A Study On Emerging Issues of Cyber Attacks Security in India Ijariie13501
A Study On Emerging Issues of Cyber Attacks Security in India Ijariie13501
Submitted by:
ADITI SINGH
Amity Law School, Noida
B.A., LL.B (H) 2nd Year, 4th Semester
ABSTRACT
In the digital age, data plays a huge role in our ordinary lives. It’s present in lots of evident ways. The digital
world has transformed our lives creating new ways of communicating, organizing and accessing information. It
has also generated new threats popularly known as ‘cyber crimes’ which are increasing tremendously day by
day. In response cyberspace is increasingly being framed as something inherently dangerous. Which require
more scrutiny management and control. Besides various measures cyber security is still a major concern to
many. Securing the data have become the biggest challenge in the today’s society where internet is easily
available. This paper will explore why this framing is itself a threat to both human rights and the security of the
digital environment. By the end it will help in understanding the dominant ways threats in cyberspace are being
framed. Why this framing can be problematic and how to get involved it these debates. This paper aims to
identify how we can engage with Government and Citizen to protect and strengthen these rights. It also focus on
modern techniques and ethics in changing the face of cyber security.
KEY WORDS: Cyber Security, Cyber Crime, Cyber Ethics, Cyber Space, Data, Digital, Social Media,
Government.
I. INTRODUCTION
The word Cyber originally came from Cybernetics derived from the Greek kubernētēs which refers to a Pilot or
steersman. [1] It was actually popularized by an American mathematician Norbert Wiener. He wrote a book in
the 1940’s called Cybernetics. This was his prediction for a future which is dominated by a self-governed PC
framework that had its own feedback loop and would continue to grow. It wasn’t actually until the 1980’s when
cyber linked with other words meaning something related to digital. Cyber is “relating to or characteristic of
information technology, virtual reality or computers.” If we mention that today we live in a Cyber age, it means
the age of analysts, virtual reality, or information technology. Just like real universe cyber universe is
expanding. In last 60 seconds for instance there will have been thousands and millions of updates on Facebook,
twitter and on other platforms. We spend our time on checking emails every day. There are estimates that over
70% of those emails are actually spam or hackers or spam in terms of malicious software trying to gain access to
your systems and to your personal information.
A Cyber Attack occurs when hackers try to destroy or damage a computer system or network. Cyber Space is
the notional environment where communication over computer network happens. Initially, the term entered
popular culture from science fiction. Today, however, many people, including technology strategists, industry
leaders, security professionals, and the military use it. We use cyber space to describe the domain of the
worldwide technology environment.
The development of technology has made man reliant on Internet for all his needs and it is affecting us an
individual and as a society. It has given man simple access to everything while at the same time sitting at one
spot. Whether it’s about Social networking, web based shopping, data storage, gaming, online classes, online job
opportunities, each conceivable thing that man can consider is achievable with the help of Internet. It is utilized
and consumed in every possible way. With the enhancement of the web and its related advantages likewise built
up the idea of cyber-crimes. When the Internet was first created the founding fathers had absolutely no idea that
the Internet could be misused by criminal activity. A couple of years back, there was lack of awareness about
the violations that could be committed through web. With the rise of the innovation the abuse of the innovation
has equally extended to its ideal level. Since the turn of the century, cybercrime has increased dramatically.
Cybercrimes may threaten a country’s security, an entity’s financial health or even an individual. India is
similarly not far behind different nations where the pace of occurrence of digital violations is increasing day by
day.
ii. Das (2013) He discusses that the effectiveness of the Internet has proved itself in numerous and
countless ways that will hopefully be enough to make sure it does not become a wasteland of criminal
action and a upholder for the malicious. According to him government will have to huge role but most
of the prevention needs to be handled by commercial entities by producing software which have the
ability to stop frauds.[3]
V. CYBER CRIME
We can define “Cyber Crime” as any malefactor or other offences where electronic communications or
information systems, including any device or the web or both or more of them are involved [4].
Cybercrime is a crime that includes a framework (system) and a network. The computer may have been utilized
in the commission of the crime, or it might be the object or target. Digital crimes are offenses that are enacted
against a person or persons, with criminal intent, which purposely damages the victim's reputation or causes
direct or indirect physical or psychological harm to the victim using modern telecommunications. For example,
Web chat rooms, cell phones, messages or emails and notice feeds. Such crimes pose a threat to the country's
security and economic health. Issues including these sorts of crimes have a high profile, especially those
encompassing hacking, copyright infringement, child pornography. There are additional issues of security when
secret data is blocked or uncovered, legally or otherwise. The enormous growth in electronic commerce (e-
commerce) and online share trading has led to a phenomenal spurt in incidents of cybercrimes.
Cyber Crimes against Persons- Cybercrimes against individuals include various offenses such as the
transmission of Child pornography and the harassment of anyone with the use of PCs such as e-mail.
Dealing, circulation, posting and distribution of obscene material including pornography and indecent
public nudity is one among the foremost important Cybercrime known today. The harm done to
humanity by such crimes is not great. This is cybercrime, which threatens to undermine the
development of the younger generation, as it leaves irreparable scars and wounds on the younger
generation if it is not controlled.
Cyber harassment is a separate cybercrime. Various forms of harassment can and do occur in
cyberspace or through the use of cyberspace. Harassment can be sexual, racial, religious or otherwise.
People perpetuating such harassment are also committing cybercrimes.
Cyberbullying can also bring crime to another related area that violates the privacy of citizens.
Violating the privacy of online citizens is a serious cybercrime. Nobody likes being attacked by other
person on the invaluable and most poignant part of their privacy, which grants citizens over the
Internet.
Cyber Crimes against Property - The second classification of Cyber-attack is that of Cybercrimes
against all types of property. Crime incorporate PC vandalism (destruction of other’s property),
transmission of damaging programmes, siphoning of assets from financial foundations, stealing
undisclosed data and information.
A Mumbai-based start-up organization lost a lot of cash in the business when the opponent
organization, an industry major, took the technical database from their PCs with the assistance of a
corporate cyber spy.
Cyber Crimes against Government - The expansion of web has indicated that the mechanism of
Cyberspace is being utilized by people and groups to threaten the international governments and
additionally to threaten the residents of a nation. This crime manifests itself into terrorism when an
individual "crashes" into an administration, state or military maintained website.
i. E-Mail Bomb: It’s a type of Internet misuse which is executed and involves sending large amounts of
emails to a particular email address with the objective of flooding the mail box and overpowering the
mail server facilitating the address and crashing the service.
ii. Hacking: Hacking is an attempt to misuse a PC framework or a private network within a PC.
Basically, it is the unapproved access to or power over PC security frameworks for some illegal
motive. It’s done by hackers who are highly skilled in breaking a security system.
iii. Spreading computer virus: A PC infection, it’s a malicious program design (i.e. destroying data)
stacked onto a client's PC without the client's information and performs malevolent activities. It can
spread through E mails, Pen drives (secondary storage), Multimedia and Web.
iv. Phishing: Phishing is a cybercrime wherein an objective or targets are reached by e-mail, phone or
instant message by somebody acting like an authentic establishment to draw people into giving
delicate information, for example, recognizable data, banking, credit card details and passwords. This
data is then used to get to significant records and can bring about extensive fraud, identity theft and
monetary loss.
v. Identity theft: Identity theft is the obtaining of another person's private or financial data for the only
purpose of transacting or buying through that person's name or identity. It includes getting access to
corporate databases to steal lists of client data and destroying their private and credit data.That
criminal shall be punished with imprisonment of either description for a term which may reach three
years and shall even be subject to fine which may reach rupees one lakh.
2) The Indian Computer Emergency Response Team is at liable for responses including examination,
forecasts and cautions on cyber security issues and breaks.
1. Strong Password Security: Using a strong and complicated password is an easiest task to
upgrade the security of your system. E.g. Password which uses special characters, numbers
and letters. Regularly updating it can help stop brute force password cracking.
2. Authentication of knowledge: Regular update and Using with caution: Programmers
(hackers) can abuse an email and web in numerous way, use it with caution.Updating system
and periodic backup programme is an incredible method to guarantee your information is
retrievable and protect and repair any bugs or defects with the system.
3. Malware scanners- Software which tests malicious code in addition harmful viruses in all
files present in the device. Viruses, worms, and Trojan horses are samples of malicious
software that are often clustered together and known as malware.
4. Firewalls- A software program or part of hardware which helps sort hackers, viruses, and
worms that attempt to reach your device over the web. All messages incoming or leaving the
web undergo the firewall present, which examines each message and blocks the one against
required safetystandards.
5. Anti-virus software -Installing anti-virus software is a vital step to protect your PC network
from viruses. It vigorously scans your emails, system documents from viruses that come into
your operating system. A good anti-virus implements periodic updates and should be
compatible with system.
1. Do utilize the internet to covey and interact with others. Email and texting helps in keeping contacts
with family, friends, colleagues. Sharing new concepts, thoughts and information with individuals
across the city or around the world.
2. Never share or send your personal data like bank account no., password, ATM pin and so on over an
unencrypted network including unencrypted mail. Sites that doesn’t have lock icon and https on the
address bar of the browser are the decoded site. The “s” stands for secure and it demonstrate that the
site is secure and safe.
3. Never sign to any social networking platform and sites until it’s legit and authentic.
4. Never forget to refresh and update the operating framework. Software like Firewalls, anti-virus and
anti-spyware programming should be installed and frequently updated in ones PCs.
5. Never visit,follow and respond to spam and un-trusted website or link.
6. Don’t be a harasser or a bully on the Internet. Don’t use offensive languages or comments. Do not call
people names, defame them, send embarrassing and explicit pictures of them, or attempt to hurt them.
7. Web is considered to be world’s largest library with information on any theme in any branch of
knowledge. So use this data in a right and legal manner.
8. Never share your password with anyone and never operate others account by using their passwords.
9. Never share your personal data to anyone as there is a decent possibility of others misusing it and you
will have to face the consequences.
10. Never click on pop-ups that offers site survey or study on ecommerce websites or any other site as in
some cases it comes with malicious software. When we acknowledge or follow pop-ups a download is
performed in the background and that file contains the malware and malicious code and it known as
drive-by-download.
11. Always cling to copyrighted data and download games or recordings only if they are admissible.
12. Never attempt to send any sort of malware to other’s PCs and make them corrupt.
13. Never fake your identity and create fake accounts of other persons as it would land you and the other
individual in trouble.
The above are some Cyber Morals one must follow while utilizing the web. We apply some appropriate
principles and conducts in our lives from very early stages same we apply in this Cyber world.
X. CONCLUSION
A country with 1.3 billion people, INDIA with the lowest data charges in the world. Securing data and
information is becoming more important with the advancing network. This study clears that with the
development of cyberspace and technology the scope of cyber threats will increase too. One must use Cyber
security measures like using firewalls, keeping strong passwords, installing antivirus and should practise
prevention of cyber-attack to protect data. India’s reactive approach of protecting cyber system only after being
dictated by occurrence of cyber security cases needs to be change into proactive one. As it is the need of the
hour. Awareness, Firm amendments, penal provision and cyber security policy are needed in order to protect
rights and privacy in order to uphold rule of law.
REFERENCES
[1] https://alpinesecurity.com/blog(Visited on 18th April, 2020)
[2]https://www.cisomag.com/india-cybersecurity-policy/(Visited on 21st April, 2020)
[3]Sumanjit Das and TapaswiniNayak, “IMPACT OF CYBER CRIME: ISSUES AND CHALLENGES” 6
IJESET 142-153 (2013).
[4]https://cybercrime.org.za/definition(Visited on 24th April, 2020)
[5]https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120 (Visited on 25th April, 2020)
[6]https://delhidistrictcourts.nic.in/ejournals/CYBER%20LAW.pdf(Visited on 27th April, 2020)
[7]https://www.cyberralegalservices.com/detail-casestudies.php(Visited on 2nd May, 2020)
[8]http://www.helplinelaw.com/employment-criminal-and-labour/CDII/cyber-defamation-in-india.html (Visited
on 6th May, 2020)
[9] Puja Gupta and Rakesh Kumar, “Security Risk Management with Networked Information System: A
Review”4 (2) IJEE193– 197 (2012).
[10] VeenooUpadhyay, Dr.SuryakantYadav, “Study of Cyber Security Challenges Its Emerging Trends: Current
Technologies”5 IJERM 2349-2058 (2018).