0% found this document useful (0 votes)
123 views6 pages

Protecting Ourselves From Digital Crimes

Cybercrime is a complex and truly evolving wonder. Digital hoodlums are getting more refine what's more, are focusing on purchasers just as open and private associations. In this manner, extra layers of guard are required. Digital wrongdoing has been expanding in intricacy and monetary expenses since companies began to use PCs throughout working together. A portion of the contextual analyses of digital wrongdoing incorporate Parliament assault case.

Uploaded by

Dhaval Chudasama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views6 pages

Protecting Ourselves From Digital Crimes

Cybercrime is a complex and truly evolving wonder. Digital hoodlums are getting more refine what's more, are focusing on purchasers just as open and private associations. In this manner, extra layers of guard are required. Digital wrongdoing has been expanding in intricacy and monetary expenses since companies began to use PCs throughout working together. A portion of the contextual analyses of digital wrongdoing incorporate Parliament assault case.

Uploaded by

Dhaval Chudasama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Volume 4, Issue 1, 2021

National Journal of
DOI (Journal): 10.37591/NJCSL

Cyber Security Law


http://lawjournals.celnet.in/index.php/njcsl/index

Research NJCSL

Protecting Ourselves from Digital Crimes


Nikhil Rajput1, Dhaval Chudasama2,*
Abstract
Cybercrime is a complex and truly evolving wonder. Digital hoodlums are getting more refine what's
more, are focusing on purchasers just as open and private associations. In this manner, extra layers
of guard are required. Digital wrongdoing has been expanding in intricacy and monetary expenses
since companies began to use PCs throughout working together. A portion of the contextual analyses
of digital wrongdoing incorporate Parliament assault case. In this paper we have examined about
Cyber wrongdoing and digital protection and distinctive digital violations that we run over and
counteraction procedures and identification methods like Tripwires, setup checking devices, Honey
Pots, peculiarity identification framework and working framework orders. In this we additionally
examine about guideline acts forced against Cyber wrongdoing and furthermore online wellbeing
tips.

Keywords: Digital Crime, Cyber Security, Honey pots, Trip wires, Anomaly location, Case Study,
Regulation Acts, Online security tips.

INTRODUCTION
“Ever since men began to change their lives by using technology they need found themselves
during a series of technological traps”. One of the most effective examples for technological trap is
cyber crime. Cyber crime also referred as computer crimes, electronic crimes or e crimes. “Cyber “is
brief for “cyber space”. The electronic medium of network. In which online communication takes
place. “Cyber crime is considered computer-mediated activities which are either illegal or considered
illicit by certain parties and which may be conducted through global electronic networks. Cybercrimes
describe criminal activity within which the pc or network could be a necessary part of the crime”.
Cyber crime was broken into two categories and defined thus [1–3]
1. Cybercrime in a very narrow sense (computer crime): Any illegal behavior directed by means
of electronic operations that targets the protection of computer systems and the data processed
by them.
2. Cybercrime in an exceedingly broader sense (computer-related crime): Any illegal behavior
committed by means of, or in reference to, an ADPS or network, including such crimes as
criminal possession and offering or distributing information by means of a system or network
[1–3]

*Author for Correspondence Origin of Cyber Crime


Dhaval Chudasama
E-mail: dhavalchudasama16@gmail.com It is believed the primary recorded cyber crime
1
passed off in the year 1820.This can be true with
Student, Department of Computer Science and Engineering,
Indrashil University, Mehsana, Gujarat, India
the actual fact that, computer did exist since 3500
2
Assistant Professor, Department of Computer Science and BC in India, China and Japan. The modern
Engineering, Indrashil University, Mehsana, Gujarat, India computer began with the analytical engine of
Received Date: April 07, 2021 Charles Babbage [4, 5] Different types of cyber
Accepted Date: April 21, 2021 crimes prevalent today are given in Table 1).
Published Date: June 04, 2021

Citation: Dhaval Chudasama, Nikhil Rajput. Protecting Cyber Security


Ourselves from Digital Crimes. National Journal of Cyber A crime like spamming, passing on computer
Security Law. 2021; 4(1): 1–6p.
viruses, harassment, cyber stalking, et al became

© Law Journals 2021. All Rights Reserved 1


Protecting Ourselves from Digital Crimes Chudasama and Rajput

common in our contemporary world. While these issues don't carry potential monetary loss, they're
even as harmful in the possibility of losing files, information and access to your computer. This is
often why Cyber Security is required. Cyber security means protecting information, equipment,
devices, computer, computer resources, communication device and knowledge stored therein from
unauthorized access, use, disclosure disruption, modification or destruction [4, 5] Preventive measures
to curb cyber crimes are illustrated in Table 2.

Why Cyber Security?


Computer security is vital because it can provide the opportunity for the users to shield their
important information present on the network and also within the system (right to privacy). It also
helps in defending the pc system against different types of destructive technologies and protects the
PC from damage (viruses, worms, bugs and bacteria). It also helps in monitoring the network and
protects it also from different threats. So, we should always use computer security solution on some
level to shield our data from different style of sniffing stolen problem. In general, Computer Security
is significant for shielding the confidentiality, integrity, and availability of computer systems,
resources, and data. Without confidentiality, trade secrets or personally identifying information may
be lost. Without integrity, we cannot be sure that the information we've is that the same data that was
initially sent (i.e., Altered data). Without availability, we are also denied access to computing
resources (i.e., an endemic that disables your keyboard and mouse) [4, 5].

Table 1. Different types of Cyber Crimes.


Financial Using fake websites to market products soon get the credit Numbers
Marketing Strategies Selling narcotics or weapons online
Intellectual Property Software privacy, copyright infringement, trademark violations, theft of coding system
E-mail spoofing Hacking email password; sending unwanted message to others ruining a person’s image
E-Murder Manipulating medical records
Transfer Fraud Hackers intercept them and divert the funds
Hate/Commercial Building a website to promote hate or racial hate.
Altering websites Deleting websites, uploading new pages; controlling messages conveyed by the website

Electronic Crime Detection


Typically electronic crimes are detected by one or more types of intrusion detection techniques
such techniques include:
1. Tripwires
2. Configuration checking tools
3. Honey pots
4. Anomaly detection systems
5. OS commands.

Brief Overview of every of those Intrusion Techniques follow:

Tripwires: Snooping
Tripwires are software programs that take snapshots of key system characteristics which may be used
to detect critical file changes. In this regard, tripwires provide evidence of electronic crimes because
most of the intruding hackers make modifications after they install backdoor entry points or alter
classification system and directory characteristics unknowingly while snooping [6].

Configuration Checking Tools


Configuration checking tools also are called as vulnerability assessment tools, remarked a software
programs accustomed detect insecure systems. Though configuration checking tools are primarily
preventive in nature, they use as monitoring devices may also provide evidence regarding electronic
crimes. Specifically, configuration checking tools will be particularly useful in detecting suspicious

© Law Journals 2021. All Rights Reserved 2


National Journal of Cyber Security Law
Volume 4, Issue 1

patterns of system miss configuration that may be malicious in nature. Admittedly further
investigations are going to be necessary to determine if a system miss configuration is an electronic
crime [7].

Table 2. Preventive measures to oppose cyber crime.


Decrease Opportunities Reduce Opportunities to the Hoodlums Develop expand framework plan so programmer
doesn't hack the pc
Use Authentication Use secret key bio-metric gadgets, finger impression or voice acknowledgment innovation
Technology and retinal imaging, incredibly massive the trouble of acquiring unapproved access to data
frameworks. Consideration to be paid to bio-metric innovation as this perceives the specific
client's validation for utilizing the specific PC
Lay a Snare Bait a snare to get the assailant in our PC.
Grow New Innovation Create Technology of encryption and obscurity and likewise for ensuring foundation as
programmers or digital psychological oppressors can assault over any country's foundation
coming about in huge misfortunes.
Comprehend Cyber For volume, sway and lawful
Wrongdoing challenges Comprehend the advantage of appropriate gear preparing and apparatuses to control digital
wrongdoing
Consider Nature of PC wrongdoing is different, a profound idea to be given, what digital wrongdoing can occur
Crime in one's specific association, with the goal that unique kinds of observing/security framework
can be planned and legitimate documentation can be composed for security framework
Receive Computer Profit new complex items and guidance for PC wrongdoing anticipation which is accessible
Security free or paid in the market
Use Blocking and For recognizing infection, since infection can recognize and hinder malevolent PC code.
Separating Projects Hostile to Spyware programming makes a difference preventing the lawbreakers from
grabbing hold of one's PC and makes a difference to clean up the PC if the equivalent has
been hit.
Observing Controls Separate checking to be finished for (a) Monetary records (b) Business data
Plan Different Devices For various necessities instead of utilizing one specific device
Information Recovery Develop devices for information recuperation furthermore, investigation
Revealing Always report the wrongdoing to digital misrepresentation grumbling focus in one's country
as they keep up tremendous information and have better devices for controlling digital
wrongdoing.
Teach Children Children ought to be educated about the kid sexual entertainment wrongdoing utilized by
lawbreakers and how to keep away from that
Configuration Alert Plan the ready framework when there is real interruption
Frameworks
Introduce Firewalls a. As they block specific network traffic as indicated by security strategy.
b. Patches are by and large introduced consequently and consequently fixes the
programming security imperfections.
Introduce Original As they contain numerous security measures. Pilfered virtual products do not contain
Programming numerous security abilities which exist in the original software.
Online Assistance Develop standard on the web help to representatives. Learn Web for one's potential benefit as
it were furthermore, see all tips to remain online safe
Stay away from Avoid contamination instead of cleaning it thereafter Keep program up to date for security
Infection Measures
Dodge false Security As numerous enemies of spyware activists' runs a site that list sham security items. Peruse
Items the permit understanding previously introducing any program
Connections Avoid opening connections or messages which were definitely not expecting and have come
from obscure source or individual
Cross Check Cross check consistently the proclamations of monetary records and web banking

Honey Pots
Honey pots or Honey pot lures are employed to entrap and keep an electronic criminal occupied
long enough to permit for identification and even apprehension of the preparatory. These lures are

© Law Journals 2021. All Rights Reserved 3


Protecting Ourselves from Digital Crimes Chudasama and Rajput

often bogus system administration accounts, fictitious product or client information, or a myriad of
created files that appear to contain sensitive information. In addition to facilitating perpetrator
identification, honey pots also store the evidence of the electronic crime itself [8].

Anomaly Detection Systems


Anomaly detection systems concentrate on unusual patterns of activity. In essence, anomaly
detection systems develop and analyze user profiles, host and network activity, or system programs in
hopes of discovering deviations from expected activity. Unusual key stroke intervals, abnormal
commands, and unconventional program activities can provide evidence regarding the existence can
provide evidence regarding the existence of an electronic crime [9].

Package Commands
Intrusion detection is additionally possible through the use of certain package commands, for
instance checking log files and comparing outputs of comparable programs are among the many
manual techniques involving software commands. Typically these commands are used on daily bases
by system administrators to look for evidence suggesting the possibility of electronic crimes [10].

Scarcely any Online Wellbeing Tips


1. Protect yourself from infections by introducing antivirus programming and refreshing it
consistently. You can download against infection programming from the Web destinations of
programming organizations, or get it in retail locations; the best perceive old and new infections
and update consequently [11].
2. Don't open a record joined to an email except if you are expecting it or understand what it
contains. In the event that you send a connection, type a message clarifying what it is. Never
forward any email notice about another infection. It could be a lie and could be utilized to spread
an infection [12].
3. Confirm the site you are working with. Secure yourself against "Web-Spoofing". Try not to go to
sites from email joins.
4. Create passwords containing at least 8 digits. They ought not to be word reference words. They
ought to consolidate upper and lower case characters.
5. Send Visa data just to get locales.
6. Never give out your location, phone number; home base spots or connections to different sites or
pages where this data is accessible [13].

DIGITAL CRIME CASE STUDY


Parliament Attack Case
Insights concerning episode:
a. The top digital cases, including dissecting and recovering data from the PC recuperated from
psychological militant, who assaulted Parliament [2].
b. The PC contained a few confirmations that affirmed of the two psychological militants' thought
processes, to be specific the sticker of the Service of Home that they had made on the PC and
glued on their minister vehicle to acquire passage into Parliament House and the phony ID card
that one of the two fear based oppressors was conveying with a Government of India image and
seal [3].
c. The insignias (of the three lions) were painstakingly checked what's more, the seal was likewise
craftily made alongside private address of Jammu and Kashmir. Yet, cautious recognition
demonstrated that it was completely fashioned and made on the PC [4, 14].

DIVERSE LEGAL ACTS AGAINST DIGITAL CRIME


"There can be no harmony without equity, no equity without law and no significance law \without a
Court to choose what is just and legal under some random conditions".
-Benjamin B. Ferenez

© Law Journals 2021. All Rights Reserved 4


National Journal of Cyber Security Law
Volume 4, Issue 1

When Mahatma Gandhi, contended that,


"We get the Government we merit. At the point when we improve, the Government is moreover
bound to improve" It is the obligation of the public authority to guarantee that its laws adapt to the
improvement of science and innovation, and completely partake in the administrative institution [5].
Important Cyber law provisions in India are illustrated in Tables 3 and 4.
 The India Information Technology Act of 2000.
 The Philippines Electronic Commerce Act No. 8792 of 2000.
 The Philippines Cyber-crime Prevention Act of 2012 No. 10175.
 USA Cyber Intelligence Sharing and Protection Demonstration of 2011(CISPA).
 USA Cyber Security Enhancement Act of 2009.

Table 3. Important cyber law provisions in India.


Offense Segment under IT Act
Altering Computer source records Sec.65
Hacking with Computer frameworks, Information modification Sec.66
Distributing disgusting data Sec.67
Un-approved admittance to secured framework Sec.70
Penetrate of Confidentiality and Protection Sec.72
Distributing bogus computerized declarations Sec.73
NOTE: Sec.78 of I.T. Act engages Deputy Director of Police to research cases falling under
this Act. PC Related Crimes Covered under Indian Penal Code and Special Laws

Table 4. Important cyber law provisions in India.


Offence Section
Sending undermining messages by email Sec. 503 IPC
Sending disparaging messages by e-mail Sec. 499 IPC
Fabrication of electronic records Sec. 463 IPC
Sham Sites, digital fakes Sec. 420 IPC
Email satirizing Sec. 463 IPC
Web-jacking Sec. 383 IPC
Email abuse Sec. 500 IPC
Online offer of Drugs NDPS Act
Online offer of Arms Arms Act

CONCLUSION
The web is integral asset and powerful methods for correspondence yet it is weak very much like
whatever else. To shield against Cyber wrongdoings, interruption recognition strategies ought to be
planned, carried out, and administrated. The best approach to ensure it until further notice is for
everybody to be brilliant and to follow preventive measures, people, foundations, and government the
same should all follow these actions.

REFERENCES
1. Sekgwathe V., Talib M. (2011) Cyber Crime Detection and Protection: Third World Still to Cope-
Up. In: Yonazi J.J., Sedoyeka E., Ariwa E., El-Qawasmeh E. (eds) e-Technologies and Networks
for Development. ICeND 2011. Communications in Computer and Information Science, vol 171.
Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22729-5_15
2. Chawki, M.: Cybercrime in France: an overview. Computer Crime Research Center. (December,
2005) ( accessed, March 13, 2021), http://www.crime-research.org/articles/cybercrime-in-france-
overview/
3. Kratchman, Stanley & Smith, Jacob & Smith, Murphy. (2008). the Perpetration and Prevention of
Cybercrimes.

© Law Journals 2021. All Rights Reserved 5


Protecting Ourselves from Digital Crimes Chudasama and Rajput

4. Alansari, Mariam & Aljazzaf, Zainab & Sarfraz, Muhammad. (2019). On Cyber Crimes and
Cyber Security. 10.4018/978-1-5225-8304-2.ch001.
5. National Strategy for Cyberspace Security by S R RAiyengar
6. Gordon, S., Ford, R.: On the definition and classification of cybercrime. Journal of Computer
Virology 2, 13–20 (2006)
7. Four predictions for India’s national cyber security strategy 2020 by GunjanChawla,
SharnganAravindakshan
8. Wall, D.S.: Policing Cybercrime: Situating the public police in networks of security in
cyberspace. Police Practice and Research: An International Journal 8(2) (2007 - forthcoming)
9. D M Chudasama, L K Sharma, N C Solanki, Priyanka Sharma , "A Comparative Study of
Information Systems Auditing in Indian Context", IPASJ International Journal Of Information
Technology (IIJIT) , Volume 7, Issue 4, April 2019, pp. 020-028 , ISSN 2321-5976. UGC
Approved (S. No 45786).
10. D M Chudasama, L. K. Sharma, N. C. Sonlanki, Priyanka Sharma, "Refine Framework of
Information Systems Audits in Indian Context", International Journal of Computer Sciences and
Engineering, Vol.7, Issue.5, pp.331-345, 2019. ISSN: 2347-2693UGC Approved (S. No 63193).
11. D M Chudasama, Kathan Patel, Parshwa Dand, "Awareness of Data Privacy Breach in Society",
International Journal of All Research Education and Scientific Methods (IJARESM), Vol.8,
Issue.10, pp.303-307, 2020. ISSN: 2455-6211UGC Approved.
12. D M Chudasama, Darsh Patel, Abhishek Shah and Nihal Shaikh, “Research on Cybercrime and
its Policing ", American Journal of Computer Science and Engineering Survey, Vol.8, Issue.10,
pp.3-5, 2020. ISSN: 2349-7238.
13. Soham Shah, Mohammed Abiali Lokhandwala, D M Chudasama, "Decoding Farm Laws",
International Journal of Scientific Research and Engineering Development, Vol.4, Issue.2,
pp.590-595, 2020. ISSN: 2581-7175. Impact Factor: 4.999
14. Nihal Gulammahiyuddin Shaikh, Dhaval Chudasama. Research on Cyber Offenses under
Information Technology Act, 2000. Recent Trends in Parallel Computing. 2021; 8(1): 14–20p.

© Law Journals 2021. All Rights Reserved 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy