0% found this document useful (0 votes)
42 views28 pages

Booklet On An Introduction To Cyber Crime

The document provides an introduction to cyber crime including different types of cyber crimes, reasons for committing cyber crimes, types of attackers, different types of cyber attacks, and provisions under the Information Technology Act, 2000 related to cyber crimes. It covers topics like spamming, phishing, cyber bullying, hacking, malware, denial of service attacks, and sections of the IT Act pertaining to cyber crimes and penalties.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views28 pages

Booklet On An Introduction To Cyber Crime

The document provides an introduction to cyber crime including different types of cyber crimes, reasons for committing cyber crimes, types of attackers, different types of cyber attacks, and provisions under the Information Technology Act, 2000 related to cyber crimes. It covers topics like spamming, phishing, cyber bullying, hacking, malware, denial of service attacks, and sections of the IT Act pertaining to cyber crimes and penalties.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

केवल कार्ाालर्ीन उपर्ोग हे तु

For Official Use Only

भारत सरकार - रेल मंत्रालय


GOVERNMENT OF INDIA - MINISTRY OF RAILWAYS

साइबर अपराध का एक पररचय


An Introduction to Cyber Crime

Maharajpur, Gwalior - 474005


i

Booklet on
An Introduction to Cyber Crime

साइबर अपराध का एक पररचय


पर बुकलेट

Prepared by: Ashish Telang, SSE (Telecom), CAMTECH

End User – For S&T officials of Indian Railways

नवम्बर 2022/ November 2022

CAMTECH/S/PROJ/2022-23/SP26A

CAMTECH/S/PROJ/
2022-23/SP26A

An Introduction to Cyber Crime November 2022


ii

Table of Contents
Table of Contents ....................................................................................................................... ii
Disclaimer ...................................................................................................................................v
1 Introduction ....................................................................................................................... 2
2 What is Cyber Security ...................................................................................................... 2
3 Why Cyber Security is critical ........................................................................................... 3
4 Different types of Cyber Crimes ........................................................................................ 3
4.1 Spamming ............................................................................................................................. 3
4.2 Phishing ................................................................................................................................. 3
4.3 Cyber bullying ..................................................................................................................... 4
4.4 Cyber Stalking ..................................................................................................................... 4
4.5 Cyber Warfare ..................................................................................................................... 4
4.6 Cyber-squatting ................................................................................................................... 4
4.7 Espionage .............................................................................................................................. 4
4.8 Child pornography .............................................................................................................. 4
4.9 Cyber grooming ................................................................................................................... 5
4.10 Vishing .................................................................................................................................. 5
4.11 SMS Phishing ....................................................................................................................... 5
4.12 Impersonation and Identity theft ..................................................................................... 5
4.13 Ransom ware ........................................................................................................................ 5

5 Reasons for commission of Cyber Crimes ........................................................................ 5


6 Types of attackers .............................................................................................................. 6
6.1 Hacker ................................................................................................................................... 6
6.2 Cracker ................................................................................................................................. 6
6.3 Phreaker ............................................................................................................................... 6
6.4 Spammer ............................................................................................................................... 6
6.5 Phisher .................................................................................................................................. 6
6.6 White hat .............................................................................................................................. 7
6.7 Black hat ............................................................................................................................... 7

7 Different types of Cyber Attacks ....................................................................................... 7


7.1 Reconnaissance ..................................................................................................................... 7

An Introduction to Cyber Crime November 2022


iii

7.2 Access ..................................................................................................................................... 8


7.2.1 Password Attacks ............................................................................................................................8
7.2.2 Trust Exploitation ...........................................................................................................................8
7.2.3 Port Redirection ..............................................................................................................................9
7.2.4 Man-in-the-Middle attack (packet sniffer) ....................................................................................9

7.3 Denial of Service (DoS)......................................................................................................... 9


7.3.1 Distributed Denial-of-Service Attacks ........................................................................................ 10

7.4 Malwares (Viruses, Worms, Trojans etc.) ........................................................................ 10


7.4.1 Viruses ........................................................................................................................................... 10
7.4.2 Worms ........................................................................................................................................... 10
7.4.3 Trojan horses ................................................................................................................................. 10
7.4.4 Spyware ......................................................................................................................................... 10
7.4.5 Adware ........................................................................................................................................... 10
7.4.6 Spamware ...................................................................................................................................... 11
7.4.7 Botnet ............................................................................................................................................. 11

8 Provisions of Cyber Crimes under Information Technology Act 2000/ 8 ..................... 11


8.1 Sections imposed on Cyber crime ..................................................................................... 11
8.2 Details of ITA 2000/8 Sections on Cyber crime ............................................................... 12
8.2.1 Section 43: Penalty and Compensation for damage to computer, computer system, etc. ............... 12
8.2.2 Section 43A: Compensation for failure to protect data .................................................................. 12
8.2.3 Section 65: Tampering with Computer Source Documents ........................................................... 12
8.2.4 Section 66: Computer Related Offences ........................................................................................ 13
8.2.5 Section 66A: Sending offensive messages through communication service, etc. .......................... 13
8.2.6 Section 66B: Dishonestly receiving stolen computer resource or communication device ............. 13
8.2.7 Section 66C: Identity Theft ............................................................................................................ 13
8.2.8 Section 66D: Cheating by personation by using computer ............................................................. 13
8.2.9 Section 66E: Violation of Privacy .................................................................................................. 13
8.2.10 Section 66 F: Punishment for cyber terrorism ................................................................................ 13
8.2.11 Section 67: Publishing or transmitting obscene material in electronic form .................................. 14
8.2.12 Section 67A: Publishing or transmitting of material containing sexually explicit act etc. in
electronic form .............................................................................................................................................. 14
8.2.13 Section 67B: Publishing or transmitting of material containing sexually explicit act, etc. in
electronic form .............................................................................................................................................. 14
8.2.14 Section 68: Power of Controller to give directions......................................................................... 14
8.2.15 Section 69A: Power to issue directions for blocking for public access of any information through
any computer resource .................................................................................................................................. 15
8.2.16 Section 70: Protected System ......................................................................................................... 15
8.2.17 Section 71: Penalty for misrepresentation ...................................................................................... 15
8.2.18 Section 73: Penalty for publishing electronic Signature Certificate false in certain particulars ..... 16
8.2.19 Section 74: Publication for fraudulent practices ............................................................................. 16

9 Computer Emergency Response Team (CERT-IN) ....................................................... 16


9.1 Salient features of IT security policy of Indian Railways in view of CERT-In ........ 17

10 How to register a Cyber Crime Complaint ..................................................................... 18


10.1 Offline Complaint ............................................................................................................... 18

An Introduction to Cyber Crime November 2022


iv

10.2 Online Complaint ............................................................................................................... 19

References ................................................................................................................................ 20
CAMTECH Publications......................................................................................................... 21
Our Objective ........................................................................................................................... 22

An Introduction to Cyber Crime November 2022


v

Disclaimer
It is clarified that the information given in this booklet does not
supersede any existing provisions laid down in the IR Telecom
Engineering Manual, Railway Board and RDSO publications. This
document is not statuary and instructions given are for the purpose
of learning only. The diagrams and figures given in the booklet are
indicative only. If at any point contradiction is observed, then Signal
Engineering Manual, Telecom Engineering Manual, Railway
Board/RDSO guidelines may be referred or prevalent Zonal Railways
instructions may be followed.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 2

1 Introduction
Cybercrime may be defined as “Any attack on the information systems or any unlawful act
where computer or communication device or computer network is used to commit or facilitate
the commission of crime”.

The attack can be on the confidentiality of information, on the integrity of information, or it can
be a denial-of-service attack or a repudiation attack. The attack can be on an individual, an
enterprise or on a government.

Here are some examples of cyber-crime: Intentionally sending a virus is a crime. Stealing the
credit card information during an e-commerce transaction, impersonating a student in an e-
learning portal, an employee sending the confidential information of an organization to an
outsider through email etc., are cyber-crimes. However, the definition of what a crime is differs
from country to country. In some countries, it is not a crime to visit adult sites, but in some
countries, it is a crime, the punishment can be imprisonment. In some countries, it is OK to visit
the adult sites, but the downloaded content cannot be sent to another person.

In many countries, there are no cyber-laws. Some countries do have cyber-laws, but the
interpretations vary and it is difficult for the general public to know what is right and what is
wrong. Many cyber-crimes go undetected as it is difficult to track and trace the criminal.

Consider this case: a person created a mail account with a free mail service provider and then
he sent a threatening mail to a person. Again, the person received another threatening mail, but
now from a different mail address, but with the same email service provider. Perhaps this
criminal was creating mail accounts and was using it only once. The email service provider is
based in the US and the person is in India. Think of it, how do you catch the criminal?

In India, Cyber Crimes are mainly relative to what the Information Technology Act-2000/ 2008
has defined.

2 What is Cyber Security


Cyber Security, also referred as Network Security or Computer Security or IT Security, is the
body of technologies, processes, and practices designed to protect networks, computers, and
data from attacks, thefts, damages, and unauthorized accesses. Cyber security can be defined as
the “preservation of confidentiality, integrity and availability of information in the cyberspace”.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 3

3 Why Cyber Security is critical


 All our assets and our lives are virtualized and have gradually moved to Cyber world.
Where there are assets, definitely there is greater temptation to steal assets.
 Everything is connected and everyone is connected.
 So many components between source to destination including switches, routers,
protocols, software, ISPs are involved to carry the information.
 Software applications can interact each other without user intervention.
 Trillions of dollars of online business happens every year.

4 Different types of Cyber Crimes


The various broad types of Cyber Crimes that we should be familiar with are
1. Unauthorized Access to a Computer (on the Internet or on a Private network)
2. Causing Damage to the property of another person using a Computer.
3. Fraudulent use of the property belonging to others using a Computer.
4. Violation of Privacy using a Computer

Under the generic description of crimes mentioned above, we can specify the following specific
cybercrimes.

4.1 Spamming
Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to
large numbers of recipients for the purpose of commercial advertising, for any prohibited
purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same
message to the same user. While the most widely recognized form of spam is email spam, the
term is applied to similar abuses in other media: instant messaging spam, Web search engine
spam, spam in blogs, online classified ads spam, mobile phone messaging spam, Internet forum
spam, junk fax transmissions, social spam, spam mobile apps and file sharing spam.
A person who creates spam is called a spammer.

4.2 Phishing
Phishing is a type of fraud / attack where an attacker sends a fraudulent (e.g., spoofed, fake, or
otherwise deceptive) message or email designed to trick the recipient into revealing sensitive
information to the attacker or downloading malware by clicking on a hyperlink in the message
that appear to be from a legitimate source. Phishing attacks have become increasingly
sophisticated and often transparently mirror the site being targeted, allowing the attacker to
observe everything while the victim is navigating the site, and transverse any additional security
boundaries with the victim. As of 2020, phishing is by far the most common attack performed
by cybercriminals.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 4

4.3 Cyber bullying


Cyberbullying or cyber harassment is a form of bullying or harassment using electronic or
communication devices such as computer, mobile phone, laptop, etc. It has become increasingly
common, especially among teenagers, as the digital sphere has expanded and technology has
advanced. Cyberbullying is when someone, typically a teenager, bullies or harasses others on
the internet and other digital spaces, particularly on social media sites. Harmful bullying
behavior can include posting rumors, threats, sexual remarks, a victims' personal information,
or pejorative labels (i.e. hate speech). Bullying or harassment can be identified by repeated
behavior and an intent to harm.

4.4 Cyber Stalking


Cyber stalking is the use of electronic communication by a person to follow a person, or
attempts to contact a person to foster personal interaction repeatedly despite a clear indication
of disinterest by such person. It may include false accusations, defamation and slander. It may
also include monitoring, identity theft, threats and blackmail.

4.5 Cyber Warfare


Cyber warfare involves nation-states using information technology to penetrate another nation’s
networks to cause damage or disruption. Cyber warfare has been acknowledged as the fifth
domain of warfare (following land, sea, air, and space). A cyber warfare attack may intrude
networks for the purpose of compromising valuable data, degrading communications, impairing
infrastructural services such as transportation and medical services, or interrupting commerce.
Cyber terrorism is also the disruptive use of information technology by terrorist groups to
further their ideological or political agenda.

4.6 Cyber-squatting
Cyber-Squatting is an act of registering, trafficking in, or using a domain name with intent to
profit from the goodwill of a trademark belonging to someone else.

4.7 Espionage
Espionage is the act or practice of obtaining data and information without the permission and
knowledge of the owner.

4.8 Child pornography


Child Pornography / Child sexually abusive material (CSAM) refers to material containing
sexual image in any form, of a child who is abused or sexually exploited. It is punishable for

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 5

publishing or transmitting of material depicting children in sexually explicit act, etc. in


electronic form.

4.9 Cyber grooming


When a person builds an online relationship with a young person and tricks or pressures him/
her into doing sexual act, it is Cyber grooming.

4.10 Vishing
Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net
Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.

4.11 SMS Phishing


It is the fraudulent practice of sending text messages purporting to be from reputable companies
in order to induce individuals to reveal personal information, such as passwords or credit card
numbers. It is also called Smishing.

4.12 Impersonation and Identity theft


Impersonation and identity theft is an act of fraudulently or dishonestly making use of the
electronic signature, password or any other unique identification feature of any other person.

4.13 Ransom ware


An attack that involves encrypting data on the target system holding data as a hostage and
demanding a ransom in exchange for letting the user have access to the data again by decrypting
it after paying ransom.

5 Reasons for commission of Cyber Crimes


There are many reasons, which act as a catalyst in the growth of cybercrime. Some of the
prominent reasons are:
Money: People are motivated towards committing cybercrime for making quick and easy
money.
Revenge: Some people try to take revenge with other person/organization/society/ caste or
religion by defaming its reputation or bringing economical or physical loss. This comes under
the category of cyber terrorism.
Fun: The amateur do cybercrime for fun. They just want to test the latest tool they have
encountered.
Recognition: It is considered to be pride if someone hack the highly secured networks like
defense sites or networks.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 6

Anonymity: Many time the anonymity that a cyber space provide motivates the person to
commit cybercrime as it is much easy to commit a cybercrime over the cyber space and remain
anonymous as compared to real world. It is much easier to get away with criminal activity in a
cyber-world than in the real world. There is a strong sense of anonymity than can draw
otherwise respectable citizens to abandon their ethics in pursuit personal gain.
Cyber Espionage: At times, the government itself is involved in cyber trespassing to keep eye
on other person/network/country. The reason could be politically, economically or socially
motivated.

6 Types of attackers
6.1 Hacker
Hacker is a general term that has historically been used to describe a computer-programming
expert. More recently, this term is commonly used in a negative way to describe an individual
who attempts to gain unauthorized access to network resources with malicious intent.

6.2 Cracker
Cracker is the term that is generally regarded as the more accurate word that is used to describe
an individual who attempts to gain unauthorized access to network resources with malicious
intent.

6.3 Phreaker
A phreaker is an individual who manipulates the phone network to cause it to perform a function
that is normally not allowed. A common goal of phreaking is breaking into the phone network,
usually through a payphone, to make free long-distance calls.

6.4 Spammer
A spammer is an individual who sends large numbers of unsolicited e-mail messages.
Spammers often use viruses to take control of home computers and use those computers to send
out their bulk messages.

6.5 Phisher
A phisher uses e-mail or other means in an attempt to trick others into providing sensitive
information, such as credit card numbers or passwords. The phisher masquerades as a trusted
party that would have a legitimate need for the sensitive information.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 7

6.6 White hat


White hat is a term used to describe individuals who use their abilities to find vulnerabilities in
systems or networks and then report these vulnerabilities to the owners of the system so that
they can be fixed.

6.7 Black hat


Black hat is another term for individuals who use their knowledge of computer systems to break
into systems or networks with the malicious intention that they are not authorized to use.

7 Different types of Cyber Attacks


The threats use variety of tools, scripts, and programs to launch attacks against networks and
network devices. Typically, the network devices under attack are the endpoints, such as servers
and desktops. There are four primary classes of attacks exist:
 Reconnaissance
 Access
 Denial of service
 Viruses, Worms, and Trojan horses (Malwares)

7.1 Reconnaissance
Reconnaissance is the unauthorized discovery and mapping of systems, services, or
vulnerabilities. It is also known as information gathering and, in most cases, it precedes an
actual access or denial-of-service attack. Reconnaissance is somewhat analogous to a thief
casing a neighborhood for vulnerable homes to break into, such as an unoccupied residence,
easy-to-open doors, or open windows. Reconnaissance attacks can consist of the following:
 Packet sniffers
 Portscans
 Pingsweeps
 Internet information queries

A malicious intruder typically sweeps the target network to determine which IP addresses are
alive. Using, for example, the IP scanner, Nslookup and Whois software utilities, an attacker
can easily determine the IP address space assigned to a given corporation or entity. The ping
command tells the attacker what IP addresses are alive. And port scanner like Nmap to
determine what network services or ports are active on the live IP addresses. From this
information, the intruder queries the ports to determine the type and version of applications and
operating systems running on the target host. Based on this information, the intruder can
determine whether a possible vulnerability exists that can be exploited.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 8

Network snooping and packet sniffing are common terms for eavesdropping. Eavesdropping is
listening in to a conversation, spying, prying, or snooping by using tools like Network or
protocol analyzers and packet capturing utilities on networked computers. The information
gathered by eavesdropping can be used to pose other attacks to the network. Strong encryption
methods provide protection for data susceptible to eavesdropping attacks, password crackers,
or manipulation.

7.2 Access
System access is the ability for an unauthorized intruder to gain access to a device for which
the intruder does not have an account or a password. Access attacks exploit known
vulnerabilities in authentication services, ftp services, and web services to gain entry to web
accounts, confidential databases, and other sensitive information. Access attacks can consist of
the following:
 Password attacks
 Trust exploitation
 Port redirection
 Man-in-the-middle attacks

7.2.1 Password Attacks


Password attacks can be implemented using several methods, including brute-force attacks,
Trojan horse programs, IP spoofing, and packet sniffers. Although packet sniffers and IP
spoofing can yield user accounts and passwords, password attacks usually refer to repeated
attempts to identify a user account, password, or both. These repeated attempts are called brute-
force attacks.

When an attacker gains access to a resource, he has the same access rights as the user whose
account has been compromised. If this account has sufficient privileges, the attacker can create
a back door for future access, without concern for any status and password changes to the
compromised user account.

7.2.2 Trust Exploitation


Although it is more of a technique than a hack itself, trust exploitation refers to an attack in
which an individual takes advantage of a trust relationship within a network. When all servers
or systems reside on the same segment, compromise of one system can lead to the compromise
of other systems because these systems usually trust each other attached to the same network
(System-A trusts System-B, System-B trusts everyone, System-A trusts everyone). Another
example is a system on the outside of a firewall that has a trust relationship with a system on

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 9

the inside of a firewall. If that trusted outside system is compromised, it can take advantage of
that trust relationship to attack the inside network.

Trust exploitation-based attacks can be mitigated through tight constraints on trust levels within
a network. Systems on the outside of a firewall should never be absolutely trusted by systems
on the inside of a firewall. Such trust should be limited to specific protocols and should be
authenticated by something other than an IP address where possible.

7.2.3 Port Redirection


Port redirection attacks are a type of trust exploitation attack that uses a compromised host to
pass traffic through a firewall that would otherwise be dropped. Consider a firewall with three
interfaces and a host on each interface. The host on the outside can reach the host on the public
services segment, but not the host on the inside. This publicly accessible segment is commonly
referred to as a demilitarized zone (DMZ). The host on the public services segment can reach
the host on both the outside and the inside. If hackers were able to compromise the public
services segment host, they could install software to redirect traffic from the outside host
directly to the inside host. Although neither communication violates the rules implemented in
the firewall, the outside host has now achieved connectivity to the inside host through the port
redirection process on the public services host. An example of an application that can provide
this type of access is Netcat. Proper trust models and host-based IDS can detect a hacker and
prevent installation of such utilities on a host.

7.2.4 Man-in-the-Middle attack (packet sniffer)


A packet sniffer is a device or program that allows eavesdropping on traffic travelling between
networked computers. The packet sniffer will capture data that is addressed to other machines,
saving it for later analysis. An example could be someone who is working for an Internet service
provider (ISP) and has access to all network packets transferred between the ISP network and
any other network. Man in the middle attack where a middleman impersonates each endpoint
and is thus able to manipulate both victims. The sender and recipient believe they are
communicating directly with one another. By using strong encryption like IPsec tunnels makes
packet sniffing useless which would allow the hacker to see only cipher text.

7.3 Denial of Service (DoS)


Denial of service implies that an attacker disables or corrupts networks, systems, or services
with the intent to deny services to intended users. DoS attacks involve either crashing the system
or slowing it down to the point that it is unusable. In most cases, performing the attack simply
involves running a hack or script. DoS attacks are the most feared one because attacker does
not need prior access to the target.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 10

7.3.1 Distributed Denial-of-Service Attacks


They are designed to saturate network links with spurious data. This data can overwhelm an
Internet link, causing legitimate traffic to be dropped. DDoS uses attack methods similar to
standard DoS attacks but operates on a much larger scale. Typically hundreds or thousands of
attack points attempt to overwhelm target.

7.4 Malwares (Viruses, Worms, Trojans etc.)


Cyber criminals operate remotely, in what is called ‘automation at a distance’ using numerous
means of attacks available, which broadly fall under the umbrella term of malware (malicious
software). All malicious software are intended to insert on to the network with the intention of
making some loss or the other. Some of the malwares and their behavior are given below:

7.4.1 Viruses
Computer Virus is a program written to enter to your computer and damage/ alter your files/
data and replicate themselves and spread from one computer to another by attaching itself to
another computer file.

7.4.2 Worms
Worms are self-replicating and do not require a program to attach themselves to. Worms
continually look for vulnerabilities and report to the worm author when weaknesses are
discovered.

7.4.3 Trojan horses


Trojans open a backdoor entry to your computer, which gives malicious users/ programs access
to your system, allowing confidential and personal information to be theft. A software program
appears to perform one function (for example, virus removal) but actually acts as something
else. For example, an attacker might log in to a Windows box and run a program that looks like
the true Windows logon screen, prompting a user to type his username and password.

7.4.4 Spyware
By opening attachments, clicking links or downloading infected software, from infected e-mails
spyware is installed on your computer. Spyware can enter your computer systems and can
secretly monitor what employee type and record account numbers and passwords without your
knowledge.

7.4.5 Adware
Adware installs itself in a similar manner to spyware, though it typically just displays extra
advertisements when you are online. Adware can slow down your computer and it can be
frustrating to try to close all the extra pop-up windows, but it will not destroy your data.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 11

7.4.6 Spamware
SPAM is “flooding the Internet with many copies of the same message. SPAM may not be the
biggest risk but screening and deleting junk e-mail wastes our time and if a junk e- mail
attachment is opened, it may release a virus. SPAM filters are an effective way to stop SPAM;
these filters come with most of the e-mail providers online. Also, you can buy a variety of
SPAM filters that work effectively.

7.4.7 Botnet
A Compromised device in a computer network is known as a bot. (short of ‘robot’ also known
as a zombie). A botnet is a collection of internet-connected computers whose security defenses
have been breached and control ceded to a malicious party and have been set up to forward
transmissions (including spam or viruses) to other computers on the internet without knowing
their owners (acting as a hub that forwards malicious files etc. to other computers). Criminals
use botnets to send out spam email messages, spread viruses, attack computers and servers, and
commit other kinds of crime and fraud. If your computer becomes part of a botnet, your
computer might slow down and you might inadvertently be helping criminals.

8 Provisions of Cyber Crimes under Information Technology Act 2000/ 8


When any of the provisions of ITA 2000/8 is violated by a person, legally it results in a “Crime”.
Crimes under ITA 2000/8 are normally called “Cyber Crimes”.

8.1 Sections imposed on Cyber crime

Cyber Attacks/Crimes & Amendments Sections Relevant in IT Act 2000/ 8


Cyber Stalking 43,66
Intellectual Property Crime 43,65,66
Salami Attack 43,66
Phishing 43,66,66C
Personal Data Theft 43,43A
Identity Theft 43
Spoofing 43,66
Data Theft 43,43A, 65,66
Worms, Trojan Horses, Virus, etc. 43,66
Sabotage of computer 43,66

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 12

DoS, DDoS 43,66,66F


Money laundering on Web 43,66,66C,66D
Publishing or transmitting obscene
67
material
Pornography 67A
Child Pornography 67B
Violation of Privacy 66E
Dishonestly receiving stolen
66B
computer/communication device
Cyber Terrorism 66F
Hacking of Protected Systems 70
Offensive Messages 66A

8.2 Details of ITA 2000/8 Sections on Cyber crime


Under ITA-2008, the sections dealing with the offences are as follows:

8.2.1 Section 43: Penalty and Compensation for damage to computer, computer
system, etc.
If any person without permission of the owner or any other person who is in charge of a
computer, computer system or computer network shall be liable to pay damages by way of
compensation not exceeding one crore rupees to the person so affected.

8.2.2 Section 43A: Compensation for failure to protect data


Where a body corporate, possessing, dealing or handling any sensitive personal data or
information in a computer resource which it owns, controls or operates, is negligent in
implementing and maintaining reasonable security practices and procedures and thereby causes
wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay
damages by way of compensation, to the person so affected.

8.2.3 Section 65: Tampering with Computer Source Documents


Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly
causes another to conceal, destroy or alter any computer source code used for a computer,
computer program, computer system or computer network, when the computer source code is
required to be kept or maintained by law for the time being in force shall be liable for
imprisonment up to three years, or with fine, which may extend up to two lakh rupees, or with
both.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 13

8.2.4 Section 66: Computer Related Offences


If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be
punished for a term, which may extend to three years or with fine, which may extend to rupees
one lakh or with both.

8.2.5 Section 66A: Sending offensive messages through communication service, etc.
Any person who sends offensive messages, by means of a computer resource or a
communication device shall be liable for imprisonment up to three years, or with fine, which
may extend up to two lakh rupees, or with both.

8.2.6 Section 66B: Dishonestly receiving stolen computer resource or communication


device
Whoever dishonestly receives or retains any stolen computer resource or communication device
knowing or having reason to believe the same to be stolen computer resource or communication
device shall be punished for a term, which may extend to three years or with fine, which may
extend to rupees one lakh or with both.

8.2.7 Section 66C: Identity Theft


Whoever, fraudulently or dishonestly make use of the electronic signature, password or any
other unique identification feature of any other person shall be liable for imprisonment for a
term, which may extend to three years and shall also be liable to fine which may extend to
rupees one lakh.

8.2.8 Section 66D: Cheating by personation by using computer


Whoever, by means of any communication device or computer resource cheats by personation
shall be liable for a term, which may extend to three years and fine which may extend to one
lakh rupees.

8.2.9 Section 66E: Violation of Privacy


Whoever, intentionally or knowingly captures, publishes or transmits the image of a private
area of any person without his or her consent, under circumstances violating the privacy of that
person shall be punished with imprisonment, which may extend to three years or with fine not
exceeding two lakh rupees, or with both.

8.2.10 Section 66 F: Punishment for cyber terrorism


Whoever, with intent to threaten the unity, integrity, security or sovereignty of India or to strike
terror in the people or any section of the people and by means of such conduct causes is likely
to cause death or injuries to persons or damage to or destruction of property or disrupts or
knowing that it is likely to cause damage or disruption of supplies or services essential to the

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 14

life of the community or adversely affect the critical information infrastructure specified under
section70, shall be punished with imprisonment, which may extend to imprisonment for life.

8.2.11 Section 67: Publishing or transmitting obscene material in electronic form


Whoever publishes or transmits or causes to be published in the electronic form, any material
which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave
and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or
hear the matter contained or embodied in it, shall be punished on first conviction with
imprisonment of either description for a term which may extend to three years and with fine
which may extend to five lakh rupees and in the event of a second or subsequent conviction
with imprisonment of either description for a term which may extend to five years and also with
fine which may extend to ten lakh rupees.

8.2.12 Section 67A: Publishing or transmitting of material containing sexually explicit


act etc. in electronic form
Whoever publishes or transmits or causes to be published or transmitted in the electronic form
any material which contains sexually explicit act or conduct shall be punished on first
conviction with imprisonment of either description for a term which may extend to five years
and with fine which may extend to ten lakh rupees and in the event of second or subsequent
conviction with imprisonment of either description for a term which may extend to seven years
and also with fine which may extend to ten lakh rupees.

8.2.13 Section 67B: Publishing or transmitting of material containing sexually explicit


act, etc. in electronic form
Whoever, publishes or transmits or causes to be published or transmitted material in any
electronic form which depicts children engaged in sexually explicit act or conduct; or creates
text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or
distributes material in any electronic form depicting children in obscene or indecent or sexually
explicit manner shall be punished on first conviction with imprisonment for a term which may
extend to five years and with a fine which may extend to ten lakh rupees and in the event of
second or subsequent conviction with imprisonment for a term which may extend to seven years
and also with fine which may extend to ten lakh rupees.

8.2.14 Section 68: Power of Controller to give directions


The Controller may, by order, direct a Certifying Authority or any employee of such Authority
to take such measures or cease carrying on such activities as specified in the order if those are
necessary to ensure compliance with the provisions of this Act, rules or any regulations made
there under.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 15

Any person who intentionally or knowingly fails to comply with any order under this section
shall be guilty of an offence and shall be liable on conviction to imprisonment for a term not
exceeding two years or to a fine not exceeding one lakh rupees or to both.

8.2.15 Section 69A: Power to issue directions for blocking for public access of any
information through any computer resource
Where the Central Government or any of its officer specially authorized by it in this behalf is
satisfied that it is necessary or expedient so to do in the interest of sovereignty and integrity of
India, defense of India, security of the State, friendly relations with foreign states or public order
or for preventing incitement to the commission of any cognizable offence relating to above, it
may subject to the provisions of sub-sections (2) for reasons to be recorded in writing, by order
direct any agency of the Government or intermediary to block access by the public or cause to
be blocked for access by public any information generated, transmitted, received, stored or
hosted in any computer resource.

The intermediary who fails to comply with the direction issued under sub-section (1) shall be
punished with an imprisonment for a term which may extend to seven years and also be liable
to fine.

8.2.16 Section 70: Protected System


Any person who secures access or attempts to secure access to a protected system in
contravention of the provisions of this section shall be punished.

The appropriate Government may, by notification in the Official Gazette, declare any computer
resource, which directly or indirectly affects the facility of Critical Information Infrastructure,
to be a protected system.
Explanation: For the purposes of this section, “Critical Information Infrastructure” means the
computer resource, the incapacitationor destruction of which, shall have debilitating impact on
national security, economy, public health or safety.

Any service provider, intermediaries, data centers, body corporate or person who fails to
provide the information called for or comply with the direction under this section shall be
punishable with imprisonment for a term, which may extend to one year or with fine, which
may extend to one lakh rupees or with both.

8.2.17 Section 71: Penalty for misrepresentation


Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller
or the Certifying Authority for obtaining any license or Electronic Signature Certificate, as the

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 16

case may be, shall be punished with imprisonment for a term which may extend to two years,
or with fine which may extend to one lakh rupees, or with both.

8.2.18 Section 73: Penalty for publishing electronic Signature Certificate false in certain
particulars
No person shall publish an Electronic Signature Certificate or otherwise make it available to
any other person with the knowledge that:
The Certifying Authority listed in the certificate has not issued it; or the subscriber listed in the
certificate has not accepted it; or the certificate has been revoked or suspended unless such
publication is for the purpose of verifying a digital signature created prior to such suspension
or revocation shall be punished with imprisonment for a term which may extend to three years,
or with a fine which may extend to five lakh rupees, or with both.

8.2.19 Section 74: Publication for fraudulent practices


Whoever knowingly creates publishes or otherwise makes available an Electronic Signature
Certificate for any fraudulent or unlawful purpose shall be punished with imprisonment for a
term, which may extend to two years, or with fine, which may extend to one lakh rupees, or
with both.

9 Computer Emergency Response Team (CERT-IN)


CERT-IN stands for the Indian Computer Emergency Response Team and works as a division
of the Ministry of Communication and Information Technology (MCIT), Government of India.
This has been created to enhance the security of India’s communication and Information
Infrastructure through proactive action and effective collaboration.

CERT-In issues security guidelines, monitors security incidents at the national level and also
interacts with vendors at large to investigate and provide solutions for incidents security
breaches such as virus and denial of service attacks.

CERT-IN is notified as the “National Agency for Incident Response” for performing the
following functions.
a) collection, analysis and dissemination of information on cyber incidents
b) forecast and alerts of cyber security incidents
c) emergency measures for handling cyber security incidents
d) Coordination of cyber incidents response activities
e) issue guidelines, advisories, vulnerability notes and white papers relating to information
security practices, procedures, prevention, response and reporting of cyber incidents
f) such other functions relating to cyber security as may be prescribed

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 17

In order to discharge these functions, CERT-IN has been bestowed with quasi-judicial powers.
Accordingly, it is empowered to call for information and give direction to the service providers,
intermediaries, data centers, body corporate and any other persons.

Additionally, CERT-IN is designated under Section 70A as the “National Nodal Agency” for
protection of what is termed “Critical Information Infrastructure”. The term Critical
Infrastructure refers to any computer resource, the incapacitation or destruction of which may
have a debilitating impact on national security or economy or public health or safety. In other
words, Critical Information Infrastructure may refer to Government IT resources, Bank
resources. It can also be a privately owned network such as the electricity systems or any other
facility which satisfies the required conditions of importance.

Under Section 70 of the Act, Government has the power to designate any Critical Infrastructure
System as a “Protected System”. This also means that all designated “Protected Systems” are
also “Critical Information Infrastructure”.

Thus CERT-IN has been provided the responsibilities for securing both the Government
infrastructure assets that fall in the category of Critical Information Infrastructure as well as the
Private IT infrastructure irrespective of whether it is critical or not.

9.1 Salient features of IT security policy of Indian Railways in view of


CERT-In
i) Zonal Railways / PU should setup their own IT Security organization that includes
one or more IT security managers, incident response team and IT Security monitoring
team.
ii) Contingency management planning should be in place in case of emergency / disaster
in mission critical application/ information. Backup policy should be taken into
consideration while drafting the contingency management planning.
iii) Licensed Software need to be used in all the systems/ applications. The patch
management system should be in place for timely updating of all licensed softwares.
The updating of software is must to plug any vulnerability in software.
iv) Password management policy should be framed in detail using combination of special
characters etc. The password should be disclosed only to authentic users.
v) Developers, while designing the application, should plan security framework.
Version control mechanism should be in place. Documentation and listing of
application should be in safe custody.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 18

vi) In order to protect system, network etc. from virus, malicious codes, spam etc.,
antivirus software along with firewall, IDS (Intrusion Detection System) must be
installed in every system. If possible, a central antivirus server may be installed and
each system should be scanned centrally. All latest definitions should be pushed
through central server.
vii) In order to implement IT Security policy, Zonal Railways/Production Units are
advised to procure and install only licensed software. You are also advised to procure
and install antivirus software, patch management software etc. The financial
implication of procurement and the renewal of software license may be revenue.
viii) All running application and network should be security audited by third party
vendors.
ix) The list of vendors is available at CERT-In website i.e. http://cert-in.org.in/
x) Any other issues relevant to the subject in accordance with the IT Security policy.

10 How to register a Cyber Crime Complaint

10.1 Offline Complaint


At present, most cities in India have a dedicated cyber crime cell. You can make a complaint
anytime to the cyber police or crime investigation department either offline or online. You need
to file a written complaint with the cyber crime cell of any jurisdiction. In the written complaint,
you need to provide your name, contact details, and address for mailing. You need to address
the written complaint to the Head of the cyber crime cell of the city where you are filing the
cyber crime complaint.

According to the IT Act, a cyber crime comes under the purview of global jurisdiction which
means that a cyber crime complaint can be registered with any of the cyber cells in India,
irrespective of the place where it was originally committed or the place where the victim is
currently residing/ staying.

If you do not have access to any of the cyber cells in India, you can file a First Information
Report (FIR) at the local police station. In case your complaint is not accepted there, you can
approach the Commissioner or the city’s Judicial Magistrate.

Certain cyber crime offenses come under the IPC. You can register a cyber crime FIR at the
nearest local police station to report them. It is mandatory under Section 154 of CrPC (Code of
Criminal procedure), for every police officer to record the information/complaint of an offense,
irrespective of the jurisdiction in which the crime was committed.

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 19

10.2 Online Complaint


The online portal of Government of India where a victim can file a cyber crime complaint
is https://cybercrime.gov.in/Accept.aspx. The portal also provides an option of reporting an
anonymous complaint.
National Cyber Crime Helpline Number: 1930

---

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 20

References
1. IRISET TA4 – Cyber Security
2. https://cybercrime.gov.in/Accept.aspx
3. https://cert-in.org.in/
4. https://cert-rail.railnet.gov.in/index.asp
5. https://www.infosecawareness.in/railway
6. https://indianrailways.gov.in/railwayboard/view_section.jsp?lang=0&id=0,1,304,
366,548,669
7. Information available online

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 21

CAMTECH Publications
CAMTECH is continuing its efforts in the documentation and up-gradation of information on
maintenance practices of Signalling & Telecom assets. Over the years a large number of
publications on Signalling & Telecom subjects have been prepared in the form of handbooks,
pocket books, pamphlets and video films. These publications have been uploaded on the Internet
as well as Railnet.
For viewing/downloading these publications

On Internet:
Visit www.indianrailways.gov.in
Go to About Indian Railways → Railway Board Directorates →Efficiency &
Research→CAMTECH, Gwalior → Publications for download →S&T Engineering (Yearwise/
Subjectwise).

On Railnet:
Visit Railway Board website at 10.1.2.21
Go to Railway Board Directorates → →Efficiency & Research→CAMTECH, Gwalior →
Publications for download →S&T Engineering (Yearwise/ Subjectwise).

Alternatively the CAMTECH publications can be viewd/downloaded through following link on


Internet/Railnet:

https://indianrailways.gov.in/railwayboard/view_section.jsp?lang=0&id=0,1,304,366,538,2713
,2718,2722,2731

A limited number of publications in hard copy are also available in CAMTECH library which
can be issued by deputing staff with official letter from controlling officer. The letter should be
addressed to Director (S&T), CAMTECH, Gwalior.
For any further information regarding publications please contact:
Director (S&T) – 0751-2470185 (O)(BSNL)
SSE/Tele - 9755549287 (CUG) Or
Email at dirsntcamtech@gmail.com Or FAX to 0751-2470841 (BSNL) Or
Write at
Director (S&T)
Indian Railways Centre for Advanced Maintenance Technology,
In front of Hotel Adityaz, Airport Road, Maharajpur,
Gwalior (M.P.) 474005

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 22

Our Objective

To upgrade Maintenance Technologies and Methodologies and achieve


improvement in Productivity and Performance of all Railway assets and
manpower which inter-alia would cover Reliability, Availability and
Utilisation.

If you have any suggestion & any specific comments, please write to us:
Contact person : Director (Signal & Telecommunication)
Postal Address : Centre for Advanced Maintenance Technology, Opposite
Hotel Adityaz, Near DD Nagar, Maharajpur,
Gwalior (M.P.) Pin Code – 474 005
Phone : 0751 - 2470185
Email : dirsntcamtech@gmail.com

An Introduction to Cyber Crime November 2022


CAMTECH/S/PROJ/2022-23/SP26A Table of Contents 23



INDIAN RAILWAYS
Centre for Advanced Maintenance Technology
Maharajpur, Gwalior (M.P.) – 474 005

An Introduction to Cyber Crime November 2022

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy