Cyber Crime: Practices and Policies for Its Prevention
Total Page:16
File Type:pdf, Size:1020Kb
Cyber Crime: Practices and Policies for Its Prevention Ajeet Singh Poonia Department of Computer Science and Engineering College of Engineering and Technology, Bikaner, India. [email protected] Dr. Awadesh Bhardwaj Department of Management Studies Malviya National Institute of Technology, Jaipur, India. [email protected] Dr. G. S. Dangayach Department of Mechanical Engineering Malviya National Institute of Technology, Jaipur, India. [email protected] Abstract- Cyber civilization considers I. INTRODUCTION knowledge as an integral part of society Cyber crime is different from and human systems. With the facilities of Conventional crime (“a legal wrong that can cyber civilization the evils of cyber be followed by criminal proceedings which civilization also need to be equally tackled may result into punishment.”(1)). Cyber through technological as well as social crime is the latest and perhaps the most means. The phenomenal growth of complicated problem in the cyber world. It is computers and Internet services has defined as “Any criminal activity that uses a engendered the problem of cyber crime computer either as an instrumentality, target proliferation on the account of or a means for perpetuating further crimes investigation difficulties and lack of strong comes within the ambit of cyber crime” (2 A evidences further, existing laws and generalized definition of cyber crime may be preventive measures are not effective to “ unlawful acts wherein the computer is curb such crimes. So to cope up with the either a tool or target or both”(3)) situation we have to modify the old .Cybercrime is also substantially different policies and practices to meet our security from computer crime. It's like the difference needs. Also we can see that the crimes are between people who use computers for all coming in new forms embedded with new they can be versus people who use technologies, which is very difficult to computers as a tool like a typewriter. Cyber investigate with the available resources. crime is hard to detect, thus giving the To stand with them we need a hi-tech perpetrators plenty of time to flee the area in technology enabled security system and which the crime was committed, because of investigators along with the awareness this fact the criminals can be in another among the common man, as today’s crime country far away from the scene of the crime have no defined boundaries by the time it is detected. Computer is a Keywords- Cyber civilization, Cyber major source for cyber crime. Cyber crime is crime, cyber ethics, cyber world any illegal activity arising from one or more Internet components. Cybercrime can include everything from non-delivery of goods or services and computer intrusions to The First International Conference on Interdisciplinary Research and Development, 31 May - 1 June 2011, Thailand 49.1 Ajeet Singh Poonia, Dr. Awadesh Bhardwaj, and Dr. G. S. Dangayach intellectual property rights abuses, economic temptation to reproduce copyrighted material espionage, online extortion, international either for personal use or for sale at a lower money laundering, and a growing list of price. other Internet-facilitated offenses. Further, it 3) Electronic Money Laundering is not easy to identify immediately about the crime method used, and to answer questions For some time now electronic funds like where and when it was done. transfers have assisted in concealing and moving the proceeds of crime. Emerging technologies make it easier to hide the origin II. WHAT’S DIFFERENT ABOUT and destination of funds transfer. Thus CYBER CRIME? money laundering comes to the living room. Cyber crimes—harmful acts 4) Electronic Vandalism and Terrorism committed from or against a computer or All societies in which computers play a network—differ from most terrestrial crimes major role in everyday life are vulnerable to .They are easy to learn how to commit; they attack from people motivated by either require few resources relative to the potential curiosity or vindictiveness. These people can damage caused; they can be committed in a cause inconvenience at best and have the jurisdiction without being physically present potential to inflict massive harm. in it; and they are often not clearly illegal. 5) Sales and Investment Fraud Existing terrestrial laws against physical acts of trespass or breaking and As electronic commerce or e-commerce entering often do not cover their “virtual” as it is called becomes more and more counterparts. Web pages such as the popular, the application of digital technology ecommerce sites recently hit by widespread, to fraudulent crime will become that much distributed denial of service attacks4 may not greater. be covered by outdated laws as protected 6) Illegal Interception of Information forms of property. Developments in telecommunications as A. Types of Cyber Crime well as data transfer over the net have Cyber Crime comes in many forms resulted in greater speed and capacity but and in many ways. Below mentioned are the also greater vulnerability. It is now easier different types of Cyber crime: than ever before for unauthorized people to gain access to sensitive information. 1) Communications in Furtherance of Criminal Conspiracies 7) Cyber Pornography Just as legitimate organizations use the Spread of Child pornography and information networks for record keeping and sexually implicit material. communication, so too are the activities of 8) Information Piracy and Forgery criminal organizations enhanced by the advent of information technology. There is Digital technology permits perfect evidence of information systems being used reproduction of the original documents, in drug trafficking, gambling, money examples are birth certificates, passport, laundering and weapons trade just to name a false identity, counterfeiting of currency, few. negotiable instruments etc. 2) Telecommunications Piracy 9) Hacking Digital technology permits perfect Information theft from computers hard reproduction and easy dissemination of print, disk, removal storage etc. Data theft, data graphics, sound, and multimedia destroy, stealing and altering information. combinations. This has produced the Special Issue of the International Journal of the Computer, the Internet and Management, Vol. 19 No. SP1, June, 2011 49.2 Cyber Crime: Practices and Policies for Its Prevention 10) Internet time thefts are unlikely to notice this small change but the employee will make a significant By stealing user name and password, earning. criminals use for themselves and steal the internet time allotted to the purchaser. 5) Logic Bomb 11) Hate/Communal Crimes This is an event dependent program. This implies that this program is created to do As building a web page is not expensive something only when a certain event occurs and reaches to billions of people, criminals spread hate or communal information or 6) Virus/Worm attack rumours, by building a website and also A virus is a program, which attaches recruits people for their operation through itself to another file or a system and then advertisement. circulates to other files and to other 12) Altering Websites computers via a network. They usually affect computers by either altering or deleting data The hacker deletes some pages of a from it. Worms on the other hand do not website, uploads new pages with the similar interfere with data. They simply multiply name and controls the messages conveyed by until they fill all available space on the the web site. computer. B. Penetration methods of Cyber crime 7) Trojan attack There are various methods through which the crime is penetrated into the A Trojan is a program, which appears to computer, network, hardware, software or in be something useful but under the disguise of your cell phone. They are: a useful program causes some damage. 1) Unauthorized access 8) Denial of service attack Unauthorized access also known as This involves flooding the computer cracking as opposed to hacking, means resource with more requests than it can gaining access to a system without handle. This causes the resource to crash, permission of the users or without proper thereby denying the authorized users the authority. This is generally done either by service. fake identity, or by cracking access codes. 9) Distributed denial of service 2) E-mail bombing This is a denial of service attack in which This means sending a large number of the perpetrators are more than one in number and geographically displaced. It is very mails to the victim resulting in the victims difficult to control such attacks. mail account (in case of individual) or server (in case of corporations) crashing. 10) E-mail spoofing 3) Data diddling A spoofed email is one, which appears to This kind of attack involves altering the originate from one source but actually originates from another. raw data before it is processed by a system and re-altering it after processing. 11) Phishing 4) Salami attack In a typical phishing scam, phishers send This is generally used to commit out emails which appear to come from a legitimate company, in an attempt to scam financial crimes. Here the key is to make the users into providing private information that alteration so small that in a single case it will be used for identity theft. Phishers use a would go unnoticed. For example a bank variety of sophisticated devices to steal employee deducts five rupees from every information—including pop-up windows, customers account. The individual customers The First International Conference on Interdisciplinary Research and Development, 31 May - 1 June 2011, Thailand 49.3 Ajeet Singh Poonia, Dr. Awadesh Bhardwaj, and Dr. G. S. Dangayach URL masks which simulate real Web means to decrypt a password, or to bypass a addresses, and keystroke loggers that capture protection scheme. Another form of what you type, such as account names and password cracking attack is all possible passwords. combinations of letters, numbers and symbols are tried out one by one, till the 12) Pharming password is found out.