AUTHOR: K. PRASANNA DEVI CO-AUTHOR:V.PARTHIBAN prasanna02devi!"ai#.$%" &%'i#e N%:((0)**(*+* N%:((0)**(*+* SAVEETHA SCHOO, O ,A SAVEETHA SAVEETHA UNIVERSIT/ CHENNAI. A STUD/ ON PREVENTION AND PROTECTION O C/BER CRI&E ABSTRACT:
The The bigg biggest est exis existen tenti tial al threa threatt in this this mode modern rn era is Cybercrime. Cybercrime. This means any crime committed on the internet. It hampers a person’s modesty and drives him into a life of shame and distre distress. ss. There are differ different ent forms forms of cybercr cybercrime, ime, each possess possess a biggest biggest threat to mankind. Though many laws are executed it fails in implementation. The main advantage for the criminals is they are unknown to the outer world. Even when the person is found the punishment is not stringent. The major victims of cybercrime are women and children. It not only causes physical but also mental harassment to the victims. ybercrime first started with hackers trying to break into computer networks. !ome did it just for the thrill of accessing high"l high"leve evell security security networ networks, ks, but others others sough soughtt to gain gain sensit sensitive ive,, classif classified ied materia material. l. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdowns on personal and business computers. omputer viruses are forms of code or malware programs that can copy themselves and damage or destroy data and systems. #hen computer viruses are used on a large scale, like with bank, government, these actions may be categori$ed categori$ed as cyber terrorism. terrorism. This his pape paperr main mainly ly focu focuse sess on the the prot protec ecti tion on and and the the prevention for this cyber crime.
INTRODUCTION:
ybercrime means crime committed with the help of computer as a source or as a target. It affects the reputation of the people and it also causes both physical and mental depression. ybercrime is defined as %&ffences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet 'hat rooms, emails, notice boards and groups( and mobile phones '!)!*))!(%. It is also a threat to our national security. It includes copyright infringement, hacking, Internet fraud, child pornography, stalking etc. International agencies and organi$ations involve in cybercrime mainly for extracting confidential information. ybercrime also includes cyber terrorism. yber terrorism is someone who intimidates or coerces a government or organi$ation to advance his or her political or social objectives by launching a computer"based attack against computers, networks, or the information stored on them. There are some measures taken to protect the commission of cybercrime. +efore that let us find out more about cybercrimes. T/PES O C/BER CRI&E: HACKIN:
ackers are those who operate other accounts without their knowledge and exploiting their information. ackers are generally classified into #hite at and +lack at ackers. 1ie Ha Ha$3ers:
#hite at ackers are those who breach their own system to check their security software and take steps to improve them. They are called Ethical ackers. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Ethical hackers are appointed by the organi$ation to check their security system. B#a$3 Ha Ha$3ers:
+lack hat hackers break into secure networks to destroy, modify, or steal data- or to make the network unusable for those who are authori$ed to use the network. +lack hat hackers are also referred to as the %crackers% within the security industry and by modern programmers. rackers keep the awareness of the vulnerabilities to themselves and do not notify the general
public or the manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. &nce they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. re4 Ha Ha$3ers:
rey hat hackers are those breaks into security networks mainly to notify the administrator that their system can be breached. +ut like Ethical hackers they are not appointed the organi$ation. rey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Though grey hat hackers may not breach the security for personal gain, unauthori$ed access is said to be illegal. INTERNET THET:
/ term used to describe the act of illegally using, copying or distributing software without ownership or legal rights. The majority of software today is purchased as a one"site license, meaning that only one computer may have that software installed on it at one time. opying that software to multiple computers or sharing it with your friend without multiple licenses is considered software piracy, which is illegal. C%5ner6eiin!
This type of piracy is the illegal duplication, distribution and*or sale of copyrighted material with the intent of imitating the copyrighted product. In the case of packaged software, it is common to find counterfeit copies of the compact discs incorporating the software programs, as well as related packaging, manuals, license agreements, labels, registration cards and security features. Inerne Pira$4:
This occurs when software is downloaded from the Internet. The same purchasing rules apply to on"line software purchases as for those bought in compact disc format. End 5ser pira$4:
This occurs when an individual reproduces copies of software without authori$ation. These include0 •
1sing one licensed copy to install a program on multiple computers
•
opying discs for installation or distribution
•
Taking advantage of upgrade offers without having a legal copy of the version to be upgraded
•
/c2uiring academic or other restricted or non"retail software without a proper license
•
!wapping discs in or outside the workplace
C#ien Server Over5se:
This type of piracy occurs when too many users on a network are using a central copy of a program at the same time. If you have a local"area network and install programs on the server for several people to use, you have to be sure your license entitles you to do so. If you have more users than allowed by the license, that3s %overuse%. Hard-dis3 #%adin!:
This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive. C/BER ,AUNDERIN:
yber laundering is the act of using the internet to engage in financial transactions in order to conceal the identity, source and*or destination of money, and is a main operation of the underground economy. C/BER &ARAUDIN:
yber marauding is the act of using the internet to rove around carrying out violent attacks on person’s email and internet security. C/BER STA,KIN:
yber stalking, simply put, is online stalking. It can be defined as the use of technology, particularly the Internet, to harass someone. ommon characteristics include false accusations, monitoring, threats, identity theft, and data destruction or manipulation. yber stalking also includes exploitation of minors, be it sexual or otherwise.
Sa#3in! re#aed % 7%"en
arassment and stalking of women online is common, and can include rape threats and other threats of violence, as well as the posting of women3s personal information. It is blamed for limiting victims3 activities online or driving them offline entirely, thereby impeding their participation in online life and undermining their autonomy, dignity, identity and opportunities.
C%rp%rae $4'er sa#3in!
orporate cyber stalking is when a company harasses an individual online, or an individual or group of individuals harasses an organi$ation. )otives for corporate cyber stalking are ideological, or include a desire for financial gain or revenge.
C4'er sa#3in! re#aed % $e#e'riies and p5'#i$ pers%ns
4rofiling of stalkers shows that almost always they stalk someone they know or, via delusion, think they know, as is the case with stalkers of celebrities or public persons in which the stalkers feel they know the celebrity even though the celebrity doesn3t know them. /s part of the risk they take for being in the public eye, celebrities and public figures are often targets of lies or made"up stories in tabloids as well as by stalkers.
C4'er sa#3in! re#aed % ini"ae parners
yber stalking of intimate partners is the online harassment of a current or former romantic partner. It is a form of domestic violence, and experts say its purpose is to control the victim in order to encourage social isolation and create dependency. arassers may send repeated insulting or threatening e"mails to their victims, monitor or disrupt their victims3 e"mail use, and use the victim3s account to send e"mails to others posing as the victim or to purchase goods or services the victim doesn3t want. They may also use the internet to research and compile personal information about the victim, to use in order to harass her. &A,ARES:
)alicious software or malware, is downloaded to an unsuspecting victim’s computer when the user opens an e"mail message, an attachment, or clicks on a hyperlink within a bogus message. It may then disseminate viruses and*or worms designed to harvest the user’s private information.)alware may also insert key"logger programs that allow the phisher to
remotely record the victim’s key strokes in order to capture credit card account, bank account, or password information, or it may insert remote screen capture applications.)alware may also be downloaded via peer"to"peer file sharing programs or from pirated software.
C/BER VO/EURIS&:
yber voyeurism is the act of using the internet as a tool to facilitate spying on people engaged in intimate behaviors such as chat rooms, blogs etc.
DATA DIDD,IN:
5ata diddling involves changing data prior or during input into a computer.In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.
E-&AI, SECURIT/ DESTRUCTION:
Email security destruction refers to unethically recovering passwords from data that has been stored in or transmitted by a computer system.
PHREAKIN:
4hreaking refers to the act of pirating telephone networks.!ince the modern telephone exchanges are computerised, it becomes possible for phreakers to control the network as easily as an employee of the telephone company.
USAE O VIRUS:
6irus are any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resources or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource.The insertion of viruses in the internet along with website use, emails and downloads is one of the most rampant cyber crimes of today. The following are the legal provisions dealing with cogni$able offences and criminal acts under IT /ct0 AD8UDICATION:
!ection 78 4enalty and ompensation for damage to computer, computer system, etc If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network 9 'a( accesses or secures access to such computer, computer system or computer network or computer resource 'b( downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium'c( introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network'd( damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network'e( disrupts or causes disruption of any computer, computer system or computer network 'f( denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means'g( provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this /ct, rules or regulations made thereunder, 'h( charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, 'i( destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means 'i( !teals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. Se$i%n 9* Ta"perin! 7i1 C%"p5er S%5r$e D%$5"ens
#hoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is re2uired to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Se$i%n 99 C%"p5er Re#aed O66en$es
If any person, dishonestly, or fraudulently, does any act referred to in section 78, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both. Se$i%n 99 A P5nis1"en 6%r sendin! %66ensive "essa!es 1r%5!1 $%""5ni$ai%n servi$e e$.
/ny person who sends, by means of a computer resource or a communication device," a( any information that is grossly offensive or has menacing character- or b( any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, c( any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages
Se$i%n 99 B P5nis1"en 6%r dis1%nes#4 re$eivin! s%#en $%"p5er res%5r$e %r $%""5ni$ai%n devi$e
#hoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.
Se$i%n99 C-P5nis1"en 6%r ideni4 1e6.
#hoever, fraudulently or dishonestly make use of the electronic signature, password or any other uni2ue identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh. Se$i%n 99D P5nis1"en 6%r $1eain! '4 pers%nai%n '4 5sin! $%"p5er res%5r$e
#hoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. Se$i%n99E P5nis1"en 6%r vi%#ai%n %6 priva$4.
#hoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both Se$i%n 99 P5nis1"en 6%r $4'er err%ris"
#hoever with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by 9 'i(
denying or cause the denial of access to any person authori$ed to access computer
'ii(
resource- or attempting to penetrate or access a computer resource without authorisation or exceeding authori$ed access- or
'iii(
introducing or causing to introduce any omputer ontaminant.
Se$i%n 9( P5nis1"en 6%r p5'#is1in! %r rans"iin! %'s$ene "aeria# in e#e$r%ni$ 6%r"
#hoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to
deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees and in the event of a second or subse2uent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees.
Se$i%n 9( A P5nis1"en 6%r p5'#is1in! %r rans"iin! %6 "aeria# $%nainin! se;5a##4 e;p#i$i a$e$. in e#e$r%ni$ 6%r"
#hoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees and in the event of second or subse2uent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees. Se$i%n 9( B P5nis1"en 6%r p5'#is1in! %r rans"iin! %6 "aeria# depi$in! $1i#dren in se;5a##4 e;p#i$i a$ e$. in e#e$r%ni$ 6%r".
#hoever," 'a( publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or 'b( creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner or 'c( cultivates, entices or induces children to online relationship with one or more children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or 'd( facilitates abusing children online or 'e( records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subse2uent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees Se$i%n 9( C Preservai%n and Reeni%n %6 in6%r"ai%n '4 iner"ediaries
':( Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the entral overnment may prescribe. ';( /ny intermediary who intentionally or knowingly contravenes the provisions of sub section ':( shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.
PREVENTION: •
&ne should not disclose any personal information to strangers through mail, phone,
•
chatting or any social sites &ne should not send any photographs to strangers by online as anyone can misuse or
•
modify your photograph. /nti"virus software should be updated in every computer to guard against virus and
•
back up volumes should be kept so that person may not suffer data loss &ne should not disclose his bank details to any persons or to any site. 4arents should keep an eye on their children while they use any social site or
•
websites. #ebsite owners should watch trafficking and to check regularity. It is the duty of the
•
website owners to adopt safety policy. #eb servers running public sites must be separately protected from internal corporate
•
network. !trict statutory laws need to be passed by the
•
people. !teps should be taken to prevent people from ybercrime at International level as it is
•
a major threat to the whole world 6ictims must be provided relief by way of compensation and the offenders must be
•
punished with rigorous imprisonment.
SUESTIONS:
The following are the suggestion which could be followed by the people to be safe from cyber crime. •
It is always advisable not to share any personal information like age, photo, etc about the user on the internet.
•
=ake antivirus is malicious software 'malware( designed to steal information from unsuspecting users by mimicking legitimate security software. !o it is advisable to
•
use authorised antivirus protection. The Internet makes it easy for people to misrepresent their identities and motives so it
•
is always better to add people only when you know them. 5o update your privacy setting on the social networking sites to keep all information
•
and data’s safe. It is advisable to have a check that all the accounts opened from any computer
•
elsewhere is logged off properly. hanging password for once in > months might keep your account safe. Immediately report to parents or to the police on any problem of cyber bullying,
•
hacking, etc. Third"party applications may provide entertainment or functionality, but use caution
•
when deciding which applications to enable. /void applications that seem suspicious, and modify your settings to limit the amount of information the applications can •
access. Install software updates so that attackers cannot take advantage of known problems or
•
vulnerabilities. hildren are especially susceptible to the threats that social networking sites present. /lthough many of these sites have age restrictions, children may misrepresent their ages so that they can join. +y teaching children about Internet safety, being aware of their online habits, and guiding them to appropriate sites, parents can make sure that the children become safe and responsible users.
CONC,USION
Thus cyber crime is a serious offence which leads a man to a state of mental trauma. The posted information might be false and defaming and this spoils his entire position in the society. This paper has analy$ed about the types of cyber crime and also the legal punishments for cyber criminals and also has laid down a few suggestions to the people to stay safe from this cyber crimes. Thus using the internet is a necessity at the current scenario and this has been an advantage to the criminals to hack into different accounts easily. apacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the
cyber space. It is 2uite possible to check them. istory is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties 'to report crime as a collective duty towards the society( and further making the application of the laws more stringent to check crime. 1ndoubtedly the /ct is a historical step in the cyber world. =urther I all together do not deny that there is a need to bring changes in the Information Technology /ct to make it more effective to combat cyber crime. #ith a word of caution for the pro"legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter"productive.