Sufficiency of Sri Lankan Cyber Crime Laws to Safeguard the It Professionals and Victims of Cyber Attacks

2019 ◽  
Author(s):  
Asiri Iroshan
Author(s):  
Syed Ubaid ◽  
Shakil ◽  
Mohammed Talha Alam ◽  
Shahab Saquib Sohail

This paper analyses the increasing cyber-crime in India, especially in the rural areas, andcyber-attacks on service-providing government websites. Cyber-attacks are viewed within the context of important events to reveal the effectiveness of cyber-attack campaigns. The analysis highlights the range of cyber issues experienced during the lockdown in the country due to the COVID-19 pandemic. The paper shows how work-from-home campaigns digitalize the population, and how rural people become the victim of cyber-attacks. The analysis also emphasizes possible solutions to strengthen cyber security.


2014 ◽  
Vol 4 (2) ◽  
pp. 17-27
Author(s):  
Shewangu Dzomira

The paper explores forms of electronic fraud which are being perpetrated in the banking industry and the challenges being faced in an attempt to combat the risk. The paper is based on a descriptive study which studied the cyber fraud phenomenon using content analysis. To obtain the data questionnaires and interviews were administered to the selected informants from 22 banks. Convenience and judgemental sampling techniques were used. It was found out that most of the cited types of electronic fraud are perpetrated across the banking industry. Challenges like lack of resources (detection tools and technologies), inadequate cyber-crime laws and lack of knowledge through education and awareness were noted. It is recommended that the issue of cyber security should be addressed involving all the stakeholders so that technological systems are safeguarded from cyber-attacks.


2016 ◽  
Vol 11 (02) ◽  
Author(s):  
Parul Kundra ◽  
Pooja Juneja Kundra

Internet is the most used medium for communication these days and its usage is increasing day by day because it’s easy to access any information within few seconds. But it’s not safe as with the increasing use of internet cyber crime is also increasing tremendously. Basic cause of cyber crime is cyber attack. Cyber attacks either have intention or can be done unintentionally. Attacks processed with intention are considered as cyber crimes and they can impact our society badly. This paper is focused on cyber crime, categories of cyber crime, its prevention and issues related the massive increasing ratio of cyber crime year by year.


LAW REVIEW ◽  
2018 ◽  
Vol 38 (1) ◽  
Author(s):  
Dr. Syed Sadiq Husain Abidi

The incredible evolution of information society and its dependence on Internet usage in world and particularly in India is laterally accompanied by vulnerability of societies to cybercrime. Cybercriminals are not constrained by geographical limitations as cyberspace is a free-flowing, borderless and a global problem. India has a dream to convert its society into information society by applying "Digital India" Paradigm, where government sector, the private sector and individuals completely depend on the Internet to conduct sensitive transactions and store important data on the cloud. This makes India Vulnerable to cybercrimes. Internet, worldwide connection of loosely held networks, has made the flow of data and information between different networks simple. With data and information being transferred between networks at distant locations, security related issues have become a major concern for the administrators. The advancement in the field of cyber crime has made administrators take serious steps to protect the system from unauthorized access or virus attacks. The growth of cyber crime in India since 1998 has shown an exponential curve. Though India has managed to control the cyber attacks and registered itself in the Fully Updated Countries still there is lot more work to be done to reduce the increasing cyber crime and protect the machine under threat. Data mining techniques are being used to save the machine and the network under threat. There has been some litigation or judicial decisions on cyber crimes across the world. Cyber litigation, in India, is still in its beginning and it is expected to raise high as the commission of cyber crimes and its reporting is increasing alarmingly. There has not been much litigation on cyber crimes so far, in India and this will be a challenge for judicial decisions on cybercrime in near future. Present Article point out the judicial view about Cyber Crime in India.


2021 ◽  
Vol 7 ◽  
pp. e475
Author(s):  
Abdulkadir Bilen ◽  
Ahmet Bedri Özer

Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime. The key factors in the fight against crime and criminals are identifying the perpetrators of cyber-crime and understanding the methods of attack. Detecting and avoiding cyber-attacks are difficult tasks. However, researchers have recently been solving these problems by developing security models and making predictions through artificial intelligence methods. A high number of methods of crime prediction are available in the literature. On the other hand, they suffer from a deficiency in predicting cyber-crime and cyber-attack methods. This problem can be tackled by identifying an attack and the perpetrator of such attack, using actual data. The data include the type of crime, gender of perpetrator, damage and methods of attack. The data can be acquired from the applications of the persons who were exposed to cyber-attacks to the forensic units. In this paper, we analyze cyber-crimes in two different models with machine-learning methods and predict the effect of the defined features on the detection of the cyber-attack method and the perpetrator. We used eight machine-learning methods in our approach and concluded that their accuracy ratios were close. The Support Vector Machine Linear was found out to be the most successful in the cyber-attack method, with an accuracy rate of 95.02%. In the first model, we could predict the types of attacks that the victims were likely to be exposed to with a high accuracy. The Logistic Regression was the leading method in detecting attackers with an accuracy rate of 65.42%. In the second model, we predicted whether the perpetrators could be identified by comparing their characteristics. Our results have revealed that the probability of cyber-attack decreases as the education and income level of victim increases. We believe that cyber-crime units will use the proposed model. It will also facilitate the detection of cyber-attacks and make the fight against these attacks easier and more effective.


2019 ◽  
Vol 5 (1) ◽  
pp. 46-48
Author(s):  
Akash RANA

The starting point of the paper is the recognition of the growing threat of cyber-attacks to commercial maritime. Constantly growing dependency on technology has obvious advantages, on the other hand, however, it makes commercial maritime vessels progressively more vulnerable to cyber-crime, including GPS signal interference, malware attacks or even gaining control over ships’ systems and networks. The main objective of the paper is to present and discuss the Guidelines on Cyber Security Onboard Ships developed by the International Maritime Organization, including best practices for implementation of cyber risk management. The article’s goal is to summarize the guidelines and to familiarize the reader with the reasons why and the methods how they should be implemented. The paper is concluded with an example how the Guidelines can be adopted by national authorities, i.e., a brief presentation of “Code of Practice: Cyber Security for Ships” – a document developed by the British government that transposes the IMO guidelines.


2019 ◽  
Vol 27 (1) ◽  
pp. 101-121 ◽  
Author(s):  
Melissa Carlton ◽  
Yair Levy ◽  
Michelle Ramim

PurposeUsers’ mistakes due to poor cybersecurity skills result in up to 95 per cent of cyber threats to organizations. Threats to organizational information systems continue to result in substantial financial and intellectual property losses. This paper aims to design, develop and empirically test a set of scenarios-based hands-on tasks to measure the cybersecurity skills of non-information technology (IT) professionals.Design/methodology/approachThis study was classified as developmental in nature and used a sequential qualitative and quantitative method to validate the reliability of the Cybersecurity Skills Index (CSI) as a prototype-benchmarking tool. Next, the prototype was used to empirically test the demonstrated observable hands-on skills level of 173 non-IT professionals.FindingsThe importance of skills and hands-on assessment appears applicable to cybersecurity skills of non-IT professionals. Therefore, by using an expert-validated set of cybersecurity skills and scenario-driven tasks, this study established and validated a set of hands-on tasks that measure observable cybersecurity skills of non-IT professionals without bias or the high-stakes risk to IT.Research limitations/implicationsData collection was limited to the southeastern USA and while the sample size of 173 non-IT professionals is valid, further studies are required to increase validation of the results and generalizability.Originality/valueThe validated and reliable CSI operationalized as a tool that measures the cybersecurity skills of non-IT professionals. This benchmarking tool could assist organizations with mitigating threats due to vulnerabilities and breaches caused by employees due to poor cybersecurity skills.


Sign in / Sign up

Export Citation Format

Share Document