In the globe, cybercrime is a "relatively recent form of crime. Any unlawful
activity that takes place on or using technology that is acknowledged by the
"Information Technology Act1," such as computers, the internet, or other
devices.referred to as cybercrime. The most prevalent type of crime in
contemporary India is cybercrime, which has a catastrophic effect.
Criminals not only seriously harm society and the government, but they also
greatly conceal their identity Technically skilled criminals engage in a number
of illegal activities online.Cybercrime can be broadly construed as any illegal
activity that makes use of a computer or the internet as a tool, a target, or
both.Although the word "cybercrime" is not defined in any act or legislation
approved by the Indian government, it has occasionally been interpreted by
Indian courts.
The misuse of technology and society's increasing reliance on it in modern
civilization are the root causes of cybercrime, an unstoppable evil. Computer
use and other associated technologies are becoming an increasingly necessary
part of daily life, supporting user ease.
This medium is limitless and unquantifiable." A few examples of recently
developed cybercrimes include cyberstalking, cyberterrorism, email spoofing,
email bombing, cyberpornography, cyberdefamation, and others. Some common crimes
may be considered cybercrimes if they are carried out online or via a computer.
Cyber Crime: A Way Forward:
The definition of a cybercafé is "the use of technology to perpetrate classic
crimes like robbery, theft, and fraud or to carry out a purposeful attack like
hacking a warning system to access a forbidden area. At the level of the
individual, the state, or the country, all of this is feasible. There won't be
any laws or legal authorities ready to render a favorable decision in the event
of a country assault; instead, the main priority is to apply political,
economic, or military pressure.
"Virtual only" offences including the spreading of illicit content are one type
of cybercrime that can be committed. photos, files, or private information. This
category includes expert "programming organizations as well, who offer everyone,
including anonymous persons, digitally customized goods and businesses.
to governments, including the rejection of executive attacks and responsibility
for networks that have been hacked. We will spend more time online, which will
lead to an increase in the frequency of inappropriate online behavior. Law
enforcement will definitely become more involved in online activities as a
result of this trend."
"The phrase is not defined in the information technology act of 2000, which
deals with cybercrime. No law passed by the indian legislature contains a
specific definition of cybercrime. However, the term "Cybercrime" Is frequently
used to describe any illegal behavior carried out online or using computers.
Cybercrime is described as "Offenses committed against individuals or groups of
individuals with a criminal motive to intentionally harm the victim's reputation
or cause the victim physical harm" Or "Mental harm, or loss, directly or
indirectly, via modern telecommunication networks such as the internet (chat
rooms, emails, notice boards, and groups), and mobile phones" (debarati halder
and k. Jaishankar, 2009).
Types of Cyber Crimes
Child Pornography:
That is among the most serious offenses. Online predators "communicate with and sexually attack youngsters all around the world through the Internet. The growing usage of the internet has made children a tempting target for hackers. Through chat rooms, pedophiles approach young people with the goal of luring them into their traps by befriending them and stealing their personal information. Kids are lured to the internet by these pedophiles, who subsequently attack them sexually or use them as sex objects.
Hacking:
Hacking is when someone gains unauthorized access to a target device, makes changes to allow for continued access, and modifies the configuration, functionality, or service of the computer without the owner's knowledge or consent.
Denial of service attack:
Denial of service attack is an attempt to make a machine or network resource unavailable to its intended users, typically by flooding it with traffic.
Virus dissemination:
This kind of illegal activity necessitates direct or unauthorized access to the operating system through the installation of extra programs that are referred to as ss bugs, worms, or logic bombs. Computer sabotage, which often refers to the unauthorized deletion or destruction of computer data or the Internet feature, which stops a device from operating normally, is obviously a criminal offense.
Computer forgery:
This occurs as computerized records' data is altered and processed. However, forgeries can also be executed by machines. The availability of computerized color laser copies triggered a new wave of fraudulent altering or copying.
Credit card fraud:
Computer theft occurs because cash can easily be exchanged for currencies housed in computers by modern enterprises. Organized crime usually targets personal and financial credit card information as well as credit card identity information. In addition to being worth far more than traditionally economic assets, digital assets may also fall under a higher economic class.
Phishing:
Phishing is an attempt to deceive individuals into revealing personal, sensitive information such as passwords and credit card numbers by disguising as a trustworthy entity in an electronic communication.
Spoofing:
In order for the other computers to be accessible from anywhere on the network, make sure that one machine on the network has a distinct computer, typically a computer with special access permissions.
Cyberstalking:
A person is being pursued or monitored online in a form of cybercrime known as "cyberstalking." A cyber-stalker does not physically pursue their target; instead, they find them after an online interaction and verbally stalk, harass, and threaten them. It violates your right to privacy on the internet.
Internet time thefts:
This occurs when someone who is not authorized makes use of someone else's paid-for Internet time. This kind of cybercrime was unheard of before the victim reported it. The Indian Penal Code5 and the Indian Telegraph Act[Indian Telegraph Act, 1885, No. 13, Acts of Parliament, 1885 (India)] are typically used to punish this offense.
Salami attack:
In this type of fraud, the culprit makes small adjustments that are undetectable. Criminal takes money from all of the bank's customers' accounts-as little as 2.50 per month-and deposits it in their own. No account manager can approach the bank for too little money in this case, although fraudulent earnings are enormous.
Virus / worms attacks:
Viruses are programs that attach to a computer or a file and then replicate themselves on other computers and files connected to a network. They typically affect a computer's data by altering or erasing it. Worms do not need a host to attach to, in contrast to viruses. They just create functional copies of themselves and keep doing so until the computer's available memory is exhausted.
Cybersquatting:
Cybersquatting is the practice of obtaining a domain name in order to demand payment from the owner of a trademark (such as a company name, trade name, or brand name), and it can also involve typo squatting (where one letter is different). By demonstrating that the defendant registered a domain name containing the plaintiff's distinctive trademark in bad faith and with the intent to profit, a trademark owner can prevail in a cybersquatting action.
Data Driven Attack:
A kind of attack where the attack is launched by a user or another program using innocent data as cover. Because it may bypass the firewall in data form and launch an assault against a system behind it, a data-driven attack on a firewall is concerning.
DNS Spoofing:
A spoofing technique that uses the Domain Name Service, which enables networks to convert textual domain names to the IP addresses required to route data packets. A type of human intelligence (HUMINT) in which abandoned items and data are collected in an effort to find useful information.
Logical errors:
This offense depends on a specific conditional circumstance occurring. The Chernobyl virus, which remained dormant for the majority of the year and only became active on a particular day.
Trojan assaults:
A Trojan is an illegal application that functions from within by posing as authorized software and masking its true objectives.
Keystroke Logging:
It is encoding and recording a user's keystrokes. This kind of program is used to bypass security measures by extracting encryption keys and passwords.
Electromagnetic intrusion:
Electromagnetic pulses that
are intentionally introduced into transmission pathways in any form with the
intention of tricking or confounding operators.
Cyber Defamation:
Any disparaging message meant to damage a person's brand or reputation is
referred to as cyber defamation. Someone can be defamed through libel or
slander. Cyber defamation is the term for defamation committed using computers
and/or the Internet.
Section 2
- Information Technology Act, 2000
Cyberlaws are governed in India under the Information Technology Act, which went
into effect in 2000. This Act makes it simple to register real-time information
with the government in order to ensure eCommerce's legal protection. Numerous
changes were made as a result of the complexity of cybercriminals and people's
propensity to misuse technology. In order to protect the e-government,
e-banking, and e-commerce industries, the Indian Parliament set harsh penalties
and fines, which are highlighted in the ITA. All current communication
technologies are now included in the ITA's extended scope.
The IT Act is the most significant, as it directs all Indian legislation to
strictly regulate
cybercrime:
Section 43
Damage to a computer, computer system, etc.: [Penalty and Compensation]If
anybody uses a computer, computer system, or computer network without the
owner's or another person in charge's consent.
Section 66
Computer related offences - If any person, dishonestly or fraudulently,
Computer-related offenses - Anyone who commits an act listed in section 43
dishonestly or fraudulently is subject to a term of imprisonment that may be up
to three years, a fine that may be up to five lakh rupees, or both.
Section 66B Punishment for dishonestly receiving stolen computer resource or
communication device
If you receive or keep a stolen computer resource or communication device
dishonestly and you know it is a stolen resource or communication device, or you
have reason to believe it is a stolen resource or communication device, you
could be punished with both jail time and a fine of up to one lakh rupees, or
both.
Section 66C10 Punishment for identity theft
If you receive or keep a stolen computer resource or communication device
dishonestly and you know it is a stolen resource or communication device, or you
have reason to believe it is a stolen resource or communication device, you
could be punished with both jail time and a fine of up to one lakh rupees, or
both.
Section 66D Punishment for cheating by personation by using computer resource
A fine of no more than one lakh rupees and imprisonment of any kind for a term
not to exceed three years are the penalties for exploiting a communication
device or computer resource to commit fraud by impersonation.
- ndian Penal Code (IPC) 1980
The Indian Penal Code (IPC), 1860, and the Information Technology Act of 2000
are both used to prosecute identity theft and related cyber offences.
The primary relevant section of the IPC covers cyber frauds:
- Forgery (Section 464)
- False documentation (Section 465)
- Forgery pre-planned for cheating (Section 468)
- Reputation damage (Section 469)
- Presenting a forged document as genuine (Section 471)
- Companies Act of 2013.
The Companies Act of 2013 is viewed by corporate stakeholders as the legal
prerequisite for simplifying everyday operations. Since this Act directs the
required techno-legal compliances, businesses that are less compliant risk legal
repercussions.
The SFIO (Serious Frauds Investigation Office) was given the power to bring
legal action against Indian companies and their directors under the Companies
Act of 2013. Since the announcement of the Companies Inspection, Investment, and
Inquiry Rules, 2014 in 2014, SFIOs have become considerably stricter and
comprehensive in this area.
The regulation has completely covered all regulatory
compliances, including cyber forensics, ediscovery, and cybersecurity vigilance.
For company directors and representatives, the Businesses (Administration and
Management) Rules, 2014 establish strict cybersecurity requirements and
obligations.
- NIST Compliance
The Cybersecurity Framework (NCFS), which offers a unified approach to
cybersecurity, has been recognised by the National Institute of Standards and
Technology (NIST), the most reputable institution in the world for
certification.
The "NIST Cybersecurity Framework" contains all the standards, benchmarks, and
best practises for safely managing cyber-related risks. The main objectives of
this system are versatility and cost. It promotes the security and stability of
crucial infrastructure:
- Improving cybersecurity risk management, analysis, and mitigation to reduce expenses related to data loss, abuse, and restoration.
- Compiling a list of the most crucial procedures and tasks so that protection may be focused on them.
- Illustrates the dependability of organizations that safeguard key assets.
- Aids in selecting initiatives that will optimize cybersecurity return on investment.
- Meets contractual and legal requirements.
- Contributes to the overall information security of the program.
- Area under cyber law
Cyber laws include a wide range of scenarios. Other laws protect citizens from
becoming victims of crime as a result of unethical online actions, while some
laws control how people and corporations utilise computers and the internet.
Some of the essential components of cyber law are as follows:
- Internet fraud:
Consumers rely on cyber regulations to shield them against online fraud. To address online identity theft, credit card fraud, and other financial crimes, legislation has been passed. Federal or state criminal charges may be pursued against someone who commits identity theft. Another option is for a victim to file a lawsuit. Cyber solicitors struggle to defend and bring charges against people who are thought to be engaging in online fraud.
- Copyright
:
The internet has made copyright violations easier to commit. In the early days of internet communication, violations of copyright were all too widespread. Both corporations and individuals require the help of solicitors to enforce copyright rights. Copyright infringement is a type of cyber law that protects people's and businesses' rights to make money off of their own original works.
- Defamation
:
Many employees utilise the internet to interact with one another. When someone uses the internet to distribute inaccurate information, slander may have been committed. Defamation laws, which are civil regulations, ban making untrue statements in the public that can harm a person's or a company's reputation. Those who post comments online that violate the text of the law are subject to defamation laws.
- Harassment and stalking
Laws:
against stalking and harassment are regularly broken through the use of online posts. When someone persistently makes threatening statements about another person online, both civil and criminal laws are breached. When harassment happens via electronic means, such as online correspondence or other technical means, cyber lawyers represent and prosecute the victims.
- Freedom of expression
:
This is a crucial aspect of cyber law. Some online behaviours are prohibited under cyberlaws, however freedom of speech laws allow people to express themselves. Clients of cyberlaw firms must be made aware of the limitations on free expression, such as laws prohibiting obscenity.
When there is a dispute about whether a client's acts constitute as free speech, cyber lawyers may be able to defend them.
- Trade Secrets
:
Cyber laws are frequently used by businesses who conduct business online to secure their sensitive data. Google and other internet search engines, for example, have highly developed algorithms that are utilised to provide search results. They also put a lot of effort into developing other features, such map services, intelligent assistance, and flight search services, to mention a few. These companies could be able to use cyber laws to sue to preserve their trade secrets if necessary.
- Future of Cyber laws:
As cyber law develops internationally, several countries see the necessity of
legal harmonisation as well as the need for international best practises and
standards to direct implementation. The judiciary will need to further develop
cyberlaw. Technical complexity has led to a change in understanding, and both
substantive and procedural laws would need to be changed as a result. The courts
must develop a cyberjurisprudence in order to defend our constitutional
protections.
The new year, 2012, has started. Technology and cyberspace are constantly making
huge strides as the world approaches a singularly unique period in history.
The economic, political, and social upheavals of 2011 will serve as a backdrop
for 2012's concerns and trends in cyber law. Crystal gazing is never
straightforward, particularly with such precision.
However, several key changes in cyber law that are projected to occur in 2012
may be forecast based on the current state of jurisprudence and shifting
patterns. The most important issues in cyber law in 2012 are anticipated to be
increased network attacks and the need for appropriate legal frameworks for
boosting, maintaining, and promoting cyber security.
As data security attacks and vulnerabilities are anticipated to rise sharply in
2012, policymakers around the world will be challenged to put in place effective
facilitating legal frameworks that not only secure and preserve cyber security
but also help instill a cyber security ethos among netizen users. Many of the
current global cyber legislation fall short of adequately addressing significant
cyber security challenges.
This year, there will likely be a renewed focus on the creation of efficient
required rules to assist the protection, maintenance, and promotion of cyber
security in the context of the usage of computers, computer systems, computer
networks, computer resources, and communication devices. Limiting the use of
social media will be a difficult assignment for cyber authorities throughout the
world.
l media by entrenched interests while simultaneously providing effective
remedies to those who have been harmed by different unlawful conduct on social
media.
- SECTION 3 - Statistical Data of Cybercrime of India:
Source: NCRB (India), Number of cyber-crimes reported across India from 2012 to
2019 Statista
In 2019, there have been a lot more reports of cybercrime in India. In that
year, reports of cybercrime incidents exceeded 44.5 thousand. Karnataka and
Uttar Pradesh had the greatest percentage during the study period.
Uttar Pradesh leads the way
The northern state of Uttar Pradesh experienced more cybercrimes than any other
state in the country in 2018, with more than 6,000 incidents being reported to
authorities. The next year, Karnataka, the nation's tech-heavy state, followed
suit. Most of these accusations included the use of the Information Technology
Act with the goal of misleading or abusing the targets sexually.
It's a numbers game
- Indian customers lost close to 18 billion dollars as a result of cybercrime
in 2017, according to estimates. However, they were only forecasts based on the
information that had been made public. Because of insufficient categorization
practises in a country like India and a lack of information about cybercrime,
the real numbers are likely underreported. Recent government initiatives, such
the development of a specific online reporting mechanism for cybercrime, might
be to blame for an increase in online crimes starting in 2017.
-
Measures to prevent Cyber Crimes
Due to borderless nature of Cybercrimes, innovative measures are required to
curb the issue of hi-tech crime. Therefore, apart from the Cyber Laws, one
should keep the following points in mind for safety in Cyberspace while surfing
the Internet:
Students should be made aware of problems right away, including knowledge of
internet laws and crimes. Cyberliteracy teaching should be provided to students
at computer centres, schools, colleges, and institutions. internet law
To teach students the principles of the internet and its security, every
educational institution is able to conduct an awareness workshop.
- To lessen the effects of identity theft and crimes committed online, bank and credit card statements should
be inspected on a frequent basis.
- To prevent hackers from breaking into your computer, keep your operating system updated. You may prevent
hackers from exploiting software defects that could otherwise give them access to your system and allow them
to hack it for illicit reasons by keeping your computer up to date.
- It is preferable to use eight-character strong passwords that are both unique and safe for online activities
like online banking. Useless passwords like your email address, login name, last name, date of birth, or
month of birth should be avoided.
- To be notified if someone tries to access your email account, add your mobile phone number to your account.
- For two-step authentication to work, your username and password are required. However, if you forget your
password, a verification code is sent to the provided mobile number for your security. Despite a hacker is
able to guess your password, he or she will be unable to access your account without the temporary
verification code.
- You can end yourself on phony and hazardous websites if you respond to emails asking for personal information
or click on the links in them. Before sending your data to a corporation, review the privacy policies of their
website and software. You won't get emails from reputable companies asking for personal information.
Conclusion
What seems impenetrably well-organized and faultless now could not be tomorrow.
Since the internet is a worldwide phenomenon, many different kinds of illegal
activities are probably to be found there. With the adoption of the Information
Technology Act and the grant of exclusive powers to the police and other
agencies to combat cybercrime, India has achieved significant headway in
reducing this crime.
The power of the human intellect is beyond comprehension. It is difficult to
completely eliminate cybercrime.
You can examine them. No policy has ever been able to completely abolish crime
worldwide, as history has shown. People should be made aware of their rights and
duties, such as the importance of reporting crimes to the authorities as a
responsibility to society, and laws should be more severely enforced since these
are the only ways to prevent crime.
Act marks a significant milestone in the evolution of cyberspace. In addition, I
don't disagree that the Information Technology Act has to be amended in order to
more effectively combat cybercrime. To conclude, I'd want to provide a warning
to people who favour legislation: it's important to remember that the
restrictions of the cyber law shouldn't be made so onerous that they prevent the
industry's growth and render them useless.
Please Drop Your Comments