Sunteți pe pagina 1din 29

Page 1

Understanding cybercrime:
Phenomena, challenges and
Legal response


Submitted To: Dr. Duru Arun Kumar

Submitted By:
Rahul Yaduvanshi (332/COE/12)
Sukhpreet Singh(369/COE/12)
Vipul Khullar(393/COE/12)
Department of Computer Engineering
Netaji Subhas Institute Of Technology


Page 2




CONTENTS
1. Abstract...3
2. Introduction.....4
3. The phenomena of cybercrime5
3.1. Definition5
3.2. Typology of cybercrime...6
4. Development of cybercrime..9
5. Crime statistics..12
5.1. Cybercrime statistics in India.12
6. The economic impact of cybercrime..15
6.1. Terms of trade and effect on employment
7. The challenges of fighting cybercrime...18
7.1. The number of users18
7.2. The availability of resources19
7.3. Availability of information.19
7.4. Independence of location and crime site20
8. Cyber terrorism21
9. Anti-cyber-crime strategies22
10. Cyber-crime legalisation23
11. Summary..24
12. Conclusion26
13. Sources.27
14. Glossary28




Page 3






ABSTRACT
This report is made by Rahul Yaduvanshi, Sukhpreet Singh and
Vipul Khullar which highlights the malicious use of computer and
internet technology to affect our life and property.The cyber-crime
statistics, their nature, evolution and its effect on the economy,
development & employment of India in the past few decades has
been discussed in the report.

There are various challenges faced in tackling the cyber crimes.
Mainly because this technology is accessible to everyone and also
its a part of one's private property. The crimes can be committed
by simply sitting in front of a computer without applying any effort.
So there are strategies adopted by cyber crime investigation
department and the laws stated under Indian legislature to check
such crimes which are all discussed in this report.









Page 4



INTRODUCTION

In 1960s internet was developed for better communication and
research. With advancement of technology and expansion of
internet every area becomes easy to access but it also provide
a pathway to commit crimes easily without any effort only
sitting on a system.

Some human minds of criminal nature use internet as a tool of
crime which is now known as cyber crime committed in cyber
space. Cyber crime is now the burning issue for all countries
to handle because most of data is transferred online even
governmental data also. Cyber crime term is used to describe
criminal activity in which computer or computer network are a
Tool or target of criminal activity to denial of service attack. It
Also include traditional crime in which computer are used.
Cyber crime mainly consist of unauthorized access to Data
and data alteration, data destruction, theft of funds or
intellectual property. Due to these online criminal activities
cyberspace is most unsafe place to do business. Word cyber
space was first used by William Gibson, in his book,
Necromancer, written in 1984. Cyberspace can be defined as a
virtual world of computers where internet is involved, where
individuals can interact, conduct business, do transactions,
develop graphics. In this report we will discuss many types of cyber
crime commonly committed with some current case happened in
various cities. We will also discuss statistics in this report.

Work in cybersecurity is beginning to take off as more researchers
and professionals realize the dire need for more effective systems. What
direction will cybercrime turn to as the next generation of security
measures are implemented and deployed? In turn, how will the good

Page 5


guys respond to novel threats? These are valid questions that need to
be asked in order to plan for
future growth and mitigate the potential for massive crises.

































Page 6




DEFINITION

Computer crime, or Cybercrime, refers to any crime that involves
a computer and a network. The computer may have been used in the
commission of a crime, or it may be the target.
[2]
Netcrime is criminal
exploitation of the Internet. Dr. Debarati Halder and Dr. K. Jaishankar
(2011) define Cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm to the
victim directly or indirectly, using modern telecommunication networks
such as Internet (Chat rooms, emails, notice boards and groups) and
mobile phones (SMS/MMS)". Such crimes may threaten a nations
security and financial health. Issues surrounding these types of crimes
have become high-profile, particularly those
surrounding cracking, copyright infringement, child pornography,
and child grooming. There are also problems
of privacy when confidential information is lost or intercepted, lawfully or
otherwise.
The growing list of cybercrimes includes crimes that have been made
possible by computers, such as network intrusions and the
dissemination of computer viruses, as well as computer-based variations
of existing crimes, such as identity theft, stalking, bullying and terrorism.



Page 7


CLASSIFICATION OF CYBER CRIMES

Computer crime encompasses a broad range of activities. Generally,
however, it may be divided into two categories:
(1) Crimes that target computers directly
(2) Crimes facilitated by computer networks or devices, the primary
target of which is independent of the computer network or device.

Crimes that primarily target computer networks or devices include:
Computer viruses
Denial-of-service attacks
Malware (malicious code)

Crimes that use computer networks or devices to advance other ends
include:
Cyberstalking
Fraud and identity theft
Information warfare
Phishing scams

Spam
The unsolicited sending of bulk email for commercial purposes, is un-
lawful in some jurisdictions. While anti-spam laws are relatively new,
limits on unsolicited electronic communications have existed for some
time
.
Fraud & Financial Crimes
Computer fraud is any dishonest misrepresentation of fact intended to let
another to do or refrain from doing something which causes loss. In this
context, the fraud will result in obtaining a benefit by:

Page 8


Altering in an unauthorized way. This requires little technical
expertise and is not an uncommon form of theft by employees
altering the data before entry or entering false data, or by entering
unauthorized instructions or using unauthorized processes;
Altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions: this is difficult to detect;
Altering or deleting stored data;
Altering or misusing existing system tools or software packages, or
altering or writing code for fraudulent purposes.
Other forms of fraud may be facilitated using computer systems,
including bank fraud, identity theft, extortion, and theft of classified
information.
[9]

A variety of Internet scams target direct to consumers.

Obscene or offensive content
The content of websites and other electronic communications may be
distasteful, obscene or offensive for a variety of reasons. In some
instances these communications may be illegal.
Over 25 jurisdictions within the USA place limits on certain speech and
ban racist, blasphemous, politically
subversive, libelous or slanderous, seditious, or inflammatory material
that tends to incite hate crimes.
[citation needed]

The extent to which these communications are unlawful varies greatly
between countries, and even within nations. It is a sensitive area in
which the courts can become involved in arbitrating between groups with
strong beliefs.
One area of Internet pornography that has been the target of the
strongest efforts at curtailment is child pornography.

Data interference
Computer data are vital for private users, businesses and
administrations, all of which depend on the integrity and availability of
data. Lack of access to data can result in considerable (financial)
damage. Offenders can violate the integrity of data and interfere with
them by deleting, suppressing or altering computer data.One common
example of the deletion of data is the computer virus.

Page 9


Illegal interception
Offenders can intercept communications between users (such as e-
mails) or other forms of data transfers (when users upload data onto
webservers or access web-based external storage media) in order to
record the information exchanged. In this context, offenders can igeneral
target any communication infrastructure (e.g. fixed lines or wireless) any
Internet service (e.g. e-mail, chat or VoIP communications).

Illegal data acquisition (data espionage)
Sensitive information is often stored in computer systems. If the
computer system is connected to the Internet, offenders can try to
access this information via the Internet from almost any place in the
world. The Internet is increasingly used to obtain trade secrets.The
value of sensitive information and the ability to access it remotely makes
data espionage highly interesting. In the 1980s, a number of German
hackers succeeded in entering US government and military computer
systems, obtaining secret information and selling this information to
agents from a different country.


Page
10


EVOLUTION OF COMPUTER CRIME
AND CYBER CRIME

The criminal abuse of information technology and the necessary legal
response are issues that have been discussed ever since the technology
was introduced. Over the last 50 years, various solutions have been
implemented at the national and regional levels. One of the reasons why
the topic remains challenging is the constant technical development, as
well as the changing methods and ways in which the offences are
committed.
The 1960s
In the 1960s, the introduction of transistor-based computer systems,
which were smaller and less
expensive than vacuum-tube based machines, led to an increase in the
use of computer technology. At this early stage, offences focused on
physical damage to computer systems and stored data. Such incidents
were reported, for example, in Canada, where in 1969 a student riot
caused a fire that destroyed computer data hosted at the university. In
the mid 1960s, the United States started a debate on the creation of a
central data-storage authority for all ministries. Within this context,
possible criminal abuse of databases and the related risks to privacy
were discussed.
The 1980s
In the 1980s, personal computers became more and more popular. With
this development, the number of computer systems and hence the
number of potential targets for criminals again increased. For the first
time, the targets included a broad range of critical infrastructure. One of
the side effects of the spread of computer systems was an increasing
interest in software, resulting in the emergence of the first forms of
software piracy and crimes related to patents. The interconnection of
computer systems brought about new types of offence. Networks
Page
11


enabled offenders to enter a computer system without being present at
the crime scene. In addition, the possibility of distributing software
through networks enabled offenders to spread malicious software, and
more and more computer viruses were discovered. Countries started the
process of updating their legislation so as to meet the requirements of a
changing criminal environment. International organizations also got
involved in the process. OECD and the Council of Europe set up study
groups to analyse the phenomena and evaluate possibilities for legal
response
The 1990s
The introduction of the graphical interface (WWW) in the 1990s that
was followed by a rapid growth in the number of Internet users led to
new challenges. Information legally made available in one country was
available globally even in countries where the publication of such
information was criminalized. Another concern associated with online
services that turned out to be especially challenging in the investigation
of transnational crime was the speed of information exchange. Finally,
the distribution of child pornography moved from physical exchange of
books and tapes to online distribution through websites and Internet
services. While computer crimes were in general local crimes, the
Internet turned electronic crimes into transnational crime. As a result, the
international community tackled the issue more intensively. UN General
Assembly Resolution 45/121 adopted in 1990 and the manual for the
prevention and control of computer-related crimes issued in 1994 are
just two examples.

The 21st Century
As in each preceding decade, new trends in computer crime and
cybercrime continued to be discovered in the 21st century. The first
decade of the new millennium was dominated by new, highly
sophisticated methods of committing crimes, such as phishing, and
botnet attacks, and the emerging use of technology that is more
difficult for law enforcement to handle and investigate, such as voice-
over-IP (VoIP) communication and cloud computing. It is not only the
Page
12


methods that changed, but also the impact. As offenders became able to
automate attacks, the number of offences increased. Countries and
regional and international organizations have responded to the growing
challenges and given response to cybercrime high priority.





















Page
13


CRIME STATISTICS

As with technology advance criminal minds are also getting activated
more and more. According to NCRB report increase percentage in
crimes of All type committed in 2011 and committed in 2012 is 60%. A
total crime reported under IT act was 1, 791 in 2011 and crimes reported
in 2012 are 2,786. Among these 2,876 crimes reported most of the
cases are of tampering computer source (1,440) and hacking of
data(435). Variation in tempering data over 2011 is 74% and hacking is
177.1% which is almost double and is alarming issue to concentrate.
Crime cell is also working its level best as persons arrested in 2011 for
hacking crime was 65 and in 2012 are 137 for total 435 cases recorded.
But there is also little bit relief because the cases registered under
categories of un-authorized attempt to access protected computer
system decreases by 40% and decrease in cases registered under
publishing false digital signature certificate , fraud digital signature
certificate are -66.7% and -16.7% respectively . Although there is
decrease in cases registered in above mentioned three categories but
offenders are sharper as persons arrested under category of
unauthorized attempt to access computer system in 2011 were 15 for 5
cases registered but in 2012 persons arrested for same category were 1
for 3 cases registered. No person was arrested for publishing false
digital signature certificate for one case registered under IT act
2000.Total cases registered under IT act 2000 was 2,876 in 2012. When
state wise observations was carried out Maharashtra state was on first
place where 471 cases was registered followed by Andhra
Pradesh(429), Karnataka(412), Kerala(269) and Uttar Pradesh(205)
cases was registered.




Page
14










Page
15









Page
16


THE ECONOMIC IMPACT OF
CYBERCRIME AND CYBER
ESPIONAGE

Put these together and the cost of cybercrime and cyber espionage to
the global economy is probably measured in the hundreds of billions of
dollars. To put this in perspective, the World Bank says that global GDP
was about $70 trillion in 2011. A $400 billion lossthe high end of the
range of probable costswould be a fraction of a percent of global
income. But this begs several important questions about the full benefit
to the acquirers and the damage to the victims from the cumulative
effect of cybercrime and cyber espionage.
This initial research suggest an upper limit of the cost of cyber
espionage and crime somewhere between 0.5% and 1% of national
incomefor the US, this would be about $70 billion to $140 billion. A
lower limit might be $20 billion to $25 billion. This is a very broad range
and we hope that our future work can narrow it. A starting point for a
better estimate would be to reduce the reliance on anecdotes and
surveys, and begin to compile and compare existing estimates, develop
better data on value, and refine assumptions about loss. While a precise
single figure for the cost of cyber crime and cyber espionage is
unattainable, a more accurate estimate of the range of potential losses
can be developed, allowing us to better measure the problem. A very
crude extrapolation would be to take this range for the US, which
accounts for a little more than a fifth of global economic activity, and
come up with a range of $100 billion to $500 billion for global losses.
This is almost certainly an overestimate. An initial adjustment would be
to note that less developed economies rely less on networks and have
less intangible property than developed economies. In just the ten
leading economies the value of intangible goods and services ranges
from 50% to 70% of GDP; taking this into account would suggest a
range of $80 billion to $400 billion in global losses. This range is so
broad we offer them only as a starting point forfurther research on the
Page
17


global effect of malicious cyber activity. In the context of a $70 trillion
global economy, these losses are small, but that does not mean it is not
in the national interest to try to reduce the loss, and the theft of sensitive
military technology creates damage whose full cost is not easily
quantifiable in monetary terms.


Terms of Trade and the Effect on Employment
Terms of trade refers to how much a country must export in order to pay
for its imports. If imports fall in value, the terms of trade shift in favor of
the importing country, as it will have to export fewer goods than before to
pay its bills. Before we leap to the conclusion that stolen intellectual
property will eventually mean lower prices for consumers, we should
consider several caveats. First, many people will find it absurd to take
account of the benefits of criminal acts. Second, cyber espionage
reduces the comparative advantage of research, education, and know-
how, making it harder for victim nations with advanced economies to
produce the goods they need to pay their import bills. Even though the
effect of cyber espionage is tosubsidize foreign production, the benefits
to consumers in the victim country are likely to be small. If the workers
displaced by cyber espionage
do not find jobs that pay as well or better, the victim country would be
worse off. Analysis by the Commerce Departments International Trade
Administration found that in 2011, $1 billion in exports equalled 5,080
jobs.34 Since the total number of workers in the United States ranges
between 135 million to 145 million, this means that the high-end
estimate of $100 billion in losses from cyber espionage would translate
into 508,000 lost jobs and the effect of cyber espionage on employment
might be roughly a third of a percent decrease in employment. Rather
than the aggregate number of jobs, the real concern might be if the lost
jobs are in manufacturing or other high paying sectors. The effect of
cyber espionage may be to move US workers from high paying blue
collar jobs into lower paying work or even unemployment. More
importantly, if our rough estimates of loss and of the cost in jobs are
right, and since they are relatively small, it may point to the real damage
Page
18


from the theft of intellectual property. The greatest damage and risk from
malicious cyber activity may not be in terms of direct damage to the
victim country, but the illicit benefit obtained by the acquiring country,
whose economic development and ability to compete globally
(economically and perhaps militarily) are increased and accelerated
through illegitimate means.

Page
19


CHALLENGES FACED IN FIGHTING
CYBER CRIME

THE NUMBER OF USERS
The popularity of the Internet and its services is growing fast, with over 2
billion Internet users worldwide by 2010. Computer companies and ISPs
are focusing on developing countries with the greatest potential for
further growth. In 2005, the number of Internet users in developing
countries surpassed the number in industrial nations, while the
development of cheap hardware and wireless access will enable even
more people to access the Internet. The increasing number of Internet
users causes difficulties for the law-enforcement agencies because it is
relatively difficult to automate investigation processes. While a keyword-
based search for illegal content can be carried out rather easily, the
identification of illegal pictures is more problematic. Hash-value based
approaches are for example only successful if the pictures were rated
previously, the hash value was stored in a data base, and the picture
that was analysed has not been modified.

Availability of devices and access
Only basic equipment is needed to commit computer crimes. Committing
an offence requires hardware, software and Internet access. With regard
to hardware, the power of computers is growing continuously. There are
a number of initiatives to enable people in developing countries to use
ICTs more widely. Criminals can commit serious computer crimes with
only cheap or second-hand computer technology knowledge counts for
far more than equipment. The date of the computer technology available
has little influence on the use of that equipment to commit cybercrimes.
Committing cybercrime can be made easier through specialist software
tools. Offenders can download software tools designed to locate open
ports or break password protection. Due to mirroring techniques and
Page
20


peer-to-peer exchange, it is difficult to limit the widespread availability of
such devices.

Availability of information
The Internet has millions of webpages of up-to-date information. Anyone
who publishes or maintains a webpage can participate. One example of
the success of user-generated platforms is Wikipedia, an online
encyclopaedia where anybody can publish. The success of the Internet
also depends on powerful search engines that enable users to search
millions of webpages in seconds. This technology can be used for both
legitimate and criminal purposes. Googlehacking or Googledorks
describes the use of complex search-engine queries to filter many
search results for information on computer security issues. For example,
offenders might aim to search for insecure password protection systems.
Reports have highlighted the risk of the use of search engines for illegal
purposes. An offender who plans an attack can find detailed information
on the Internet that explains how to build a bomb using only chemicals
available in regular supermarkets.

Independence of location and presence at the crime site
Criminals need not be present at the same location as the target. As the
location of the criminal can be completely different from the crime site,
many cyber offences are transnational. International cybercrime
offences take considerable effort and time. Cybercriminals seek to avoid
countries with strong cybercrime legislation. Preventing safe havens is
one of the key challenges in the fight against cyber-crime. While safe
havens exist, offenders will use them to hamper investigation.
Developing countries that have not yet implemented cybercrime
legislation may become vulnerable, as criminals may choose to base
themselves in these countries to avoid prosecution. Serious offences
affecting victims all over the world may be difficult to stop, due to
insufficient legislation in the country where offenders are located. This
may lead to pressure on specific countries to pass legislation. One
example of this is the Love Bug computer worm developed by a
suspect in the Philippines in 2000, which infected millions of computers
Page
21


worldwide. Local investigations were hindered by the fact that the
development and spreading of malicious software was not at that time
adequately criminalized in the Philippines. Another example is Nigeria,
which has come under pressure to take action over financial scams
distributed by e-mail

Resources
Modern computer systems that are now coming onto the market are
powerful and can be used to extend criminal activities. But it is not just
increasing power of single-user computers that poses problems for
investigations. Increasing network capacities is also a major issue. One
example is the recent attacks against government websites in Estonia.
Analysis of the attacks suggests that they were committed by thousands
of computers within a botnet or group of compromised computers
running programs under external control. In most cases, computers are
infected with malicious software that installs tools allowing perpetrators
to take control. Botnets are used to gather information about targets or
for high-level attacks.

Page
22


CYBER TERRORISM
Cyber terrorism is the use of Internet based attacks
in terrorist activities, including acts of deliberate, large-scale disruption of
computer networks, especially of personal computers attached to the
Internet, by the means of tools such as computer viruses.
Cyber terrorism is a controversial term. Some authors choose a very
narrow definition, relating to deployments, by known terrorist
organizations, of disruption attacks against information systems for the
primary purpose of creating alarm and panic. By this narrow definition, it
is difficult to identify any instances of cyber terrorism.
Cyber terrorism can be also defined as the intentional use of computer,
networks, and public internet to cause destruction and harm for personal
objectives. Objectives may be political or ideological since this is a form
of terrorism.
There is much concern from government and media sources about
potential damages that could be caused by cyber terrorism, and this has
prompted official responses from government agencies.
Several minor incidents of cyber terrorism have been documented.
In 1996, a computer hacker allegedly associated with the White
Supremacist movement temporarily disabled a Massachusetts ISP
and damaged part of the ISP's record keeping system. The ISP
had attempted to stop the hacker from sending out worldwide
racist messages under the ISP's name. The hacker signed off with
the threat, "you have yet to see true electronic terrorism. This is a
promise."
In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies
with 800 e-mails a day over a two-week period. The messages
read "We are the Internet Black Tigers and we're doing this to
disrupt your communications." Intelligence authorities
characterized it as the first known attack by terrorists against a
country's computer systems.
In March 2013, the New York Times reported on a pattern of
cyber-attacks against U.S. financial institutions believed to be
instigated by Iran as well as incidents affecting South Korean
financial institutions that originate with the North Korean
government.
Page
23




ANTI-CYBERCRIME STRATERGIES

1. Cybercrime legislation as an integral part of a cybersecurity strategy.
2. Implementation of existing strategies
3. Relevance of cybercrime issues within the pillars of cybersecurity
4. A cybercrime policy as starting point.
5. Responsibility within the government
6. Determination of stakeholders.
7. Identification of benchmarks.
8. Defining legal frameworks that require amendments, updates or
changes .
9. Relevance of crime prevention.
10. Models for extension of regulator responsibility.
11.International cooperation





Page
24


CYBERCRIME LEGALISATION


In India the Information Technology Act, 2000 is the Mother
Legislation that deals with issues related to use of computers,
computer systems , computer networks and
the Internet. Amended by the Information Technology
(Amendment)Act, 2008. Penalties and adjudication for various
offences involving computers, computer systems and computer
networks. Imprisonment and fine for various
Cybercrimes defined.

Penalties for damage to computer, computer system etc. have been
fixed as damages by way of compensation not exceeding Rs.
5,00,00,000/- to affected persons.
Cyber offences to be investigated only by a Police Officer not below
the rank of the Inspector (now), Deputy Superintendent
of Police( earlier).

If a person without the permission of owner or any other person in
charge of a computer, computer system or computer network,
accesses or secures access to such computer, computer system or
computer network, the said acts are torts and crimes
under the Indian cyberlaw.
Tampering with computer source documents Section 65

Computer related offences - Section 66-Occurs when there is
intent to cause or knowledge that one is likely to cause wrongful
loss or damage to the public or any person by destroying or
deleting or altering any information residing in a computer
resource or diminishing its value or utility or affecting it
injuriously by any means.


Page
25


SUMMARY

Computer crime, or Cybercrime, refers to any crime that
involves a computer and a network. Netcrime is criminal
exploitation of the Internet.Different types of Cyber Crimes
includes cracking, copyright infringement, child pornography,
and child grooming, identity theft, stalking, bullying
and terrorism.

According to NCRB report increase percentage in crimes of All
type committed in 2011 and committed in 2012 is 60%.The cost
of cybercrime and cyber espionage to the global economy is
probably measured in the hundreds of billions of dollars.

The increasing number of Internet users causes difficulties for
the law-enforcement agencies because it is relatively difficult to
automate investigation processes.

Criminals can commit serious computer crimes with only cheap
or second-hand computer technology knowledge counts for
far more than equipment.The success of the Internet also
depends on powerful search engines that enable users to
search millions of webpages in seconds. This technology can
be used for both legitimate and criminal purposes
.
As the location of the criminal can be completely different from
the crime site, many cyber offences are transnational.It is not
just increasing power of single-user computers that poses
problems for investigations. Increasing network capacities is
also a major issue.

Cyber offences to be investigated only by a Police Officer not
below the rank of the Inspector (now), Deputy Superintendent
Page
26


of Police( earlier).In India the Information Technology Act, 2000
is the Mother Legislation that deals with issues related to use of
computer systems, computer networks and the Internet.
Page
27


CONCLUSION
Cybercrime has captured the attention of not only law
enforcement, but also home users, system administrators and
even the government. The history of cybercrime has slowly
converged into a state in which large amounts of money are
responsible for driving crime rather than respect or youthful
experimentation.
One such example of its manifestation is through botnets, a
scourge to be sure, on the viability and long term success of the
Internet. Without successful prevention and recovery from having a
computer being taken over, users will find it increasingly difficult to
justify the benefits of the Internet, especially if, for example, their
identity is stolen every time they connect. Luckily, the burgeoning
field of cyber forensics has proved that those who commit such
crimes may not escape the reach of the law.
Although much work must be done in the field to standardize
processes and procedures, it is clear that the majority of criminals
will not remain anonymous forever. With successful forensic
investigations, it is then up to the law and government to assign
punitive measures. This has and will remain challenging for law
and policy makers who traditionally move slowly.
Moreover, international cooperation is increasingly required to
successfully resolve crimes, resulting in the need for
comprehensive treaties between nations. Finally, any discussion of
cybercrime must discuss what directions it seems to be heading in,
as preparations must be made for all contingencies. Certainly,
criminals will attempt to increase their use of the Internet to
perpetrate acts of fraud and other crimes.
The real question though is whether researchers, industry, law
enforcement and the government can work together in order to
reign in the ability to commit crimes and normalize it to a
manageable level. It is still an open debate, though and only time
will tell whether cybercrime becomes an unchecked monster or a
just another growing pain in a long history of the Internet.


Page
28


SOURCES

http://en.wikipedia.org/wiki/Computer_crime
https://www.itu.int/
http://www.mcafee.com/in/resources/reports/rp-
economic-impact-cybercrime.pdf
www.unodc.org/documents/organized-
crime/UNODC_CCPCJ_EG.4_2013/
http://www.gcl.in/
http://www.utica.edu/academic/institutes/ecii/publi
cations/media/global_threat_crime.pdf
http://sysnet.ucsd.edu/~cfleizac/WhiteTeam-
CyberCrime.pdf


REFERENCES

International Journal of Cyber Criminology(VOLUME 7)
IJISC International Journal of Information Security and
Cybercrime
International Journal of electronic security and digital forensics


Page
29


GLOSSARY
Internet: The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a network
of networks that consists of millions of private, public, academic, business networks.
Malware: Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems. It can
appear in the form of code, scripts, active content, and other software. 'Malware' is a general
term used to refer to a variety of forms of hostile or intrusive software.
Copyright infringement: is the use of works protected by copyright law without
permission, infringing certain exclusive rights granted to the copyright holder, such as the right to
reproduce, distribute, display or perform the protected work, or to make derivative works.
Blasphemous: Blasphemy is the act of insulting or showing contempt or lack
of reverence for God, to religious or holy persons or things, or toward something
considered sacred or inviolable.
OECD: The Organisation for Economic Co-operation and Development (OECD)
(French: Organisation de coopration et de dveloppement conomiques, OCDE) is
an international economic organisation of 34 countries founded in 1961 to stimulate economic
progress and world trade. It is a forum of countries committed to democracy and the market
economy.
NCRB: The National Crime Records Bureau, abbreviated to NCRB, is an Indian
government agency responsible for collecting and analysing crime data as defined by the Indian
Penal Code (IPC).
GDP: Gross domestic product (GDP) is the market value of all officially recognized final
goods and services produced within a country in a year, or other given period of time. GDP per
capita is often considered an indicator of a country's standard of living.
[2][3]

S-ar putea să vă placă și