International Journal of Enterprise Computing and Business Systems

Similar documents
An Overview of Cybersecurity and Cybercrime in Taiwan

Cyber Crimes in India A Closer look

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

The FBI and the Internet

Cyber Security Recommendations October 29, 2002

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

Cybercrime in Canadian Criminal Law

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Role and Improvement in Cyber Laws for E-Banking System

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Microsoft s cybersecurity commitment

Lessons from Defending Cyberspace

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Cyber security Country Experience: Establishment of Information Security Projects.

CYBERCRIME AND THE LAW

CYBER CRIME AWARENESS

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Executive Director Centre for Cyber Victim Counselling /

Cybercrime: risks, penalties and prevention

Research Topics in the National Cyber Security Research Agenda

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Data protection and outsourcing industry - A study. By Kumar Mihir

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India

NEW ZEALAND S CYBER SECURITY STRATEGY

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

DATA PROTECTION LAWS OF THE WORLD. India

Cyber Crime and Data Retention

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

PCI Data Security Standard 3.0

Developments in cybercrime and cybersecurity

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal November 2009

McAfee Server Security

Cyber Security Threats and Countermeasures

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Cyber Security Strategy

Trends and Tactics in Cyber- Terrorism

What legal aspects are needed to address specific ICT related issues?

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Discussion paper. Discussion paper on the coverage of crime statistics. 23 January Office for National Statistics paper

DIOCESE OF DALLAS. Computer Internet Policy

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Peace and Justice in Cyberspace

In an age where so many businesses and systems are reliant on computer systems,

National Cyber Security Policy -2013

National Cyber Crime Unit

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Computer Forensics Preparation

Cyber Risk Management

Cybercrime Security Risks and Challenges Facing Business

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

WRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, :30 PM

Identifying Cyber Risks and How they Impact Your Business

AT A HEARING ENTITLED THREATS TO THE HOMELAND

The Massachusetts Strategic Plan for Cyber Crime

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

How To Create An Insight Analysis For Cyber Security

MONTENEGRO NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO

Franchise Data Compromise Trends and Cardholder. December, 2010

Fraud and Abuse Policy

SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT Employee Technology Acceptable Use Agreement

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Who s Doing the Hacking?

Global IT Security Risks: 2012

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

Global Corporate IT Security Risks: 2013

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Working with the FBI

COMPUTER, NETWORK AND INTERNET USE POLICY

Top Five Things You Need to Know About Cybersecurity. Larry Mattox, VC3 Session #7

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February Purpose.

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Cybersecurity Protecting Yourself, Your Business, Your Clients

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

SMALL BUSINESS REPUTATION & THE CYBER RISK

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

Promoting a cyber security culture and demand compliance with minimum security standards;

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Small businesses: What you need to know about cyber security

Perception of Cyber Crime in Slovenia

MIIT PROMULGATES TWO REGULATIONS FOR REPORTING AND HANDLING CYBERCRIME

IQware's Approach to Software and IT security Issues

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

ESSENTIALS OF INFORMATION TECHNOLOGY LAW

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Transcription:

PREVENTING CYBER CRIME: A STUDY REGARDING AWARENESS OF CYBER CRIME IN TRICITY Ms.Arpana(PhD in Progress) Lecturer GJIMT, Ph-II,Mohali,India Dr.Meenal Chauhan Assistant Professor GJIMT,Ph-II, Mohali, India Abstract Computer crime also referred as Cybercrime has increased in severity and frequency in the recent years and because of this, it has become a major concern for companies, universities and organizations. Worldwide governments, police departments and intelligence units have started to react. In this paper, we provide an overview of Cybercrime and examine the awareness among different respondents on the issue of Cyber Crime, to emphasize the severity of this problem and the urgent need to limit its impact worldwide. Keywords: Cyber Crime, Law, Internet Crime, Awareness 1. Introduction From personal computers in the home used to track checking accounts and keep household inventories in databases to large supercomputers that control space missions and run the world's largest companies, computers have become commonplace. The number of individuals who have access to the information on those computers has increased as the communications

industry has undergone a revolution in recent years, and uncontrolled access to information presents a very real threat in most business and some government information. When the Internet was developed, the founding fathers of the Internet hardly had any inclination that the Internet could also be misused for criminal activities. Today, there are many disturbing things happening in cyberspace. Obviously, it was just a matter of time before criminals discovered the advantages of computers and make it increasingly possible to get proprietary information of financial institutions and other firms. Because of the highly significant role that computers play in modern life, there is a need to keep information on machines secure from tampering, from unauthorized dissemination, and from unauthorized removal. 2. Definition of Cyber Crime The term 'cyber crime' has not been defined in any Statute or Act. The Oxford Reference Online defines 'cyber crime' as crime committed over the Internet. The Encyclopedia Britannica defines 'cyber crime' as any crime that is committed by means of special knowledge or expert use of computer technology. So what exactly is Cyber Crime. Cyber Crime could reasonably include a wide variety of criminal offences and activities. A generalized definition of cyber crime may be "unlawful acts wherein the computer is either a tool or target or both". CBI Manual defines cyber crime as: (i) Crimes committed by using computers as a means, including conventional crimes. (ii) Crimes in which computers are targets.

The Information Technology Act, 2000, does not define the term 'cyber crime. Cyber crime can generally defined as a criminal activity in which information technology systems are the means used for the commission of the crime. Based on the United Nations General Assembly resolution of January 30, 1997, the Government of India passed the Information Technology Act 2000 (Act No.21 of 2000) and notified it on October 17, 2000. The Information Technology Act, 2000, is the first step taken by the Government of India towards promoting the growth of the E-commerce and it was enacted with a view to provide legal recognition to e-commerce and e-transactions, to facilitate e- governance and prevent computer-based crimes. It is a first historical step. However, the rapid increase in the use of Internet has led to a spate in crime like child pornography, cyber terrorism, publishing sexually explicit content in electronic form and video voyeurism. The need for a comprehensive amendment was consistently felt and after sufficient debate and much deliberation, the I.T. Amendment Act 2008 was passed. The ITAA 2008 got the President s assent in February 2009 and was notified with effect from 27.10.2009. The new IT Amendment Act 2008 has brought a large number of cyber crimes under the ambit of the law. Some of the significant points in the Amendment Act include introduction of corporate responsibility for data protection with the concept of reasonable security practices (Sec.43A), recognition of Computer Emergency Response Team India (CERT-In) as the national nodal agency empowered to monitor and even block web-sites under specific circumstances, introduction of technological neutrality replacing digital signatures with electronic signatures etc. Besides, the CERT-In will also assist members of the Indian Community in implementing proactive measures to reduce the risks of computer security incidents. The IT Act provides legal recognition for transactions carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and

storage of information. The IT Act facilitates electronic filing of documents with the Government agencies. 3. Literature Review Cyber-crime or computer crime is considered to be any crime that uses a computer and a computer network (Matthews, 2010). A basic definition describes cybercrime as a crime where computers have the possibility of playing an important part (Thomas and Loader, 2000). The main factor in cyber-crime increase is the Internet. By use of Internet, cybercriminals often appeal to images, codes or electronic communication in order to run malicious activities. Among the most important types of Internet crimes we can mention: identity theft, financial theft, espionage, pornography, or copyright infringement. The cyber-crimes can be divided into two categories: the crimes where a computer network attacks other computers networks e.g. a code or a virus used to disable a system, and, the second category, crimes where a computer network attacks a target population e.g. identity theft, fraud, intrusions (Svensson, 2011). Issues revolving around cyber-crime have become more and more complex. Computer criminal activities have grown in importance and institutions are more interested than ever in putting an end to these attacks. Progressions have been made in the development of new malware software, which can easily detect criminal behavior (Balkin et al., 2007). Moreover, high quality anti-virus systems are offered for free now in many countries at every purchase of a computer or an operating system. 4. Objective and Hypothesis of Study The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. This study investigates whether

or not people would use the Internet to report crime. The pin pointed objectives of the study is to find out awareness among different respondents on the issue of Cyber Crime. H1: It has been assumed that there is no association between Respondents Occupation and the level of awareness. 5. Methodology 5.1 Research Strategy Quantitative research in the form of a survey instrument has been used to collect the data and descriptive statistics have been used to analyse and present the data. The decision to follow a quantitative research methodology was based on the fact that the results of the survey should be a representative sample of the total population. 5.2 Research Questions Due to the exploratory nature of the research, research questions were derived from the literature. These questions provided a basis for the research in order to find the awareness of cyber Crime among respondents. Also to find out what type of Cyber Crimes are occurring these days and what should be done to prevent Cyber Crime 5.3 Sample and Respondents The primary target respondent was a working professional who was aware of the various computer crime and security issues within his/her organization. Typically, these were senior managers, IT administrators as well as any IT security consultants. Simple random sampling was the primary sampling method used when selecting the sample for this survey.

6. Result and Findings In conducting the research, the author used SPSS 13.0 software program and take the hypothesis that there is no association between Respondents Occupation and the level of Cyber Crime Awareness. The Figure1 shows that, 33% Student, 13% IT Professional, 33% Businessman and 13% Advocate respondents think that major drawback, which prevent Cyber Crime from being solved in India is Lack of awareness among people

The Figure2 shows that, 58% student, 42% IT Professionals,37% businessman and 61% advocates respondents are of view that Law enforcement agencies are not fully equipped

The Figure 3 shows that, Rest 9% students, 45% IT Professional, 30% Businessman and 26% advocate respondents feels that all the factors are responsible which prevent cyber crime to be solved in India. The Figure4 shows that, On the issue of spread of Disease Cyber Crime these days 25% student, 53% IT Professional, 59% Businessman and 22% Advocates respondents feels that it is spreading very fastly and 33% student, 31% IT Professional,18.5% Businessman and 52% Advocates respondents said that it is spreading at average where as 42% student,16% IT Professional,22.5% Businessman and 26% Advocates believes that it is spreading very slowly

Table 1 Expected Frequencies (Association between Respondents Occupation and the level of Cyber Crime Awareness) Cyber Crime Awareness Occupation Average Good Total Value of Chi-square Student 3.96 8.04 12 IT Professional 12.54 25.46 38 Businessman 8.91 18.09 27 16.34 Advocate 7.59 15.41 23 Total 33 67 100 Since the calculated value of χ2 is less than the table value (7.815). The hypothesis holds true. 7. Conclusion Results revealed the importance of awareness as a tool to decrease/ prevent cyber crime. Therefore it is concluded that there is no association between the Respondents Occupation and Level of Awareness. This is due to the fact that it is a common misconception that leads to the underestimation of the threat that can be brought to the society. One of the most significant results is in relation to the possible reaction of the population to the threats of cyber crime. This is on the basis of the level of awareness of the members of the population on the issue of cyber crime. Some can dismiss the issue as unimportant due to the fact that the crime occurs in the virtual world that can be considered as unreal by some. This is due the fact that these individuals has less access to the cyber world and have no background information on the possible effects that can be incurred from the occurrence of cyber crime.

There will always be new and unexpected challenges to stay ahead of cyber criminals and cyber terrorists but we can win only through partnership and collaboration of both individuals and government. There is much we can do to ensure a safe, secure and trustworthy computing environment. It is crucial not only to our national sense of well-being, but also to our national security and economy. It is not so easy and possible to eliminate cyber crime once for all in view of the latest scientific development. However, it is quite possible to combat and check the cyber crimes. To achieve that object, the first and foremost requirement is the awareness among the public about the cyber crimes and the precautions to prevent the same. 8. References Serban, C. (2011). Partnership in social marketing programs. Socially responsible companies and non-profit organizations engagement in solving society s problems. Amfiteatru Economic, XIII (29),pp. 104-116. Svensson, P. (2011). Nasdaq hackers target service for corporate boards. Retrieved from http://news.yahoo.com/s/ap/20110205/ap_on_hi_te/us_nasdaq_hackers Matthews, B. (2010). Computer Crimes: Cybercrime Information, Facts and Resources. Retrieved from http://www.thefreeresource.com/computer-crimes-cybercrimeinformation-facts-and-resources Balkin, J. M. et al. (2007). Cybercrime: digital cops in a networked environment. New York: New York University Press (NYU). Thomas, D., and Loader, B. (2000). Cybercrime: law enforcement, security and surveillance in the information age. London: Routledge.