Sei sulla pagina 1di 5

ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.

org

Survey on Cyber Crime and Cyber Security

Roshni Bhandari1, Vandan Khamkar2 and Sneh Mehta3


1
Assistant Professor, Computer Engg. Dept., SSAIET, Navsari, Gujarat, India
er.roshni.201@gmail.com, 74052-96455
2, 3
U. G. Student, Computer Engg. Dept., SSAIET, Navsari, Gujarat, India
vandankhamkar1@gmail.com, 81287-70872
snehmehta933@gmail.com , 88668-79221

ABSTRACT and spreading viruses on other computers through


emails, messages or sending some files so when u
Cyber crime also called Computer crime is any crime
click on it the virus start its work of damaging all
that involves a computer and a network. As individuals
and businesses increase their reliance on technology, the files present in computer and stealing all your
they are exposed to the growing cybercrime threats. data and also posting confidential business
Using the computers for our day-to-day transactions is information on the Internet. It also covers the
quite common now days. For example, we pay our life traditional crimes in which computers or networks
insurance premium, electricity bills, reserve flight or are used to enable the illicit activity.
train or bus tickets, order book or any other product
online using personal computer, smart phones, public Table 1: Cyber Crime History (Schjolberg 2017)
browsing centers etc. The number of users doing online
Year Crime History
transactions are growing rapidly ever since, because of
the convenience it gives to the user to transact business John Draper, a phone phreak, found that
without being physically present in the area where the a whistle given as a prize in boxes of
transaction happens. Criminals committing cybercrime Cap’n Crunch Cereal produced the same
are also growing day-by-day with the increased number tones as telephone switching computers
of users doing online transactions. Cybercrime covers a of the time. Phone “phreak is a term
wide range of different attacks such as Cyber extortion, 1971 used to define computer programmers
Cyber warfare, spreading Computer viruses or Malware, obsessed with phone networks, the basis
Internet fraud, Spamming, Phishing, carding (fraud),
of modern day computer networking.
child pornography and intellectual property rights
violation etc. Because of increased cyber-attacks these
The instances of wire fraud rose
days, the online users must be aware of this kind of significantly.
attacks and need to caution while doing online A teller at a local New York bank used a
transactions. This article all show how to prevent those 1973 computer to steal over $2 million
attacks, laws created by government for cyber security dollars.
and it also provides cyber ethics that one should follow The movie War Games is released and
along with a case. 1983 brings hacking to the mainstream. The
movie reveals a teenage boy who hacks
Key words: Cyber crime, Cyber security, Cyber
into a government computer system
ethics.
through a back door.
INTRODUCTION 1986 Congress passes the Computer Fraud
and Abuse Act, making hacking and
Cybercrime can be defined as crimes committed on theft illegal.
the internet using computer as a tool and we 1989 The first large-scale case of ransom
innocents are the target and intended to harm ware is reported. The virus caused as a
someone’s reputation, physical harm, or mentally quiz on the AIDS virus and, after
harm. It involves and uses computer devices and downloading, held computer data losses
Internet that can be committed against an for $500. Another group is arrested
individual or a group. It can also be committed stealing US government data and selling
against government and private organizations.It it to the KGB.
surrounds any criminal act done with the help of 1993 Kevin Poulson is caught and convicted
computer or any electronic device with the help of for hacking into the phone systems. He
Internet is Cyber Crime. It includes anything from took control of all phone lines going
downloading illegal music files, clicking on into an LA radio station in order to
random links on social sites or purchasing sites, guarantee winning a call-in contest. At
stealing millions of dollars from online bank one point he was featured on America’s
accounts (Yassir & Nayak 2012). Cybercrime also Most Wanted, when the phone lines for
includes non-monetary offenses, such as creating that show went mysteriously silent.

27
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org

When the FBI began their search he estate, pay BAL, Work-at-home donation
went on the run but was eventually processing etc.
caught. He was given to 5 years Malicious Software: These are Internet-based
penitentiary. He was the first to have a progammes or software used to disrupt a network.
ban on Internet use included in his It is utilized to gain access to a system to thieve
sentence. sensitive information or damaging to software
The World Wide Web is launched, present in the system.
1994 which allowed hackers to shift their Cyber warfare: It is Internet-based conflict
product info from the old bulletin board involving politically motivated attacks on
systems to their own websites. A student information systems. Cyber warfare attacks may
in the UK uses the information to hack disable official websites and networks, disrupt or
into Korea’s nuclear program & US disable essential services, thief or change data, etc.
agencies using only a Commodore among many other possibilities.
Amiga personal computer. Domain hijacking: It is the act of changing the
CIA Director John Deutsch informed registration of a without permission of its original”
1996 that crime rings were actively trying to registrant.
hack US government and corporate SMS Spoofing: SMS Spoofing allows changing
networks. The US GAO announced files the name or number text messages appear to come
had been attacked at least 6,50,000 from.
times.

Cybercrime can be categorized into following: CYBER CRIMES IN INDIA


E-mail bombing: A human sends a numbers of
emails to the inbox of the target system. Mail First Cybercrime: With the introduction of an
bombs will fill the allotted space on an e-mail Internet service provider policy (ISP) in 1998, the
server of the users e-mail & may result in crashing monopoly of VSNL on Internet came to an end.
the e-mail server. Satyam Infoway (Sify) was the purpose ISP which
Hacking: This is the most dangerous thread to the started functioning in India.
e-commerce & internet. Hacking means breaking It will be of historical importance to mention that
of the computer system and steals valuable data the first incidence of Data being hacked by the
from the system without any permission. Hacking teenagers from the Bhabha atomic research Centre
is done by hackers. Hackers are in b/w client and (BARK) took place in 1998, which was perhaps the
server & spoof the data. first recorded Internet crime in India.
Spreading computer virus: It is a set of SIM Swap Fraud: In August 2018, two men from
instruction which is able to perform some Navi Mumbai were arrested for cybercrime, due to
malicious operations. Viruses stop the normal illegal transfers money from bank accounts of
function of the system programes & also to the numerous individuals by getting their SIM card
computer system. It may also crush your system information.
and make it unusable. Viruses can be spread Cyberattack on Cosmos Bank: In August 2018,
through - Emails, CDs, Pendrives (secondary CosmosBank’s of pune siphoned off nearly 94
storage), Multimedia, Internet. Crores rupees. Hackers wiped out money and
Phishing: Phishing simply refers to steal transferred it to a Hong Kong situated bank by
information like passwords, credit card details, hacking the server of Cosmos Bank.
usernames etc. over the internet. Phishing is ATM system hacked in Kolkata: In July 2018
typically carried out by email spoofing and instant fraudsters hacked into Canara bank ATM servers
messaging. In this hackers make a direct link which and wiped off almost 20 lakh rupees from different
directs to the fake website which looks and feel like bank accounts. Cyber security is opposite of that. It
identical to the original one. is the combination of practices, processes &
Identity theft: It means to cheat others by make technologies designed to protect networks,
their wrong identity of others. It consider thieving computers, data and information from attack,
money or getting other benefits by pretending to damage or unauthorized access.
someone else.
Internet fraud: Internet fraud can occur in chat CYBER CASE
rooms, email, message boards or on websites. In
internet fraud criminal can send fake information to In late 1988, Robert Morris wrote a program
the person for cases like online purchasing, real designed to propagate across networks, infiltrate
Unix terminals using a known bug, and then copy

28
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org

itself. The Morris worm told so that the early think it is not necessary. It is no wonder; about
internet slowed causing untold damage. 45% of attacks are due to employee carelessness.
The worm had effects that lasted beyond an Hyper adoption is putting consumers at risk before
internet slowdown. Robert Morris was the first regulators can react. Consumers are using
person successfully charged under the Computer sophisticated technologies which are much too
Fraud and Abuse Act. Due to this act “Computer advanced for the current controls in place.
Emergency Response Team” was formed. This Employees working at companies are not aware
functions as a non-profit research centre for issues about information security awareness, and many
that could affect the internet as a whole. think it is not necessary. It is no wonder, about
The viruses started after Moris worm found to be 45% of attacks are due to employee carelessness.
deadlier infecting more systems.
The Morris worm also brought with it one last
irony. The worm took advantage of the send-mail STRATEGIES FOR PREVENTION
function in Unix. This was related to the email
function originally formed by Ray Tomlinson. By updating the computers regularly, you block
It’s hard to forget the WannaCry, “the biggest attackers making to take advantage of software
ransomware offensive in history.” Within 24 hours, flaws(vulnerabilities)that they could otherwise use
WannaCry had infected more than 230,000 to break into your system. Selecting password that
computers in over 150 countries. cannot be easily guessed is first step toward
keeping your information secured.
NEED OF CYBER SECURITY Keep your password in safe place and try not to use
the same password for online services. The
Cyber security is needed because government, password needs to change on regular basis, at least
corporate, financial, and medical organizations every 90 days. Protect your computer with security
stores abundant amounts of data on computers and software. Protect your personal information by
other devices. A remarkable portion of that data keep an eye out for phony email messages, don't
may be crucial information, it might be intellectual respond to email message that ask you for personal
property, accounting data, personal information, or information (Kumbhar & Gavekar 2017). Pay
other informatio for which unauthorized access attention to privacy policies on web sites and in
could have negative results as the volume and software. Guard your email address. Review bank
sophistication of cyber-attacks grow, companies and credit card statements regularly everyone is
and organizations that areas regarding information talking about AI and machine learning, and it can
related to national health, security required to take be hard to establish the practical applications
steps to protect their business and personal around the buzz.
information. However, machine learning & AI are the leading
STATUS OF CYBER SECURITY IN INDIA technology in security. Endpoint security
technologies use machine learning to confirm that
Regulators are used for playing catch-up, and they applications are running securely. Vendors are also
are doing too little, too late. merging artificial intelligence and machine learning
The Reserve Bank of India (RBI) and Insurance into security products to identify patterns of
Regulatory Development Authority of India performance that are general, as opposed to
(IRDAI) had released guidelines on Information threatening.
and Cyber Security in the last few years. However,
as cyber-attacks become more sophisticated, these CYBER SECURITY TECHNIQUES
norms having limitation to establish controls of Access control and password security: The concept
crisis more than five years ago. Hyper adoption is of password & user name is the main way of
putting consumers at risk before regulators can protecting our information. This may be one of the
react. Consumers are using sophisticated first measures regarding cyber security.
technologies which are much too advanced for the Authentication of data: The documents that we
current controls in place. want should be checked before downloading and a
Companies are extracting value from data but are reliable source and that they are not altered.
neglecting risks associated with doing so. Most of Authenticating of these documents is normally
the companies do not have an Information Security done by the antivirus software present in the
Management System. devices. Thus good antivirus software is also
essential to protect the devices from viruses.
Employees working at companies are not aware
Malware scanners: This is software that usually
about information security awareness, and many
scans all the files and documents present in the

29
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org

system for malicious code or harmful viruses. someone.


Viruses, worms, and Trojan horses are malfunction 9. Always download games or videos only if they
software, generally grouped together and referred are permissible.
to as malware. The above are a few cyber ethics one must follow
Firewalls: It is a software programe of hardware while using the internet. We are always thought
helping screen out viruses, hackers, and worms that proper rules from out very early stages the same
try to access your computer over the Internet. All here we apply in cyber space.
messages entering or leaving the internet pass
through the firewall present, that check each OTHER INFORMATION
message and blocks those not meet security
criteria. Hence firewalls play an important role in In India, at least one cyber-attack was reported
detecting the malware. every 10 minutes in the first six months of 2017.
As per the “Indian Computer Emergency Response
Anti-virus software: It is a computer programe Team”, a total of 27,482 cases of cybercrimes have
which detects, prevents, and takes action remove been reported throughout the world in 2017.. These
malicious software programes. Most antivirus include phishing, site intrusion, virus, and ransom
includes an auto-update characteristic enabling the ware. The cyber experts told Times of India that
programe to download profiles of new viruses. with the programs such as Digital India in place,
Antivirus software is a must and basic necessity for more Indians are surfing the Internet and hence, it
every system. is crucial to put critical infrastructure in place to
predict and prevent cybercrimes. A total of 1.71 lac
CYBER LAW cybercrimes were reported in India in the past
three-and-a-half years.
IT Act, 2000 came into existence on 17/10/2000. In the last three years, Ransom ware attacks have
The main aim of the Act is “to provide recognition increased. The attacker threatens to publish the data
to electronic commerce and to authorize filing of of peoples online till a certain amount is paid.
electronic records with the government”. The attackers demand ransom in bit coins (a digital
IT Act AMENDMENT-2008 provides additional currency), a secure way for accepting this type of
payment.
focus on information security added new (Singh
2017) sections on offences including Cyber
Terrorism and Data Protection. CONCLUSION

In present scenario there is a sudden rise in E-


CYBER ETHICS business & E-marketing and other endeavors
relevant to electronic-commerce and E-governance.
Cyber ethics are nothing but the code of the Our daily life routine activities are also getting
internet. When we practice these cyber ethic there more dependent on internet, beside that we also
are good chances of us using the internet in a getting more susceptible to get caught in any
proper and safer way. The below are a few of them: mishap through cyber connectivity. Government
1. Do use the Internet to communicate and interact and private companies are still finding out the ways
with other people. Instant messaging and E- to resolve both cybercrime in cyberspace and
mail make it easy to remain in contact with accounting responsibility. The cyberspace stands
each other’s (Namayandeh & Taherdoost). fourth in common space and it is important for all
2. Don’t be a bully on the Internet. of us to have co-ordination and cooperation among
3. Do not hurt person by lying, sending all countries of the world for security of
embarrassing pictures. cyberspace. As there is a big rise in need of
4. Internet is considered as world’s largest library cyberspace, its exploitation is increasing on a very
with information on any topic in any subject rapid pace. Now-a-days, cyber security is
area, so its necessary to use information legally becoming very important and crucial area for lager
and in correct manner. number of terrorist attack on important and critical
5. Do not operate others accounts. information centre. Present laws are not efficient
6. Do not send malware of other’s systems for enough for preventing the cyber threats and there is
making corrupt. a great urge for rectification of these laws and
7. Never share your information to anyone so you needs to be check timely and modify according to
would end up in a trouble. the betterment of Indian Society. International
8. When you’re online never pretend to the other cooperation is the need of hour to crack down an
person, and don’t create false accounts on efficient law to handle cybercrime which is not

30
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018
ISSN :2454-2415 Vol. 6, Issue 6, 2018June, 2018DOI 11.25835/IJIK-71www.doie.org

confined to boundaries of states and thus an


universal collaboration of states is required to plan
together in order to reduce the rapidly increasing
cybercrime & cyber risk to the least level.

REFERENCES
Yassir, A., & Nayak, S. (2012). Cybercrime: A Threat To Network Security. International Journal of Computer
Science And Network Security Review, 12.
Schjolberg, S. (2017). The History of Cybercrime. Cybercrime Research Institute Review, 12.
Kumbhar, M., & Gavekar, V. (2017). A Study of Cybercrime Awareness For Prevention and Its Impact.
International Journal of Recent Trends in Engineering & Research Review, 03. 241-242.
Singh, A. (2017). Studies Report on Cyber Law in India & Cybercrime Security. International Journal of
Innovative Research in Computer and Communication Engineering Review, 05.
Namayandeh, M., & Taherdoost, H. Review Paper on Computer Ethics and Related Research Models.

Websites:
http://www.pollere.net/Pdfdocs/1021103-technical_only.pdf

https://digital.wings.uk.barclays/for-everyone/milestone/introduction-to-cyber-security/

]https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html

https://www.testbytes.net/blog/cyber-attacks-on-india-2018/

http://rtinagpur.cag.gov.in/uploads/CaseStudies/CaseStudiesonCyberCrimesNOTSENT/CaseStudiesonCyberCrim
es.pdf

https://digitalguardian.com/blog/what-cyber-security

http://www.helplinelaw.com/employment-criminal-and-labour/CCII/cyber-crimes-in-india-what-is-types-web-
hijacking-cyber-stalking.html

https://www.123helpme.com/cyber-crime-and-cyber-law-preview.asp?id=191081

31
International Journal of Innovative Knowledge Concepts, 6(6) June, 2018

Potrebbero piacerti anche