08.07.2015 Views

A survey of Indian Cyber crime and law and its pre- vention approach

A survey of Indian Cyber crime and law and its pre- vention approach

A survey of Indian Cyber crime and law and its pre- vention approach

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

International Journal <strong>of</strong> Advanced Computer Technology (IJACT)ISSN:2319-7900obtaining property or services from any cyberspace unjustlythrough deception or trickery.Theft <strong>of</strong> confidential or proprietary dataCases involving theft <strong>of</strong> confidential or proprietary information,in which current or former customer or contractors intentionallyexceeded or misused an authorized level <strong>of</strong>access to confidential or proprietary information from theany cyberspace [11].Theft/modification <strong>of</strong> information forfinancial gainTheft <strong>of</strong> information for business advantageBesides these attacks there may be some other thwarts possiblethat are not convenient to the above scenarios. Some<strong>pre</strong>dictions can be made for those: Reading executive emails for entertainment. Providing organizational (cyberspace) informationto <strong>law</strong>yers in <strong>law</strong>suit against organization (ideological). Transmitting organization‟s IP to hacker groups. Unauthorized access to information to locate a personas accessory to murder. Though there may bemore different issues but these are found in the casestudies by CERT Program-s<strong>of</strong>tware engineeringteam <strong>of</strong> Carnegie Mellon University. The <strong>pre</strong>vioustwo types <strong>of</strong> thwart may not be mutually exclusivefor a certain case.Pre<strong>vention</strong> <strong>of</strong> <strong>Cyber</strong> CrimePre<strong>vention</strong> [8] is always better than cure. It is always betterto take certain <strong>pre</strong>caution while operating the net. The 5Pmantra for online security: Precaution, Pre<strong>vention</strong>, Protection,Preservation <strong>and</strong> Perseverance. One should keep inmind the following things-1. To <strong>pre</strong>vent cyber stalking avoid disclosing any informationpertaining to oneself. This is as good as disclosing youridentity to strangers in public place.2. Always avoid sending any photograph online particularlyto strangers <strong>and</strong> chat friends as there have been incidents <strong>of</strong>misuse <strong>of</strong> the photographs.3. Always use latest <strong>and</strong> update antivirus s<strong>of</strong>tware to guardagainst virus attacks.4. Always keep back up volumes so that one may not sufferdata loss in case <strong>of</strong> virus contamination5. Never send your credit card number to any site that is notsecured, to guard against frauds.6. Always keep a watch on the sites that your children areaccessing to <strong>pre</strong>vent any kind <strong>of</strong> harassment or depravationin children.7. it is better to use a security programmed that gives controlover the cookies <strong>and</strong> send information back to the site asleaving the cookies unguarded might prove fatal.8. Web site owners should watch traffic <strong>and</strong> check any irregularityon the site. Putting host-based intrusion detectiondevices on servers may do this.9. Use <strong>of</strong> firewalls may be beneficial.10. Web servers running public sites must be physically separateprotected from internal corporate network. Adjudication<strong>of</strong> a <strong>Cyber</strong> Crime - On the directions <strong>of</strong> the BombayHigh Court the Central Government has by a notificationdated 25.03.03 has decided that the Secretary to the InformationTechnology Department in each state by designationwould be appointed as the AO for each state.Security measuresA state <strong>of</strong> computer "security" is the conceptual ideal, attainedby the use <strong>of</strong> the three processes:1. Pre<strong>vention</strong>,2. Detection, <strong>and</strong>3. Response.* User account access controls <strong>and</strong> cryptography can protectsystems files <strong>and</strong> data, respectively.INTERNATIONAL JOURNAL OF ADVANCED COMPUTER TECHNOLOGY | VOLUME 1, NUMBER 2, 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!