Data 1
Data 1
Dhanushkodi
Sivanandhan, Retd. Director General of Police, Maharashtra and
Former Police Commissioner, Mumbai: A Brief Report
Venue: Dhirjyot Auditorium, 1st Floor, Law Building, D.T.S.S. College of Law,
Malad (East), Mumbai – 400 097
Objective: to impart knowledge to the Students, Professors and Staff about the
various issues related to cybercrime and hacking
Description:
The Dhirajlal Talakchand Sankalchand Shah College of Law, organized a Special
Session on “CYBER SECURITY” to impart knowledge to the Students, Professors
and Staff about the various issues related to cybercrime and hacking. The lecture was
delivered by Shri. Dhanushkodi Sivanandhan, Retd. Director General of Police,
Maharashtra and Former Police Commissioner, Mumbai. promoted as part of the
aftermath of the November 2008 Mumbai attacks. He is India's one of the most well-
known and highly regarded Indian Police Service (IPS) officers. His career spanned
multiple high-profile postings over 35 years and he is known for his use of strategy &
intelligence to uphold the rule of law. During his tenure as CP,Nagpur,Thane and
Mumbai he helped establishing training centres, schools, canteens, gymnasiums and
officers’ club- all with state of the art infrastructure for the welfare of the policemen.
He provided the youth of the city an online portal for better communication called
copconnect.com and created an online portal for the safety of senior citizens called
humarisuraksha.com. Mr. M. S. Kurhade, Campus Director of the D.T.S.S. College
presented the floral greetings to him. Shri. Dhanushkodi Sivanandhan Sir was guided
and described following points on session –
Categories of Cybercrime:
We can categorize cybercrime into two ways:
• The computer as a target: Using a computer to attack other computers e.g.
Hacking, Virus/Worms attack, Dos attack etc.
• The computer as a weapon: Using a computer to commit real world crime e.g.
Credit card fraud etc.
CYBER THREATS:
Phishing: Phishing is fraudulent attempt, usually made through email, to steal your
personal information. Phishing is the attempt to obtain sensitive information such
as username , password and credit card details often for malicious reasons through
an electronic communication(such as E-mail). A common online phishing scam
starts with an email message that appears to come from a trusted source(legitimate
site) but actually directs recipients to provide information to a fraudulent website.
Denial of Service (DoS): This is an act by the criminals who floods the bandwidth
of the victims network. In the Dos attack, a hacker uses a single internet connection
to either exploit a software vulnerability or flood a target with fake request with
fake request usually I an attempt to exhaust server resources.
Spam Email: Email Spam is the electronic version of junk mail. It involves
sending unwanted messages often unsolicited advertising, to a large number of
recipients. Spam is a serious security concern as it can be used to deliver Trojan
horses, viruses, worms, spyware, and targeted phishing attacks.
Malware: It’s malicious software (such as virus, worms and Trojan) which
specifically designed to disrupt or damage computer system or mobile device.
Hackers use malware for any number of reasons such as, extracting personal info.
Or passwords, stealing money, or preventing owners from accessing their device.
Viruses are programs that attach themselves to a computer or file and then circulate
themselves to other files and to other computers on a network. They either alter or
delete the data.
ATM Skimming and Point of Scale Crimes: It is a technique of compromising the
ATM machine by installing a skimming device a top the machine keypad to appear
as a genuine keypad or a device made to be a fixed to the card reader to look like a
part of the machine. Additionally, malware that steals credit card data directly can
also be installed on these devices. Successful implementation of skimmers cause in
ATM machine to collect card numbers and personal identification number codes
that are later replicated to carry out fraudulent transaction.
Prevention Of Cyber Crime:
Prevention is always better than cure. It is always better to take certain precaution
while operating the net. A should make them his part of cyber life. Saileshkumar
Zarkar, technical advisor and network security consultant to the Mumbai Police
Cybercrime Cell, advocates the 5P mantra for online security: Precaution, Prevention,
Protection, Preservation and Perseverance. A citizen should keep in mind the
following things-
1. To prevent cyber stalking avoid disclosing any information pertaining to oneself.
This is as good as disclosing your identity to strangers in public place.
2. Always avoid sending any photograph online particularly to strangers and chat
friends as there have been incidents of misuse of the photographs.
3. Always use latest and update anti-virus software to guard against virus attacks.
4. Always keep back up volumes so that one may not suffer data loss in case of virus
contamination
5. Never send your credit card number to any site that is not secured, to guard against
frauds.
6. Always keep a watch on the sites that your children are accessing to prevent any
kind of harassment or depravation in children.
7. It is better to use a security programme that gives control over the cookies and send
information back to the site as leaving the cookies unguarded might prove fatal.
8. Web site owners should watch traffic and check any irregularity on the site. Putting
host-based intrusion detection devices on servers may do this.
9. Use of firewalls may be beneficial.
10.Web servers running public sites must be physically separate protected from
internal corporate network.
Cybercrimes can be done by using a key logger or some spyware software like Creep
ware. He shared lots of case studies with us like the case of Cassidy wolf. Websites
used for downloading songs like Songs.pk are also supporting piracy and are
underworld operated sites to hack user data. Credit card frauds are done with the help
of skimmers.
Emerging fields for coders and non-coders were stated by him. At last, the interaction
round was conducted where students and teachers asked their queries and he solved
all of them. He also shared his and other helpline numbers to all, for their security and
safety concerns in future. The session ended with a thank you note.
Outcome of the Session: got to learn a lot about cybercrime, its awareness, its
investigation from an official Cyber Crime Investigator and How to report Cyber
fraud and How to complaint Cybercrime online.
Conclusion:
Capacity of human mind is unfathomable. It is not possible to eliminate cybercrime
from the cyber space. It is quite possible to check them. History is the witness that no
legislation has succeeded in totally eliminating crime from the globe. The only
possible step is to make people aware of their rights and duties (to report crime as a
collective duty towards the society) and further making the application of the laws
more stringent to check crime. Undoubtedly the Act is a historical step in the cyber
world. Further I all together do not deny that there is a need to bring changes in the
Information Technology Act to make it more effective to combat cybercrime. I would
conclude with a word of caution for the pro-legislation school that it should be kept in
mind that the provisions of the cyber law are not made so stringent that it may retard
the growth of the industry and prove to be counter-productive.