Editors Column
Total Page:16
File Type:pdf, Size:1020Kb
Editors Column Today, we are happy to present the first edition of the newsletter. This TechNewsletter is started as a medium for displaying the departmental achievements, activities and latest news I appreciate the initiative of students for bringing about cyber space. out this newsletter with the objective of creating awareness among people towards Cyber security It will help us to share and related domain. I wish this will be brought out knowledge among ourselves. on regular basis. We wish a long journey for This newsletter will not only be useful for the this. We are thankful to students, faculty and staff of the University but also for the society in a large. administration for their I convey my best wishes. kind support. M.L. Kumawat - Team Newsletter Vice Chancellor, SPUP, Jodhpur Edition Highlights:- o Cyber Crime: Challenge to Indian-Law Enforcement Agencies o World War C o Need of Cyber Security o Real Time Cyber Crime Case Study o Security Issue with Android Smartphones o Need of Policy to Stop Job Scams o Personality Profile- Dr. Rajagopala Chidambaram o Departmental News We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them? -FBI Cyber Crime: Challenge to Indian Law Enforcement Agencies states to reach the criminal. Cyber Crime has become But it is very difficult task Countries which often the most challenging task to take help from other refuse to give the right for our police system. states police. The police information about the Officers are facing a lot of don’t have centralized criminal so police is unable difficulties in investigating database of criminals hence to do anything without their these types of crimes. Lacs it make this hard to catch support if they are not of cybercrimes have been these criminals. forced to help by some registered under IT One of the main international treaty. (Information technology) characteristics of cyber- Act 2008 but only seven has crime is borderless. The Multiple jurisdictions: convicted. So it has also perpetrator is not limited to Laws differ from state to impact on Indian police as geographical boundaries of state and country to country. well as jurisdiction. a city, state or even country. So an act that is illegal in a E-frauds like 419 scams are region may not be crime in Lack of technical mostly done by a racket other jurisdiction. It which includes local as well capabilities becomes very typical when as criminals from other Most of the officers who the perpetrator is doing act countries so police is able to investigates these cases are where it is not illegal but the catch local persons but the not technical and even they victim comes in the master minds are never are not aware about the jurisdiction where it is caught. terms used in this illegal. environment. They mostly deny to register these cases Most of the hackers traced Anonymity by excusing that these cases are outside the country so It is very easy to hide the have never been solved. the investigation is identity on internet by using If they go on crime scene interrupted due to the lack proxy servers which they cease the computers of support by police of that provides you temporary IPs and all other devices as they so it becomes very difficult country. do for conventional crimes to track them. and this destroys all the -Sachin Mittal evidences against criminals. Nature of evidence Commissioner of Police, It is also the most important Jodhpur Lack of coordination thing which make cyber- of other state’s police crime more difficult to A cybercriminal does not So most of the criminals investigate and prosecute in bound with physical traced are from other comparison to real world boundaries he can be countries like Pakistan, cases. Here everything is anywhere around the globe. China and Nigeria. Hence represented in form of bits So, during the investigation police cannot do anything (zero or one).This type of police need to be interact without the help of these information is fragile and with the police of other can be destroyed easily. Cyber Times Edit. 1, 15 Aug., 2014 Page 1 This type of information The Servers of different also have certain validity service providers like Govt. has said in Rajyasabha time. The integrity of such Gmail, Facebook, and that 1600 arrests have been information is a very big Twitter etc. are located made related to cybercrime issue. As Indian courts take outside country so when under IT Act 2000. large amount of time to LEA (Law Enforcement make the judgment so these Agencies) requires some The NCRB records also evidences can be easily information then they have show that 217,288, 420,966 altered or destroyed till date to write to country and 1,791 cybercrime cases or the resources like hard representative then he writes were registered under IT disk, RAM which has to the concern authority to Act, 2000 during the years limited time validity for data get the required details like 2007, 2008, 2009, 2010 and and in this case the account information. 2011. evidences are lost. Most of And due to the privacy the time electronic issues sometimes they But only 7 convictions are evidences are not captured refuse to give the user’s made till now which is very properly and not preserved information for example US shocking. and presented according to also have data privacy law Indian Evidence Act. but India don’t have. Some of the offences are made bailable under IT Act Cases not reported so after getting bail Most of the people are not accused’s primary goal is to aware of IT Act so after destroy the evidences that becoming victim of a make conviction rate very cybercrime they even don’t low. know that it is a crime and where to report it. So the QUIZ 1:- When senior Judges as well as law enforcement agencies officials of a Fortune 500 lawyers have troubles in identifying company found out that these criminals and they are certain employees were In the courts are also unable to create profile of operating internal slush not technical so they face funds totaling about $286 very much difficulty in these criminals. million dollars, they called making conclusion in these in a computer forensics cases. Judges are fully -Hetram Yadav professional to find out dependent on a few lawyers why and to assess the impact. who have some knowledge Please explain how the of IT Act and computers. So computer forensics it become very serious issue to make the fair judgment professional went about resolving the problem. for victim. They even don’t know about the IP address of a computer then how we can v expect judgment from them. Cyber Times Edit. 1, 15 Aug., 2014 Page 2 World War C the communication and defense although it was never proved or -Nishant Grover systems are down, a full scale taken responsibility by any. military assaults can be launched which would be like Stuxnet destroyed Tehran’s What is it? slaughtering an unarmed pig. In 1000 nuclear centrifuges by Our world, is about to today’s world, communication over speeding them while face a new kind of war, which is very important. It is very making sure that sensor still mankind has never seen before, need for remaining up-to-date showing the normal readings The Cyber World War. ”In that about what it is happening in to operators. This set back the shadowy battlefield, victories the world. If it is gone, a country’s atomic program by will be fought with bits instead country would be blind for the at least two years, as it spread of bullets, malware instead of period of time. It will not only beyond the plant and infected militias, and botnets instead of be disconnected from world but over 60,000 computers as well. bombs” [Fire Eye 2013]. These also from its own potential assaults would be largely allies. Preventive measures unseen and unheard by the A soldier blinded for few Although cyber war public, unlike the wars of seconds in battlefield dies, if can’t be prevented, yet history, there won’t be any you blind a country for 24 measures can be taken to exploding warheads, destroyed hours, the loss of life becomes minimize the damage occurring buildings or frightened civilians unthinkable. due to it. Like Army is to but the list of casualties will be defend land, Navy to defend including leaders of technology, Is it possible for cyber- waters and Air force to defend financial services, defense and air space, there is a desperate governments. A cyber-attack is attacks to deal physical need of cyber army to defend not an end in itself but rather a damage? the internet boundaries of a potentially powerful means to a Yes, it is possible to do country’s networks. One Cyber wide variety of political, so. Hacking into power plant army which go in hand with military, and economic goals. networks of country and different departments of a overloading components can do country, helping them to make How it will happen? real physical damage to components not only on plant their network defenses stronger, A country’s strength and but it can also spread to enhancing intrusion detection defense primarily depends on its domestic households and systems and if in case a military, government and industries connected to it. As a penetration occurs, analyzing it intelligence agency networks. If fact, world has faced it already. and preventing the same in hacked by any other country, Iran was subjected to cyber- future.