Documente Academic
Documente Profesional
Documente Cultură
The advancement in emerging internet technology and its wide spread knowledge leads
to security issues, cyber crime, internet hackers and intruders. The charisma of internet
enhances the network structures that develop enormous online theft, fraud, are called as
cyber attacks or cyber crime. In our paper we propose the cybercrime and the types of its
illegal activities using the internet. Either national or international cybercrime creates
huge negative impacts over society. We analyze the cybercrime web data due to social
media using data mining techniques. Social networking websites are used as a medium
of interaction and communication among all the people across the world. Due to over use
and lack of awareness leads to increase the cyber crimes by several aspects. Data mining
applied in acquiring negative impacts in social network sites. The data mining algorithm
is used to analyze the crime data.
Key Words: Internet technology, cyber crime, social media, data mining technique,
negative impact analysis.
Cybercrime is a kind of crime that happens in "cyberspace", that is, happens in the world
of computer and the Internet. Although many people have a limited knowledge of
"cybercrime", this kind of crime has the serious potential for severe impact on our lives
and society, because our society is becoming an information society, full of information
exchange happening in "cyberspace". Thus, it is necessary to introduce cybercrime
detailed.
While there are several textbooks talking about cybercrime, but focusing on the statutes
and laws relevant this new breed of crime, few papers or textbooks focus on the
"computer science" itself. In other words, most of materials talk about the "crime" of
"cybercrime", but this paper will talk more about "cyber". In this paper, first, we will
introduce the definition, origins and evolution of cybercrime. Second, the three
categories of cybercrime,
which are target cybercrime, tool cybercrime, computer incidental, are presented in each
section respectively, where some latest cases will be studied. Finally, the summary will
be given. Keywords: Survey, Cybercrime,CyberCrime, Cyber-crime, Cyber crime,
Computer crime
IMPACT OF CYBER CRIME ON SOCIETY IN BANGALORE – A STUDY
Chapter 1
INTRODUCATION
INTRODUCATION
1. Target cybercrime : The crime in which a computer is the target of the offense.
2. Tool cybercrime: The crime in which a computer is used as a committing the
offense.
3. Computer incidental : The crime in which a computer plays a minor role in
committing the offense.
The boundaries of these categories ,actually ,are not so clear .For example ,if someone
uses high –tech hacking into a computer or server, getting some thinking valuable , it’s
hard to say it must be a “theft “in tool cybercrime or a “hacking” in target cybercrime .so
why do we still categorize cybercrime ? I think we can analyze cybercrime better and
more efficiently by this way . Although there are some intersection , with categorization ,
we will focus on each part of cybercrime respectively and then a comprehensive concept
finally.
Cyber crime is a crime which involves the use of digital technologies in commission of
offence , directed to computing and communication technologies . The modern
techniques that are proliferating towards the use of internet activity results in creating
exploitation , vulnerability making a suitable way for transferring confidential data to
commit an offence through illegal activity involves like attacking on information center
data system , theft ,child pornography built images , online transaction fraud ,internet
sale fraud also development in internet malicious activities such as virus , worm and
third party abuse like phishing ,email scams etc. The universal approach of network
needs to recover from committing illegal activity in all world and to stop the criminal
nature by protecting unlawful activity by enforcing different level of firewall setting
within its offline control for every by enforcing different level of firewall setting within
its offline control for every nation in order to monitor and prevent crimes carried out in
cyberspace. Network security controls are used to prevent the access of hacking in
networks which includes firewall, virtual private networks and encryption algorithms .
Out of these , the vertical private network (VPN) provides end users with a way to
privately. Access information on their network over a public network infrastructure such
as internet .
The world we are in today is all about information technology (IT) because we are in the
age of information technology and the people with the right information , with proper
way of disseminate this information and processing them is considered as the most
successful. Information technology is the transfer of information using
telecommunication and micro-based computer system . nowadays, the computer has
replaced manual records , and the fraudulent input document has been substituted by
manipulating data held in a computer system. This manipulat6ion does not need to be
sophisticated . computers have become the mainstay of business and government
processes. Business has been using them for years and in most countries, there are drives
towards electronic or joined up government . This is to allow the people to access
government services from their desktop in their own home . Cybercrime , like every
digital industry , in outsourcing . Though the U.S. still produces more malware , spam
and viruses than any country in the world , illicit IT jobs are increasingly scattered
across an anarchic and international Internet , where labor is cheap , legitimate IT jobs
are scarce and scammers are insulated from the laws that protect their victims by
thousands of miles. As Thomas Friedman might say , the criminal underworld is flat.
The statistics that have been obtained and reported about demonstrate the seriousness
Internet crimes in the world . Just the “phishing” emails mentioned in a previous
paragraph produce one billion dollars for their perpetrators (Dalton 1) . In a FBI survey
in early 2004, 90 percent of the 500 companies surveyed reported a security breach and
80 percent of those suffered a financial loss (fisher 22) .A national statistic in 2003 stated
that four billion dollars in credit card fraud are lost each year . only two percent of credit
card transaction take place over the Internet but fifty percent of the four billion ,
mentioned before are from the transaction online (Burden and palmer 5) .All these
finding are just an illustration of the misuse of the Internet and a reason why Internet
crime has to be slowed down.
Internet crime is crime committed on the Internet , using the Internet and by means if the
Internet .
Computer crime is a general term that embraces such crimes as phishing , credit card
frauds, bank robbery , illegal downloading, industrial espionage , child pornography ,
kidnapping children via chat rooms , scams cyber terrorism , creation and /or
distribution of viruses, spam and so on . All such crimes are computer related and
facilitated crimes.
With the evolution of the Internet , along came another revolution of crime where
the Perpetrators commit acts of crime and crime and wrongdoing on the world wide web.
Internet crime takes many faces and is committed in diverse fashions . The number of
users and their diversity in their diversity in their makeup has exposed the Internet to
everyone . Some criminals in the Internet have grown up understanding this
superhighway of information , unlike the older generation of users . This is why Internet
crime has been exposed to the world and some remain a mystery up until they are
perpetrated against someone or some company .
The different types of Internet crime vary in their design and how easily they are able to
be committed . Internet crimes can be separated into two different categories. There are
crimes that bare only committed while being on the Internet and are created exclusively
because of the world wide wed. The typical crimes in criminal history are now being
brought to a whole different level of information and ingenuity . Such new crimes
devoted to the Internet are email ”Phishing “, hijacking domain names , virus imitation ,
and cyber vandalism , A couple of these crimes are activities that have been exposed and
introduced into the world, people have been trying to solve virus problems by installing
virus protection software and other software that can project their computers. Other
crimes such as email “phishing “are not as known to the public until an individual
receives one of these fraudulent emails. These emails are cover faced by the illusion that
the email is from your bank or another bank. When a person reads the email he/she is
informed of a problem with he / she personal account or another individual wants to send
the person some of their money and deposit it directly into their account. The email asks
for your personal account information and when a person gives this information away ,
they are financing the work of a criminal.
MEANING:
Cybercrime is defined as crime in which a computer is the object of the crime (hacking ,
phishing , spamming ) or is used as a tool to commit an offense (child pornography , hate
crimes). Cybercriminals may use computer technology to access personal information ,
business trade secrets or use the internet for exploitative or malicious purpose . criminals
can also use computers for communication and document or data storage . criminals who
perform these illegal activates are often referred to as hackers.
The Indian legislature doesn’t provide the exact definition of cyber crime in any statute
, even the information Technology Act,2000; which deals with cyber crime doesn’t
defined the team of cybercrime .However in general the term cybercrime means any
illegal activity which is carried over or with the help of internet or computers .
DEFINITION OF CYBERCRIME
telecommunication networks such as Internet (chat rooms, emails, notice boards and
groups) and mobile phones (SMS/MMS)”
We do not have any precise definition of cyber crime; however following is the
general definitions of team cyber crime;
The oxford Dictionary defined the team of cybercrime as “criminal activities carried
out by means of computers or the Internet .”
“cyber crime may be said to be those species, of which , genus is the conventional
crime and where either the computer is an object or subject of the conduct constituting
crime”
“cyber crime means any criminal or other offence that is facilitated by or involves the
use of electronic communications or information systems, including any device or the
internet or any one or more of them “
Professor S.T viswanathan has given in three definitions in his book the Indian cyber
lows with cyber glossary is as follows –
1 Any illegal action in which a computer is the tool or object of the crime I .e any
crime , the means or purpose of which is to influence the function of a computer,
HISTORY OF CYBERCRIME
The history of cybercrime is short compared with traditional crimes. The first
published report of cybercrime occurred in the 1960s, when computers were large
mainframe systems. Since mainframes were not connected with other ones and only few
people can access them , the cybercrimes were always “ insider” cybercrimes, which
means employment allowed them to access into mainframe computers. Actually , in the
1970s, the cybercrime which was “computer crime “in fact was different from the
cybercrime we face with today, because of no Internet in that era . In following decades,
the increasing of computer net work and personal computers transformed “computer
crime” into real cybercrime .since Internet was invented ,people began to exchange
information based on networks of computers, also keep data in computer rather than
paper. At the same time , the cybercrime was not only restricted in target cybercrime ,
but expanded into tool cybercrime and computer incidental . this process is similar to the
process of learning one language . In childhood , we learn language itself ; then when we
grow up and are good at it , we will use it to communicate is to divide it into three
categories that are said in the magic of language itself ; tool cybercrime is similar to
fraud or harassment on street or in other face –to face ways , but the place in which tool
cybercrime happens is not physical environment but cyberspace; computer sronic proof
is save in computer or the camera captures the criminal withdrawing money in a bank
generally, these three categories are elaborated in the three following sections and in
each section some latest cases will be studied.
Prof. R.K.Chaubey, “An Introduction to Cyber Crime and Cyber law”, Kamal Law
House, 2012 successful computer was built and the size of the computer was so big that
it takes the space of entire room and they were too expensive to operate. The functioning
of these computer were not understandable to large number of people and only select
people with expertise had direct access to such computers, and has the knowledge to
operate them. For obvious reasons, the computer technology was extremely expensive
and beyond the purchasing capacity of almost the entire population until IBM’s came
into being wherein it introduced its stand-alone “personal computer” in 1981 and
exposing many to the rewards of quick data access and manipulation that, up to that time,
had been realized by few. The Personal computers become cheaper and become
household item at the start of 21st century in India. The Internet was first started by the
US department of defence, after World War II with the idea to have a network which
could work in the event of disaster or war and securely transmit information. The First
Network was known as ARPANET, with the development of Transmission Control
Protocol/Internet Protocol, World Wide Web and Hypertext the internet become rage all
over the world. With the growth of Internet the quality and variety of information grew.
However at that point nobody anticipated the opportunities’ the internet is going to
provide the technology savvy criminals. In India the internet services started by the state-
owned “Videsh Sanchar Nigam Limited “in year 1995 and in 1998 the government has
ended the monopoly of VSNL and market is opened to private operators. At that point,
the internet users in India are 0.1% of total population, and now India has become the 2
nd largest country in terms of internet users after china with 33.22% people using
internet.
NATURE OF CYBERCRIME :-
This section demonstrates that cyber crime is highly complex, self reinforcing,
technologically advanced, geographically widespread and indiscriminate by examining
the history, tools, industrial nature, perpetrators and victims of cyber crime.
CHAPTER -2
DESIGN OF THE STUDY
STATEMENT OF PROBLEM :-
The ‘cyber manthan’ has bestowed many gifts to humanity but they come with
unexpected pitfalls. It has become a place to do all sort of activities which are prohibited
by law. It is increasingly being used for pornography, gambling, trafficking in human
organs and prohibited drugs, hacking, infringing copyright, terrorism, violating
individual privacy, money laundering, fraud, software piracy and corporate espionage, to
name a few.
Well, the new medium which has suddenly confronted humanity does not
distinguish between good and evil, between national and international, between just and
unjust, but it only provides a platform for the activities which take place in human
society. Law as the regulator of human behaviour has made an entry into the cyberspace
and is trying to cope with its manifold challenges.4 Though various countries have their
domestic cyber laws, but the problem is that most of the books deal with cyber laws of
individual nations. In this research work an attempt has been made to do a comparative
study of the cyber laws of different countries.
A legal framework for the cyber world was conceived in India in the form
of Ecommerce Act, 1998. Afterwards, the basic law for the cyberspace transactions in
India has emerged in the form of the Information Technology Act, 2000 which was
amended in the year 2008. The IT Act amends some of the provisions of our existing
laws i.e. the Indian Penal Code, 1860; the Indian Evidence Act, 1872; the Bankers Book
Evidence Act, 1891 and the Reserve Bank of India Act, 1934. Though since 2000 the IT
Act is in place in India for curbing cyber crimes, but the problem is that still this statute
is more on papers than on execution because lawyers, police officers, prosecutors and
Judges feel handicapped in understanding its highly technical terminology. Through this
thesis the researcher has tried to interpret its technical provisions into simple language
which can be understood even by laymen.
Since cyber crime is not a matter of concern for India only but it is a
global problem and therefore the world at large has to come forward to curb this menace.
As a saying in criminology goes – “a crime will happen where and only when
the opportunity avails itself.” Until recently, we were aware of only traditional types of
crimes like murder, rape, theft, extortion, robbery, dacoity etc. But now with the
development and advancement of science and technology there came into existence
machines like computers and facilities like internet. The internet has opened up a whole
new virtual heaven for the people both good and bad, clever and naive to enter and
interact with lot of diverse cultures and sub-cultures, geography and demographics being
no bar. The very same virtues of internet when gone in wrong hands or when exploited
by people with dirty minds and malicious intentions, make it a virtual hell. Stories of
copyright theft, hacking and cracking, virus attacks and plain hoaxes etc. have mounted
up in the last few years. There is no single 3 cyber stalking, cyber ragging6 etc. and also
the US, UK and Indian approaches towards these offences.
The law enforcement officials have been frustrated by the inability of the
legislators to keep cyber crime legislation ahead of the fast moving technological curve.
At the same time, the legislators face the need to balance the competing interests
between individual rights such as privacy and free speech, and the need to protect the
integrity of the world’s public and private networks. Moreover while investigating cyber
crimes, the investigating agencies and law enforcement officials follow the same
techniques for collecting,
Apart from tangible rights, some intangible rights called as ‘intellectual property rights’
such as trademarks, copyrights and patents etc. are also infringed in the cyberspace
There is no dearth of specific books on IPRs, but books on IPRs vis-à-vis cyberspace are
not much in number. This study has tried to undertake a collaborative approach on IPRs
and cyber world. The purpose of this study is to cover the complete scenario of internet
crimes, their magnitude and nature, and make an insight into the people who are
responsible for it. This research work will also take a comprehensive view of the
governmental efforts being done in India and abroad to stop such crimes and will look
closely on their success and failures. An effort will also be made to vigorously analyze
the various perspectives of IT Act, 2000; its inns and outs including its shortcomings and
the possible means and ways to overcome them.
A major reason for lesser computer crime during this period was a lack of
widespread access to computers and network . In those ‘prehistoric ‘ days of computer
crime , there was no wide spread public access to networks no internet , and no laws
regarding computer activities . In fact the only people who had any access to computers
and networks tended to be university professors, students and researches
The main aim is to study the judicial interpretation of the prevalent cyber
laws at the global level. The endeavour is to determine all the important facets of cyber
crimes in various countries of the world including UK, USA and India. The study also
attempts to find possible 5 implications of the recently evolved cyber crimes. The
significance of the study is to decipher the cyber law as developed in India as well as to
do critical comparative analysis of the cyber laws as developed in other countries. The
study is important both from the theoretical and practical point of view. On a theoretical
level, it reveals the judicial appreciation of all the important facets regarding cyber
crimes. On the practical level, it clearly shows the extent to which judicial approach
meets the requirements of the day by protecting the people against various cyber
offences. The result of the study would provide hitherto unknown criteria to evaluate the
legislative and judicial philosophy in the research area. The practical utility of the work
lies in the fact that policy making institutions may remove ambiguities surrounding the
cyber laws. They may also enact specific cyber There is a tremendous scope of cyber
law in India as the number of activities through internet is on increase with the
changing times, the requirement for cyber laws and their application is gathering
momentum and hence the career option as a cyber-lawyer seems very lucrative
option for students.
The research has been focused on the cases recorded and handled by the
Bangalore police department as the preferred location for undertaking the study for the
research , as there is dearth in the terms of research or study in the state . obtaining
information from the cybercrime handling authorities is very difficult , as they like to
keep privacy and confidentiality in managing the case. Due to the restrictions in
providing permission to collect information for their privacy policy ,some of the offices
could not cooperate due to the time constraint . The research had some difficulties while
obtaining permission for conducting even the pilot study in their departments. The
primary data are collected only from the cases registered. The cases registered again in
specific in Bangalore . The published sources of information and other major sources of
data collection .
Hypotheses:-
In consistent with the objectives, following hypotheses were formed by the researcher:
H1. “Cyber Cafe Visitors are aware about cyber security and fall short to take
precautions to avoid Cyber-crime.”
H2. “The Cyber Cafe rules and regulations have adversely affected Cyber Cafe.”
H3. “Cyber Cafe Owners feel that there is a lacuna in the audit done”
1) H1. “Cyber Cafe Visitors are aware about cyber security and fall short to
This hypothesis has been tested by using the awareness of Cyber Cafe Visitors regarding
cyber Security and precautions they take to avoid Cyber-crime. To study the awareness
and precaution factors, factor analysis is used to develop concise multiple item scales for
measuring various constructs. This test is carried out by using Bartlett‟s test of
Sphericity which checks the determinant of correlation matrix into consideration which
converts it into a chi-square statistics. Another condition needs to be fulfilled before
factor analysis would be carried out Kaiser –MeyerOlkin (KMO) statistics. To study the
awareness and precautions to avoid Cybercrime the cyber security awareness parameters
was considered. This parameter is based on the questionnaire of Visitors .
2) H2. “The Cyber Cafe rules and regulations have adversely affected Cyber
Cafe.”
This hypothesis has been tested by using the primary data collected from Owner
regarding the rules and regulations followed in Cyber Cafe and their effect on Cyber
Cafe business. To study the adverse effect of rules and regulations of Cyber Cafe, the
parameters such maintaining log registers, type of cubicle and its height,electronically
maintained records, document verification, web camera, decline in Cyber Cafe Visitors
etc. were considered and Z- Statistics at the 5% level of significance is used. This
parameter is based on the questionnaire of Owners.
3) H3. “Cyber Cafe Owners feel that there is a lacuna in the audit done”
This hypothesis has been tested by using the primary data collected from Owner
regarding the audit done in Cyber Cafe by government official. In this case Z Statistics at
the 5% level of significance is used. This parameter is based on the questionnaire of
Owners.
METHODOLOGY:-
Data mining offers with the discovery of unpredicted patterns and hidden new ideas
which can be in tremendous databases It serves as an automatic instrument that uses
multiple evolved computational strategies, together with synthetic intelligence (the usage
of computer systems to perform logical services), to discover wholly and signify big
knowledge units involving one or more information sources, opting for colossal,
recognizable patterns, traits, and relationships now not easily detected via normal
analytical procedures on my own. This knowledge then may support with quite a lot of
functions, such because the prediction of future activities or behaviours. The
development of new intelligent tools for automated data mining has led to design and
construct the successful systems that show early promise in their ability to scale up to the
handling of voluminous data sets. We are using clustering and k-means creates groups
from a set of objects so that the members of a group are more similar. It’s a popular
cluster analysis technique for exploring a data.
3. SAMPLE SIZE :-
The sample size is 50 out of the total population of 557, which is representative sample
cut across all categories of the crimes registered and unregistered. Random and stratified
techniques is used to identify the samples Out of the 50 samples identified, 18 are
rejected, as these respondents are not traceable during the study. As a result 481 are valid
samples and it constitutes 8.63 %, hence taken for the research study. The secondary
sources- published and mimeo (Un Published) are relied upon to articulate further data
for the research
The study is related to the Cyber Cafe in Bangalore city. The researcher has
considered the Bangalore urban region for the study. This study is primarily focused on
cyber security management awareness and implementation in Bangalore urban region.
Also it focuses on impact of Cyber-crime on Visitor and study and identifies problems
faced by Cyber Cafe Owners. The scope of the research is limited to
4. PRIMARY DATA :-
The primary data was collected by using the Questionnaire-cum-
schedule method. The tool for the data collection was constructed by the researcher
which was pre tested by a pilot study. The tool was standardized by deleting the
insignificant questions and after the validation the Tool was used for this research.
As there is no standard tool available for this type of research constructed the tool
based on the review of related literature and the objectives of the study. The
instruments used during the study included a web-based survey, telephone
interviews, e-mail statements, face-to-face interviews, case studies and
questionnaires.
Questionnaires : The following steps were used for collecting the primary data.
Distributing the questionnaire & getting it filled by the concerned respondents. For
this purpose an online questionnaire as well as the manual method was used for
collecting data. Personally visiting the Cyber Cafe for interviews and manual
collection of data from Cyber Cafe. Personally visiting the Cyber Cafe as Visitors for
observation purpose.
5. SECONDARY DATA:-
The researcher being from a technical field may not be able to understand
terminologies which are not related to the subject like process of amendment in cyber
security law, legal formalities if Cyber Cafe Owners want to run other business along
with internet service etc. Since a number of registered and unregistered Cyber Cafes are
found in Bangalore city, expanding the sample frame for the survey had to be restricted
in the sample size.
1. The research is limited to only from Cyber Cafe in Bangalore city due to
time limitation in obtaining data across larger geographical area.
2. The research is limited to only the registered Cyber Cafe in Bangalore city so
as to understand whether registered Cyber Cafe Owners are aware about cyber security
49 and how they implement it. Unregistered Cyber Cafes are not considered even though
they are in vast numbers.
3. The detail study of role of police in examining the cyber security is not
considered for the study but an brief overview is considered for their routine visit to
Cyber Cafe as per rules and regulations
5. The problem told by most of the Owners related to corruption and bribe by
government officers are also not considered since the focus of the study is cyber security.
References period :-
1. Agarwal, S.C.
, in his article “Training on Cyber Law, Cyber Crime and Investigation by Police: Need
of Awareness and Requirements” 35 has stated that the law enforcement officials
throughout the world are severely handicapped in tackling the new wave of cyber crimes.
He has gone to the extent of saying that you “either have to take a cop and make him a
computer expert or take a computer specialist and make him a cop”.36 He has suggested
that we have to set up a Cyber Crime Investigation and Training Cell in all the States for
imparting training to the police personnel, public prosecutors and judicial officers.37
2. Ahmad, Farooq
in his article “Interplay of Internet Domain Names and TrademarkLaw”,38 has observed
that internet domain names have spawned unprecedented legal issues which do not have
express solution. Though the courts have accorded equal protection to trademarks and
domain names, but still domain names are at stake due to highly technical nature of
computers and internet the role of Uniform Domain Name Dispute Resolution Policy
(UDRP) in protecting domain names.39
3. . Behra, Abhimanyu
in his article “Cyber Crime and Law in India”,40 has discussed various types of
cyber crimes and also suggested strategies to curb them.
4. Dalal, A.S.,
Opine that e-frauds and identity thefts have caused financial loss on a global level
and is a challenge for the nation’s infrastructure and security. Further, cyber criminals
are using networks to commit traditional crimes online such as child pornography and
pirated software .Legislation and effective enforcement is needed to counter attack
viruses, hackers and terrorists. However, the authors have not discussed the effects of
cyber crime on society. They have limited themselves on technical issues.
6. Brenner (2010)
The fact that common man has a limited knowledge about the crimes
which occur in cyberspace. Online crimes nowadays have an impact on the lives of
individuals and on society as a whole. Cyber crime as Brenner explains is not a new form
of crime. The information that we post online makes us vulnerable to cybercrime.
Brenner discusses hackers as ‘computer whizzes’ who attack websites for online
extortion. The crucial point is that a lack of sufficient number of law enforcement and
security experts in the field of cyber crime makes us more vulnerable to cyber attacks.
However, the techniques which are deployed to prevent computer intrusions are far
behind the techniques used by cyber criminals. The author criticizes law enforcement
agencies while he himself has not analyzed as how technology can be used effectively to
control cyber crime.
7. Furnell (2002)
8. Arquilla (2001)
9. Nandan Kamath
CHAPTER SCHEME:
The proposed mini project will be presented in 5 chapters they are as follows:
CHAPTER 1: Introduction
Chapter 3
CYBER CRIME
Cybercrime, or computer-oriented crime, is the crime that involves a computer and
a network. The computer may have been used in the commission of a crime, or it may be
the target.Cybercrimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss, to the victim directly
or indirectly, using modern telecommunication networks such as Internet (networks
including but not limited to Chat rooms, emails, notice boards and groups) and mobile
phones (Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security
and financial health. Issues surrounding these types of crimes have become high-profile,
particularly those surrounding hacking, copyright infringement, unwarranted mass-
surveillance, extortion, child pornography, and child grooming. There are also problems
of privacy when confidential information is intercepted or disclosed, lawfully or
otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the
perspective of gender and defined 'cybercrime against women' as "Crimes targeted
against women with a motive to intentionally harm the victim psychologically and
physically, using modern telecommunication networks such as internet and mobile
phones". Internationally, both governmental and non-state actors engage in cybercrimes,
including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing
international borders and involving the actions of at least one nation state is sometimes
referred to as cyber warfare.
A report (sponsored by McAfee), published in 2014, estimated that the annual damage to
the global economy was $445 billion.Approximately $1.5 billion was lost in 2012 to
online credit and debit card fraud in the US. In 2018, a study by Center for Strategic and
International Studies (CSIS), in partnership with McAfee, concludes that close to $600
billion, nearly one percent of global GDP is lost to cybercrime each year.
Other forms of fraud may be facilitated using computer systems, including bank
fraud, carding, identity theft, extortion, and theft of classified information.
A variety of internet scams, many based on phishing and social engineering, target
consumers and businesses.
Cyber terrorism:-
Cyber terrorism in general can be defined as an act of terrorism committed through the
use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda
piece in the Internet that there will be bomb attacks during the holidays can be
considered cyber terrorism. There are also hacking activities directed towards
individuals, families, organized by groups within networks, tending to cause fear among
people, demonstrate power, collecting information relevant for ruining peoples' lives,
robberies, blackmailing etc.
Cyber extortion :-
Cyber extortion occurs when a website, e-mail server, or computer system is subjected to
or threatened with repeated denial of service or other attacks by malicious hackers. These
hackers demand money in return for promising to stop the attacks and to offer
"protection". According to the Federal Bureau of Investigation, cybercrime extortionists
are increasingly attacking corporate websites and networks, crippling their ability to
operate and demanding payments to restore their service. More than 20 cases are
reported each month to the FBI and many go unreported in order to keep the victim's
name out of the public domain. Perpetrators typically use a distributed denial-of-service
attack. However, other cyber extortion techniques exist such as doing extortion and bug
poaching.
Cyber warfare:-
The U.S. Department of Defence (DoD) notes that the cyberspace has emerged as a
national-level concern through several recent events of geostrategic significance. Among
those are included, the attack on Estonia's infrastructure in 2007, allegedly by Russian
hackers. "In August 2008, Russia again allegedly conducted cyber-attacks, this time in a
coordinated and synchronized kinetic and non-kinetic campaign against the country
of Georgia. The December 2015 Ukraine power grid cyber-attack has also been
attributed to Russia and is considered the first successful cyber-attack on a power grid.
Fearing that such attacks may become the norm in future warfare among nation-states,
the concept of cyberspace operations impacts and will be adapted by war fighting
military commanders in the future.
Computer as a target :-
These crimes are committed by a selected group of criminals. Unlike crimes using the
computer as a tool, these crimes require the technical knowledge of the perpetrators. As
such, as technology evolves, so too does the nature of the crime. These crimes are
relatively new, having been in existence for only as long as computers have—which
explains how unprepared society and the world in general is towards combating these
crimes. There are numerous crimes of this nature committed daily on the internet.
Computer viruses
Denial-of-service attacks
Malware (malicious code)
Computer as a tool :-
When the individual is the main target of cybercrime, the computer can be considered as
the tool rather than the target. These crimes generally involve less technical expertise.
Human weaknesses are generally exploited. The damage dealt is
largely psychological and intangible, making legal action against the variants more
difficult. These are the crimes which have existed for centuries in the offline
world. Scams, theft, and the likes have existed even before the development in high-tech
equipment. The same criminal has simply been given a tool which increases their
potential pool of victims and makes them all the harder to trace and apprehend.[14]
Crimes that use computer networks or devices to advance other ends include:
Fraud and identity theft (although this increasingly uses malware, hacking or
phishing, making it an example of both "computer as target" and "computer as tool"
crime)
Information warfare
Phishing scams
Spam
Propagation of illegal obscene or offensive content, including harassment and threats
The unsolicited sending of bulk email for commercial purposes (spam) is unlawful in
some jurisdictions.
Phishing is mostly propagated via email. Phishing emails may contain links to other
websites that are affected by malware. Or, they may contain links to fake online
banking or other websites used to steal private account information.
Online harassment
Connecticut was the U.S. state to pass a statute making it a criminal offense to harass
someone by computer. Michigan, Arizona, and Virginia and South Carolina have also
passed laws banning harassment by electronic means.
Harassment as defined in the U.S. computer statutes is typically distinct from cyber
bullying, in that the former usually relates to a person's "use a computer or computer
network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent
language, or make any suggestion or proposal of an obscene nature, or threaten any
illegal or immoral act," while the latter need not involve anything of a sexual nature.
fact spoken or written "true threat" speech/text is criminalized because of "intent to harm
or intimidate", that also applies for online or any type of network related threats in
written text or speech. The US Supreme Court definition of "true threat" is "statements
where the speaker means to communicate a serious expression of intent to commit an act
of unlawful violence to a particular individual or group".
E mail bombing:
Hacking:
Among the all types of cybercrime it is the most dangerous and serous thread to
the internet and e-commerce. Hacking simply refers to the breaking into the computer
system and steals valuable information (data) from the system without any permission.
Hacking is done by hackers now the question arises who are hackers; hackers are in b/w
client & server and able to spoof the data/info. Duplication the IP address illegally.
Phishing:
phishing simply refers to steal information like passwords, credit card details,
usernames etc. over the internet. Phishing is typically carried out by email spoofing and
instant messaging. In this type of crime hackers make a direct link which directs to the
fake page /website which looks and feel like identical to the legitimate one.
Identity theft: It simply refers to fraud or cheat others by make their wrong identity of
others. It involves stealing money or getting other benefits by pretending to someone else
Information Technology (Amendment)Act, 2008, crime of identity theft under Section
66-C.Whoever, fraudulently or dishonestly make use of the electronic signature,
password or any other unique identification feature of any other person, known as
identity theft For which criminal shall be punished with imprisonment of either
description for a term which may extend to three years and shall also be liable to fine
which may extend to rupees one lakh.
Internet fraud:
Internet fraud can occur in chat rooms, email, message boards or on websites. In
internet fraud criminal can send fake info to the victim in cases like online purchasing,
real estate, pay BAL, Work-at-home donation processing etc.
Malicious Software:
These are Internet-based software or programs that are used to disrupt a network.
The software is used to gain access to a system to steal sensitive information or data or
causing damage to software present in the system.
Domain hijacking:
SMS Spoofing:
SMS Spoofing allows changing the name or number text messages appear to
come from. Voice Phishing: The term is a combination of "voice" and phishing. Voice
phishing is use to gain access of private, personal and financial information from the
public. Voice phishing uses a landline telephone call to get information.
Cyber trafficking:
It may be trafficking in weapons, drugs, human beings, which affect the large
numbers of persons.2012, respectively. As per the information reported to and tracked by
Indian Computer Response Team (CERT-In), a total number of 308, 371 and 78
government websites were hacked during the years 2011, 2012 and 2013 respectively
and 16,035 incidents related to spam, malware infection and system break-in were
reported in 2013.
More recent versions of Cybercrime is considered one the most dangerous threats for the
development of any state; it has a serious impact on every aspect of the growth of a
country. Government entities, non-profit organizations, private companies and citizens
are all potential targets of the cybercriminal syndicate. Cyber criminals are no different
than traditional criminals in that they want to make their money as quickly and easily as
possible. Cybercrime prevention can be achieved fairly quickly and in a cost-effective
manner The prevention of cyber-criminal activities is the most critical aspect in the fight
against cybercrime. It’s mainly based on the concepts of awareness and information
sharing. A proper security posture is the best defence against cybercrime. Every single
user of technology must be aware of the risks of exposure to cyber threats, and should be
educated about the best practices to adopt in order to reduce their “attack surface” and
mitigate the risks.
Below mentioned security guidelines and good practices may be followed to minimize
the security risk of cybercrime:
keep your computer current with the latest patches and updates. one of the best
ways to keep attackers away from your computer is to apply patches and other software
fixes when they become available. By regularly updating your computer, you block
attackers from being able to take advantage of software flaws (vulnerabilities) that they
could otherwise use to break into your system. While keeping your computer up-to-date
will not protect you from all attacks, it makes it much more difficult for hackers to gain
access to your system, blocks many basic and automated attacks completely, and might
be enough to discourage a less-determined attacker to look for a more vulnerable
computer elsewhere. choose strong passwords and keep them safe passwords are a fact
of life on the internet today—we use them for everything from ordering flowers and
online banking to logging into our favorite airline Web site to see how many miles we
have accumulated. The following tips can help make your online experiences secure
Selecting a password that cannot be easily guessed is the first step toward keeping
passwords secure and away from the wrong hands. Strong passwords have eight
characters or more and use a combination of letters, numbers and symbols (e.g., # $ % !
?). Avoid using any of the following as your password: your login name, anything based
on your personal information such as your last name, and words that can be found in the
dictionary. Try to select especially strong, unique passwords for protecting activities like
online banking.
Keep your passwords in a safe place and try not to use the same password for every
service you use online.
Change passwords on a regular basis, at least every 90 days. This can limit the damage
caused by someone who has already gained access to your account. If you notice
something suspicious with one of your online accounts, one of the first steps you can
take is to change your password.
Several types of security software are necessary for basic online security.
Security software essentials include firewall and antivirus programs. A firewall is usually
your computer's first line of defense-it controls who and what can communicate with
your computer online. You could think of a firewall as a sort of "policeman" that watches
all the data attempting to flow in and out of your computer on the Internet, allowing
communications that it knows are safe and blocking "bad" traffic such as attacks from
ever reaching your computer. The next line of defence many times is your antivirus
software, which monitors all online activities such as email messages and Web browsing
and protects an individual from viruses, worms, Trojan horse and other type’s malicious
programs. More recent versions of antivirus programs, such as Norton Antivirus, also
protect from spyware and potentially unwanted programs such as adware. Having
security software that gives you control over software you may not want and protects
you from online threats is essential to staying safe on the Internet. Your antivirus and
antispyware software should be configured to update itself, and it should do so every
time you connect to the Internet. Integrated security suites such as Norton Internet
Security combine firewall , antivirus, antispyware with other features such as anti-spam
and parental controls have become popular as they offer all the security software needed
for online protection in a single package. Many people find using a security suite an
attractive alternative to installing and configuring several different types of security
software as well as keeping them all up-to date.
Exercise caution when sharing personal information such as your name, home
address, phone number, and email address online. To take advantage of many online
services, you will inevitably have to provide personal information in order to handle
billing and shipping of purchased goods. Since not divulging any personal information is
rarely possible, the following list contains some advice for how to share personal
information safely online:
Keep an eye out for phony email messages. Things that indicate a message may be
fraudulent are misspellings, poor grammar, odd phrasings, Web site addresses with
strange extensions, Web site addresses that are entirely numbers where there are
normally words, and anything else out of the ordinary. Additionally, phishing messages
will often tell you that you have to act quickly to keep your account open, update your
security, or urge you to provide information immediately or else something bad will
happen. Don't take the bait.
Don't respond to email messages that ask for personal information. Legitimate
companies will not use email messages to ask for your personal information. When in
doubt, contact the company by phone or by typing in the company Web address into
your Web browser. Don't click on the links in these messages as they make take you to
fraudulent, malicious Web sites.
Guard your email address. Spammers and phishes sometimes send millions of messages
to email addresses that may or may not exist in hopes of finding a potential victim.
Responding to these messages or even downloading images ensures you will be added to
their lists for more of the same messages in the future. Also be careful when posting your
email address online in newsgroups, blogs or online communities. Online offers that look
too good to be true usually are. The old saying "there's no such thing as a free lunch" still
rings true today. Supposedly "free" software such as screen savers or smiley’s, secret
investment tricks sure to make you untold fortunes, and contests that you've surprisingly
won without entering are the enticing hooks used by companies to grab your attention.
Review bank and credit card statements regularly: The impact of identity theft and
online crimes can be greatly reduced if user can catch it shortly after their data is stolen
or when user gets symptoms. Regularly check bank and credit card’s statements. Now,
many banks and services use fraud prevention systems that call out unusual purchasing
behaviour.
CHAPTER 4
Male 30 60
Female 20 40
Overall 50 100
ANALYSIS
The table 4.1 showing the 60% (30) of respondents are male ,40% (20) respondents
are female . majority of the respondents male .
MALE
FEMALE
TOTALE
INTERPRTATION
From the above graph we can observe the majority of the respondents were male .and
lowest respondents were female.
Below 25 27 54
26-30 8 16
31-35 6 12
35-40 5 10
Above 40 4 8
Overall 50 100
60
50
40
no of the respondents
30
aggregate
20
10
0
below 25 26 to 30 31 to 35 36 to 40 above 40
Interpretation
The above graph shows that the majority of the respondents i.e 54 % of the respondents
aged below 25 years and only 10% respondents aged above 40 years.
15 35 50
Marital status
15
married
unmarried
35
INTERPRETATION
The above graph showing marital status of the respondents, majority of the respondents
were unmarried (35). Lowest respondents were married (15).
40
30
40
30
16
15 20
20 14
10 no of respondents
8
0 7 aggreagte
INTERPRETAYTION
Graph 4.4 showing monthly income, the majority of the respondents earn 15000 to
25000 and lowest respondents earn monthly income were 35000 to 40000.
160
140
120
100
AGGREGATE %
80
NO OF RESPONDENTS
60
40
20
0
YES NO TOTAL
Interpretation
Graph 4.5 showing that, our country have a current policy on cyber crime ,
majority respondents are no lowest respondent were yes .
160
140
120
80 AGGREGATE %
NO OF RESPONDENTS
60
40
50 50
20
0 0
YES NO TOTAL
Interpretation
Graph 4.6 the above graph shows that the number of respondents have knowledge about
internet
160
140
120
100
100
80 80
aggregate %
60 no of respondents
40
20 40
20 50
0 10
yes
no
overall
INTERPRETATION
Graph 4.7 showing that ,using the internet , majority respondents(80%) were using
internet (40) and not using internet (10)
40
40
35
30
30
25
20 20
20 no of respondents
15 aggregate %
15
10 10
10
5
5
0
at home at office at cyber any other
café
INTERPRETATION
Graph 4.8 The graph showing that, where we are using internet, the. majority of the
respondent using internet at office and lowest using internet at other place
120
100
80
76
60 agrregate %
no of respondents
40
24
20 38
12
0
yes no
INTERAPRITATION
Graph 4.9 The graph showing that where we using the internet on mobile phone,
majority of respondents use internet in phones rather than in cyber centres.
150
100
80
50 aggreagte
40
0 10
5 no of respondent
10
5
0
Interpretation
Graph 4.10 showing that frequently you use the internet , the majority of the respondent
using internet daily and lowest using internet yearly .
Table 4.11 In your family who uses Internet other than you
Graph 4.11 in your family who uses internet other than you
30 30
30
25 20 20
20
15 15 no of respondent
10 15
10
10 aggreagte
5
0
father
mother
brother
sister
Interpretation
Graph 4.11 showing that , their family members using the internet, majority of the
respondents are brother & sister and lowest respondents were father & mother .
70
60
50
40 40 40
30
20
16
10 20 20
8 4
0 2
searching chatting email video games
Interpretation
Graph 4.12 showing that, mostly using for searching in internet is higher than playing
video games in the internet.
Yes 45 90
No 5 10
140
120
100
80 aggregate
60 no of responeents
40
20
0
yes no
INTERPRETATION
Graph 4.13 In the above graph the aggregate of having email accounts is higher than the
no of respondent.
Table 4.14 you get the mail from unknown persons anytime
Yes 5 10
No 45 90
Overall 50 100
GRAPH 4.14 Do you get the mail from unknown persons anytime
no of resopndents
yes
no
45
INTERPRETATION
Graph 4.14 in the above given graph there is less chances of getting Fake
emails from the internet.
TABLE 4.15 uses Face book /twitter /blog/any other social network site
Graph 4.15 use face book /twitter /blog/ any other social network site
140
120
100
84
80 Column1
aggregate %
60
no of respondents
40
20 42
16
8
0
yes no
INTERPRETATION
In the above graph the aggregate of using face book/twitter is higher in range of 100%.
And no of respondents who use these sites are 50%.
TABLE 4.16 view about social networking site (Face book /what's up/
twitter /any other social network site
Graph 4.16 view about social networking site (Face book /what's up/ twitter
/any other social network site
NO of respondents
12
yes
No
38
INTERPRETATION
Graph 4.16 In the above graph the number of respondents given positive response
toward the question and less number of respondents are given negative response towards
the question.
Daily 10 20
Weekly 15 30
Monthly 15 30
Yearly 10 20
Total 50 100
no of respondents
16
15 15
14
12
10 10 10 no of respondents
8
6
4
2
0
0 2 4 6
INTERPRETATION
In the above given graph the 15 members of respondents update antivirus weekly
with the aggregate of 30. And 15 members of respondents update antivirus monthly with
the aggregate of 30. And remaining respondents update according to daily and yearly.
Chapter -5
1. we can observe the majority of the respondents were male .and lowest
respondents were female
2. observe that the in the overall sample size 50, 54% (27)of the respondents are of
the age is below 25 years , 16% (8) respondents between26-30 years , 12% (6)
respondents between 31-35 years ,10%(5) respondents between 36-40 yerars,8%
(4) respondents between above 40 years
3. The marital status of the respondents, majority of the respondents were
unmarried (35). Lowest respondents were married (15).
4. To earn monthly income, the majority of the respondents earn 15000 to 25000
and lowest respondents earn monthly income were 35000 to 40000
5. Does our country have a current policy on cyber crime , majority respondents are
no lowest respondent were yes .
6. do you know the internet ,equal respondents were yes no.
7. The using of the internet , majority respondents(80%) were using internet (40)
and not using internet (10)
8. we are using internet, the. majority of the respondent using internet at office and
lowest using internet at other place.
9. we using the internet on mobile phone, majority of respondents use internet in
phones rather than in cyber centres.
10. you use the internet , the majority of the respondent using internet daily and
lowest using internet yearly.
11. The family members using the internet, majority of the respondents are brother
& sister and lowest respondents were father & mother .
12. The mostly using for searching in internet is higher than playing video games in
the internet.
13. The aggregate of having email accounts is higher than the no of respondent.
14. There is less chances of getting Fake emails from the internet.
15. The aggregate of using face book/twitter is higher in range of 100%. And no of
respondents who use these sites are 50%.
16. The number of respondents given positive response toward the question and less
number of respondents are given negative response towards the question.
2. Special Statutes on cyber crime is required to be passed to deal with the new form of
crimes and to protect digital data. It will include Intellectual Property crimes and crimes
relating to human rights.
3. The Government has to create a special branch of Cyber crimes and Intellectual
Property Crimes within its criminal infrastructure, so that the enforcement personnel may
take quick action against the Cyber Criminals.
6. An Act having objectives to prevent computer fraud and abuses are to be enacted to
combat criminal operations. It may be helpful particularly during investigation and
prosecution of criminals. It will deal with security and safety of certain computers,
computer networks and data stored on the computers and unauthorized access to
Government Computers. The Act will also deal with hackers.
8. It has been the fact that there is some grey areas in Intellectual Property regarding
"domain name". Though the domain names are protected under relevant l.P. Law. There
is scope of further amendment of such laws to make this more clearer for ends of
effective increase of the commerce.
9. Good infrastructure and facilities be provided by the Government to the Cyber Crime
Cell and the Cyber Crime Police Station to deal with the cyber crimes. With weak
infrastructure facilities the police personnel facing tremendous problem in detecting and
10. It also requires the maintenancf compulsory Register of every cyber cafe for
detection of cyber criminals who are sending threat e-mails and are interested to Page
No. 212 practice such other acts involving the question of the country's safety and
security.
11. The users are not aware of using computer and Internet. The ISPs have to provide
some sort of warning on the Internet. Awareness of general public and investigation
agencies is essential. Active involvement of the Government is also essential. ISPs have
to be more accountable to the Government and also to the public for providing required
information. The Government has to frame stringent law upon the ISPs.
12. The punishment for commission of cyber crimes to be increased to deter future
offence. It must not only be deterrent but must also be exemplary.
13. For increasing awareness the emphasis has to be laid on cross-border investigation
and exchange of measures for prevention of Cyber Crimes among various nations.
14. The Interpol, the Police Organization may be utilized for speedy exchange of
information and materials required for prosecution of cyber criminals for its trans-border
nature. In absence of extradition treaty with number of countries it has been difficult to
apprehend the cyber criminals and to have necessary information from other countries
when criminal operation is being done from other countries. It is therefore urgent need of
time that Government may consider to take the help of INTERPOL. It is also intended
that necessary legal provision should be included in the proposed new Act.
15. Alike Green Bench, a Special Bench for dealing with cyber crimes may be created at
least in each and every High Courts. Special branch may also be created in every
metropolitan cities and districts.
BIBLOGRAPHY:
1. BOOKS:
Tipton ,Harold F& Krause , Micki . information security ,management
handbook (5th ed) .London : Taylor & Francis e –library,2005
Cyber crimes against women in India.
Understanding cybercrime: Phenomena, challenges and legal response .
Comprehensive Study on Cybercrime .
2. ARTICLES :
Cyber crime in the society : problems and preventions
(kamini dashora , phD , principal p.p Patel college )
Cyber crime threats for E – commerce.
A Literature Review on cyber crime security in India context
c)31-35 d)36-40
3. 3.Martial status
a)Married
b) unmarried
4. .Monthly income
a)Below 15000 b) 15000-25000
c)25000-35000 d) 35000-40000
5. Does our country have a current Policy on cybercrime?
a)Yes
b)No
a) Yes
b)No
a)Yes
b)No
b) At Office
d) Any Other
a)Daily
b) Weekly
c)Monthly
d) Yearly
11. In your family who uses the internet other than you?
a)Father
b)mother
c)brother
d) sister