 the indian penal
code and section 66 it act and further investigation is on, he said.
While pandit, son of retired employees of rourkela steel plant, was arrested from his
sector 7 residence last night, sahu, his associate and constable, was nabbed at his
house in uditnagar.
Pandit allegedly hacked into the ebay india site and gathered the details of around 700
credit cardholders. He then made purchases by using passwords.
The fraud came to the notice of e bay officials when it was detected that several
purchases were made from rourkela while the customers were based in cities such as
bangalore, baroda and jaipur and even london, said v. Naini, deputy manager of
ebay. The company brought the matter to the notice of rourkela police after some
customers lodged complaints. Pandit used address of sahu for delivery of the
purchases goods, said police. The hand of one satya samal. Recently arrested in
bangalore, in suspected in the crime.
Samal had booked a room in a bangalore hotel for three months. The hotel and
transport bills rose to rs lakh, which he did not pay.
Samal was arrested for non-payment of bills, following which pandit rusted to
bangalore and stood guarantor for his release on bail, police sources said.
Introduction
These kinds of online fraud happen of ten so in bhubaneswar rourkela police basted a
racket involving an online fraud worth rs 12.5 lakh, hackers used to purchases in the
name of other credit card holders.
So here the two students‘ names as debasis, pandit, a bca student were arrested and
forwarded to the court of the sub divisional / judicial magistrate and the other arrested
person is robi narayan sahu.
The fraud came to the notice that it was detected that several purchases were made
from rourkela. While the customers were based in cities such as bangalore, baroda
and jaipur and even london, said v. Naini deputy manager of ebay.
So company took over the matter notice of rourkela police after some customers
lodged complaints. The gang was also involved in train fight and hotel reservation.
Samal was arrested for non-payment of bills, following which pandit rushed to
bangalore and stood guarantor for his release on bail, source said.
Swot analysisstrength:
1. Credit card avenues verify and validates credit cards of buyer for over thousand e-
commerce websites.
2. Checking process was carries on e-bay hackers through credit cards on ip mapping,
zip mapping numbers.\
3. Credit and card fraudulent will be charged for cheating under section 420.
Weakness:
Opportunities:
1. Action could have been taken regarding legal notice claimed by the victims.
2. Credit card details availability in internet could have been avoided.
3. Credit cards security team could have taken special action before providing license
for a fraudulent.
Threats:
1. The fraud came to the notice of e-bay officials when it was detected that several
purchases were made from rourkela.
2. Hacking into the e-bay india website and make purchases in the names of credit
cardholders.
Some computer experts managed to break into the write security computer network of
bhabha research centre but were luckily detected.
A number of cases of hacking of indian internet sites have been traced to pakistan but
it would be difficult to nail them, cbi director, r k raghavan said. As the hackers
who broke into computer system in indian were not conniving with the pakistan law
enforces, ―one wonders what kind of cooperation we will get ―mr. Raghavan said at a
―we at the cbi are convinced that cyber crime is the crime of the future. ―he said.
―it isnow much more easily committed and less easily identified.‘ president of india‘s
national association of software and service companies (naasscom), dewang mehta
said the lack of uniform laws of cross-border hackers difficult. ―hacking is not a
universal offence, and there is a problem.‖ Mr. Mehta said.
Last year. India passed a landmark digital law that makes hacking, spreading of
viruses and illegal financial transaction over the internet punishable. It became the
12th member ina small club of nations with digital laws.
It was reported that pakistan was making use of the computer system promote
terrorism in india. These are just some of the instance which were cited by bhure lal,
secretary in the central vigilance commission, to make a strong case for implantation
of cyber laws he the central bureau of investigation (cbi) in the capital today.
Underlining the need for a comprehensive cyber law, he added that computer abuse
can be resorted to for cyber – terrorism.
In order to evolve effective safeguards against the menace of computer crimes, other
expert‘s various investigation agencies, including the federal bureau of investigation
(fbi) and interpol, today sought specific and comprehensive cyber laws to cover all
actsof computer criminal and proactive mechanism for tackling such offences.
It is not only difficult to detect computer crimes but also to book criminals since the
laws have not kept pace with technology, ―reserve bank of india deputy governor s.p
talwar said.
Stressing the need for effective security features while undertaking computerization,
he said it is often difficult to attribute guild using the existing statutes since the act of
trespassing into a system and tampering with virtual data may not necessarily be
In his address, cbi director r. K raghavan said the government is aware of the need for
legislation in this new area of information technology and accordingly, the department
of electronics (doe) in consultation with other experts‘ agencies has already drafted
laws relating to this area. Realizing the threat from computer crimes, the cbi has taken
a proactive‖ lead in preparing itself to face the challenge by setting up a special cyber
crime unit, he said.
At the same time, he added that unless development of security features were also
attended to at the same level of efficiency and equal speed, banks would be left
with beautiful software system for public glare and access, but totally unguarded and
gullible against waiting information poachers.‖
Introduction
So here in this case some computers experts managed to break into the high security
computer network of bhabha atomic research centre but were luckily detected.
So, the naascom chief said indian companies on an average spent only 0.8
percentage of their technology budgets average of against a global average of 5.5.
Percent
A no. (trackers) cases of been hacking to indian internet sites have been traced to
pakistan but it would be difficult to sort them. Hackers just use knowledge of software
to break in and steal information from computer system broke into at least 635
indian internet siteslast year. President od indian national association of software and
service companies, in order to evolve effective software against the menace of
computer crimes, other expert‘s various investigation agencies including the federal
bureau of investigation, and interpol. Rbi was also association with the efforts of the
ministries of finance, commerce and law in the enactment of laws such as the
information technology act the cyber law.
SWOT ANALYSIS
STRENGTH:
WEAKNESS:
1. A group of hackers and pakistan was making as of this computer system to promote
terrorism in india.
2. These should strong case for implementation.
OPPORTUNITIES:
THREATS:
1. It is not only difficult to detect computer crimes but also to book criminals since the
laws have not kept pace with technology.
2. Stressing the need for effective securely features
while understandingcomputerization.
The Sri Ramachandra medical collage police at porur, Chennai, g. Elango, a tamil
tiger agent carrying a british passport, on friday seized 28 atm cards in his possession.
The police said elango illegally withdrew over rs. 30lakhs from the atm centres of a
few nationalized banks and a private bank. The amount was then sent to the united
kingdom through unauthorized channel. It is learnt that the chennai police was alerted
by a civilian who had seen elango using several atm cards to withdraw money from
an atm centreof a private bank on mount – poonamallee road, porur.
Elango is from valvetiturai, a notorious port for smugglers in the sri lanka. He is the
partner of the lite‘s cash carry centres of thamilini in london – one in croydon and
another in southall.
After the arrest police has found, besides the atm cards, registration certificate books
of two cars, a cellular phone and a passport. Tamil nadu police is now seeking the
assistance of the scotland yard to obtain more information about elango. The tamil
tigers are also under investigation in uk for operating credit card rackets in europe.
Introduction
Here in this case sri ramachandra medical college police has arrested g. Elango, a
tamil tiger agent carrying a british passport, and have seized more than 28 ‗atm card
in his possession. The police law the notice that elango has withdrawn over rs. 30
lakhs fromthe atm centres of a few nationalizes banks.
A police team led by the assistant commissions police balasubramiam caught elango
red handed while he was withdrawing money from the atm machine.
A notorious port for smuggles less in the north of sri lanka. He is the parties of the
ltte‘s cash and carry centres. After the arrest police has found, besides the atm cards,
registration certificates books of two cards a cellular phone and a passport.
Tamilandu police is now seeking the assistance of the scotland yard to obtain more
information about elango.
SWOT ANALYSIS
STRENGTH:
WEAKNESS:
OPPORTUNITY:
THREATS:
Principal across the city seem to be taking a cue from principal of Bombay
Scottish School, Mahim. After student began posting insult against him on Orkut,
instead of punishing have decided to bring in the cyber cell police to speak at their
school. They feel student and parents need to be educated against the legal and
moral consequences ofcybercrime.
Admitting to the existing of some mischievous student who misuse the internet
and also stray role educating students and warning them. Principal Rekha
Vinayak, GHK School,
restrain them from misusing modern amenities. ―she said. As a solution, principal
Fr Dr Francis Swamy of Holy Family school, Andheri, said that apart from
educating student, parents and teachers also needed to be roped in for the success
of any initiative against internet abuse. ―without the support of parents, no
awareness programme can success. Parents need to be sensitised to the problem on
hand and be active in stopping their children from maligning anyone,‖ he said.
Principal Paul Machado of Campion school went further, highlighting the long-
term effect of such uncontrolled freedom to student. ―parents must understand
that today their children are misusing the internet to abuse others. Tomorrow,
they may become victims of it too. Hence, parents need to be taken into
confidence too to stem this rot.‖ Apart from the above, all principals lauded the
move by Dr D P N Prasad, Bombay Scottish principal, to invite the cyber cell to
speak on cyber crime and said that they would also be inviting the cell officials to
speak on the subject in their schools.
INTRODUCTION
As on new many cybercrimes happen across the city and world. The Scottish
school, in Bombay has been relevantly facing the problems regard to this cyber
crime principal of Bombay Scottish school, has been began pasting insults against
him. On Orkut so he called up the cops to take information with the students, so
other school principle has too decided to bring police to their school. It self parents
and student should be Educated towards this cyber crime.
Now days things gone worst and student are misusing the Internet and also stray
into restricted sites due to lack of supervision, so the principles just decided only
cops can play as role in Educating the students.
Student had started misusing the freedom and hence needed to be monitored
―Monitoring and Educating student against the pitfalls of visiting restricted sites is
the main responsibility parents.‖
The student should not use kind of sites, Andheri, said that a part from
educating students, parents, and teachers also needed to be roped in for the
success of any initiative against Internet abuse.
SWOT AnalysisStrength:
1. Monitoring and Educating Student against the pitfalls of visiting
restricted sites isthe responsibility of parents.
2. Parents should also be educated towards this cyber crime.
3. Parents must understand that today these children are misusing the
Internet to abuseothers.
Weakness:
1. Due to the unwanted streams and sites student are spoiled.
2. The education is must for student an parent towards this cyber crime
3. Unwanted sites should be banned and there should be kind of rules and
regulations.
Opportunity:
1. Students can surf healthy sites instead of restricted sites and make use
of.
Threats:
1. Cyber crime can lead to a mental disorder also student life can ruin
thoughrestricted sites.
2. Less educating towards the parents about cybercrime also a weakness.
In case you have received any e-mail from on address appearing to be sent by
UTIBANK, advising you of any changes made in your personal information,
account details or information on your user id password of your net banking
facility, please do not respond.It is UTI Bank‘s policy not to seek or send such
information through email. If you have already disclosed your password please
change it immediately.‖ The warning says. The tricky link is available on
http://br.Grocities
If any unsuspecting account holder enters his login id, password, transaction id
and password in order to change his details as ‗as advised‘ by the bank, the
same info is sent vide maolform.cz (the phisher‘s database).
Top officials at UTI Bank said that they have reported the case to the
economic office wing, Delhi Police. The bank has also engaged the services of
Melbourne international a leading anti-phishing company that phishing
monitoring and take -down solution. ―we are now in the process of closing the
site. Some of these initiatives take time, but customer have been kept in the
loop about these initiatives, ―said V K Ramani, president – IT, UTI Bank.
As per the finding of UTI Banks security department, the phishing has sent
more that 1,00,000 emails to account holders of UTI Bank as well as other
banks. Though the company has kicked off damage control initiatives, none of
the initiatives are cent percent fool proof,‖
Now there is no way for banks to know if the person logging -in with accurate
user information is a fraud,‖ said Ramani. However, reliable sources within the
bank and security agencies confirmed that the losses due to this particular
attack were zilch. The bank has sent alert to all its customers informing about
such, malicious websites, besides beefing up their alert and fraud response
system. ―Engaging professional companies like fraud watch help in reducing
time to response ton attacks,‖ said Sanjay Has war, Assistant Vice President,
Network and Security, UTI Bank.
INTRODUCTION
A phishing attack on the website of Ahmedabad based UTI banks, an hacking
of commercial banks OTI Bank, a leading private bank promoted by India‘s
largest financial institution.
The web page not only asks for the account holders‘ information such as user
and transaction login and passwords. It has also beguilingly but up disclaimer
and security hazard statements.
Every bank gives just certain information that if you just review any e-mail
from an address appearing to be sent by UTI BANK advising that you need to
change details or information on your uses ID and password of your net
banking facility.
SWOT AnalysisStrength:
1. Without any accurate account information, one should not change
their personalinformation account detail‘s or information advising you
of any changes.
2. Any unsuspecting account holder enters his login ID password in
order to changehis details.
Weakness:
2. The fishing has been hacked more than 100,000 and sent through
email of accountholder.
Opportunity:
1. We are now in the process of closing the sites some of these initiations
take time.
Chapter- 05
In this chapter the attempt is made to explain the major findings on cybercrime in
banking sector and to suggest overcoming these problems and giving suitable
conclusion to banking for sustainable development.
5.1 Findings
Banks are being focused again and again on the grounds that every one of the
storesas money are held with the banks.
The security of the clients is at a colossal hazard since it has turned out to
beanything but difficult to hack their own subtitles.
The product utilized for recognising fakes as a rule is either obsolete or
extremelytedious.
The quantity of cases fathomed by the digital cell has remained reliably low.
Frauds misused the identities of customers and purchased services with the
usage ofcredit card details which were found on the net
Bank transfer codes must be secured
Students can surf healthy sites instead of restricted sites and make use of
Engaging professional companies like fraud watch help in reducing time to
respondto attacks.
5.2 Suggestions:
Credit card fraudulent will be charged for cheating under sec, 420
Action could have been taken regarding legal notice claimed by the victims.
Specific and comprehensive cyber laws to cover all acts of computer criminal
andpractices mechanism for tracking such offences.
Monitoring and educating student against the pitfalls of visiting restricted
sites isthe responsibility of parents.
Without any accurate account information account details or information
advisingyou of any changes.
Without the advancement or notifying by the bank one should not disclose
theinformation password to anyone.
5.3 Conclusion
This gives a brief overview of cybercrimes scenario in the banking sector and
impact of cyber crime on bank finances. The major cybercrime which plague the
banking sector are atm frauds, denial of service, credit card frauds, phishing etc. The
rapid growth to global electronic crime and the complexity of its investigation
requires a global presence. Presently the measures undertaken the banks are not
sufficient and therefore it is imperative to increase cooperation among the banks
across the world for the development of tools and models which can be applied to
counter global banking cybercrime.
The hacker could live three continents away from its victim, and they wouldn‘t even
recognize they were banks, nor do they to be outside in order to commit any crime.
They have everything they need on their weapon aren‘t guns anymore; they attack
with mouse cursors and passwords.
Articles:
1. Shubhun kumar and uday kumar “present scenanio of cybercrime in india and
its preventions” volume 6, issue 4, april.2015 issn 2229-5518
2. Mrs. Vinaya chaturvedi “cybercrime technological bright in digital banking in
india" e-issn: 2278-487x, p-inns: 2319-7668.
3. S. Kumudha and awasthi rajan “a critical analysis of cyber phishing
4. Simar, akshay manvikar, vaishnavi joshi, jatin guru and mrs. Shanit kiran
“cybercrime, a growing threat to indian banking sector issn 2394-3386 volume 5,
issue 1, january 2018.
5. A r raghavan and latha parthuiban “the effect of cybercrime on a bank’s
finances” issn:2347-3215 volume 2, february – 2014 pp.173-178.
6. Dr. M lokanadhe reddy and mrs. V bhargavi “cyber security attacks in banking
sector challenges and threats” issn2328-3734, issn (online) 2328-3696. Issn (cd-
rom) 2328-3688.
7. Sachin agarwal (2006) “cyber crime in banking sector” volume 3, (2016), may
issn 2455-2844.
8. Mr. Sourabh munjal and ms. Anooja. A “cyber crimes threat for the e-
commerce” outline issn 2394-4390.
Google search:
www.cyberlawsindia.net/cases1.html
Https://economictimes.indiatimes.com/cyber-crime
Https://www.information-age.com/cyber-crime-banking-sector
Https://www.google.co.in
www.bdo.in>getmedia>cybersecurity
www.the-future-of-commerce.com
Https://www.in.com