Cyber Crimes in India: Judicial Endeavours

LAW REVIEW ◽  
2018 ◽  
Vol 38 (1) ◽  
Author(s):  
Dr. Syed Sadiq Husain Abidi

The incredible evolution of information society and its dependence on Internet usage in world and particularly in India is laterally accompanied by vulnerability of societies to cybercrime. Cybercriminals are not constrained by geographical limitations as cyberspace is a free-flowing, borderless and a global problem. India has a dream to convert its society into information society by applying "Digital India" Paradigm, where government sector, the private sector and individuals completely depend on the Internet to conduct sensitive transactions and store important data on the cloud. This makes India Vulnerable to cybercrimes. Internet, worldwide connection of loosely held networks, has made the flow of data and information between different networks simple. With data and information being transferred between networks at distant locations, security related issues have become a major concern for the administrators. The advancement in the field of cyber crime has made administrators take serious steps to protect the system from unauthorized access or virus attacks. The growth of cyber crime in India since 1998 has shown an exponential curve. Though India has managed to control the cyber attacks and registered itself in the Fully Updated Countries still there is lot more work to be done to reduce the increasing cyber crime and protect the machine under threat. Data mining techniques are being used to save the machine and the network under threat. There has been some litigation or judicial decisions on cyber crimes across the world. Cyber litigation, in India, is still in its beginning and it is expected to raise high as the commission of cyber crimes and its reporting is increasing alarmingly. There has not been much litigation on cyber crimes so far, in India and this will be a challenge for judicial decisions on cybercrime in near future. Present Article point out the judicial view about Cyber Crime in India.

Author(s):  
Rashmi Aggarwal

Cyber law is law of the Internet; hence, any crime on the Internet is basically cyber crime. It is committed on cyber space, but all the pre mediation is an act of individual/s, who are the perpetrators of crime with malicious intentions and commission of these acts. Cyber crimes were initially perceived as a subset of Information Technology (IT) laws, which governed the digital dissemination of both digitalized information and software. Digital information includes information security and electronic commerce. However, as the world became subservient to digitalization, cyber/Internet laws became more pronounced in their origin and are now a special branch of Internet laws. These laws include study of Internet access and usage, privacy rights, freedom of expression, and extra territorial jurisdiction issues. This chapter analyzes the cyber laws in India and raises the issues of criticality of provisions relating to dispute resolution in India.


2016 ◽  
Vol 11 (02) ◽  
Author(s):  
Parul Kundra ◽  
Pooja Juneja Kundra

Internet is the most used medium for communication these days and its usage is increasing day by day because it’s easy to access any information within few seconds. But it’s not safe as with the increasing use of internet cyber crime is also increasing tremendously. Basic cause of cyber crime is cyber attack. Cyber attacks either have intention or can be done unintentionally. Attacks processed with intention are considered as cyber crimes and they can impact our society badly. This paper is focused on cyber crime, categories of cyber crime, its prevention and issues related the massive increasing ratio of cyber crime year by year.


2021 ◽  
Vol 7 ◽  
pp. e475
Author(s):  
Abdulkadir Bilen ◽  
Ahmet Bedri Özer

Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime. The key factors in the fight against crime and criminals are identifying the perpetrators of cyber-crime and understanding the methods of attack. Detecting and avoiding cyber-attacks are difficult tasks. However, researchers have recently been solving these problems by developing security models and making predictions through artificial intelligence methods. A high number of methods of crime prediction are available in the literature. On the other hand, they suffer from a deficiency in predicting cyber-crime and cyber-attack methods. This problem can be tackled by identifying an attack and the perpetrator of such attack, using actual data. The data include the type of crime, gender of perpetrator, damage and methods of attack. The data can be acquired from the applications of the persons who were exposed to cyber-attacks to the forensic units. In this paper, we analyze cyber-crimes in two different models with machine-learning methods and predict the effect of the defined features on the detection of the cyber-attack method and the perpetrator. We used eight machine-learning methods in our approach and concluded that their accuracy ratios were close. The Support Vector Machine Linear was found out to be the most successful in the cyber-attack method, with an accuracy rate of 95.02%. In the first model, we could predict the types of attacks that the victims were likely to be exposed to with a high accuracy. The Logistic Regression was the leading method in detecting attackers with an accuracy rate of 65.42%. In the second model, we predicted whether the perpetrators could be identified by comparing their characteristics. Our results have revealed that the probability of cyber-attack decreases as the education and income level of victim increases. We believe that cyber-crime units will use the proposed model. It will also facilitate the detection of cyber-attacks and make the fight against these attacks easier and more effective.


Author(s):  
Alaa Hussein Al-Hamami

Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.


2020 ◽  
Author(s):  
Swati Sharma ◽  
Vikash Kumar Sharma

Cyber Crime is a crime which is difficult to detect and stop once occurred leave a long term effect on victims. Cyber Crime is increasing day by day due to over use of social media, online shopping, and internet banking which need sensitive financial and personal data.The development in emerging internet technology and its wide spread knowledge leads to security issues, cyber crime, internet hackers and intruders. The charm of internet enhances the network structure that construct vast online theft, fraud are called as cyber attacks or cyber crime. In order to keep ourselves free from cyber crime we need to know how to protect ourselves from cyber crime. In this paper we propose different mode of cybercrime and the types of its illegal activities over the internet. Either national or international cybercrime is creating huge negative impacts over society. By focusing on various techniques we examine the cybercrime web data due to social media. Social networking websites are used as a medium of interaction and communication among all the people across the world. Due to over use and lack of awareness leads to increase the cyber crimes by several aspects.


2018 ◽  
pp. 1438-1453
Author(s):  
Alaa Hussein Al-Hamami

Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.


Author(s):  
Preetha S ◽  
P. Lalasa ◽  
Pradeepa R

In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. With the increased use of technologies in our life, the cybercrimes have amplified. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. In 2019 around 93.6% of observed malware was polymorphic, which means it changes the code continuously to evade detection. According to FBI and internet crime complaint center 2020crime report has doubled compared to 2019. International Data Corporation predicts that global spending on cybersecurity solutions will reach $133.7 billion by 2022 as cyber threats continue to increase. Governments around the world have acknowledged to growing cyber-attacks by providing directions to organizations implementing efficient cybersecurity practices. Cybersecurity protects computer systems and networks from creating damage to hardware and software, information disclosure, theft and from the interference or misdirection of the services they provide. The need to understand different kinds of cybercrime. In order to develop necessary measures against cybercrime, we need to understand different kinds of cybercrime. Our paper gives you an overview of various types of cyber-crime like malware, phishing, zero-day exploit, Advanced Persistent Threat (APT). The study provides an overview to different preventive existing solutions proposal and methods to detect attack. A strong understanding of such attacks would benefit us to be cautious and develop effective solutions.


Author(s):  
Mrs. Jaishma Kumari B ◽  
Manisha ◽  
Ravish Acharya ◽  
R Yajnesh

Among the diverse forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnets are designed to perform predefined functions in an automated fashion, where these malicious activities range from online searching of data, moving files sharing channel information to DDoS attacks against critical targets, click fraud etc. Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today’s network intersect to inform the field of botnet technology and defense.


2015 ◽  
Vol 71 (3) ◽  
pp. 31-43
Author(s):  
Natalija Vasileva ◽  
◽  
Viktor Kavura ◽  

2016 ◽  
Vol 1 (3) ◽  
pp. 141
Author(s):  
Rana Sağıroğlu

Margaret Atwood, one of the most spectacular authors of postmodern movement, achieved to unite debatable and in demand critical points of 21st century such as science fiction, postmodernism and ecocriticism in the novel The Year of The Flood written in 2009. The novel could be regarded as an ecocritical manifesto and a dystopic mirror against today’s degenerated world, tending to a superficial base to keep the already order in use, by moving away from the fundamental solution of all humanity: nature. Although Atwood does not want her works to be called science fiction, it is obvious that science fiction plays an introductory role and gives the novel a ground explaining all ‘why’ questions of the novel. However, Atwood is not unjust while claiming that her works are not science fiction because of the inevitable rapid change of 21st century world becoming addicted to technology, especially Internet. It is easily observed by the reader that what she fictionalises throughout the novel is quite close to possibility, and the world may witness in the near future what she creates in the novel as science fiction. Additionally, postmodernism serves to the novel as the answerer of ‘how’ questions: How the world embraces pluralities, how heterogeneous social order is needed, and how impossible to run the world by dichotomies of patriarchal social order anymore. And lastly, ecocriticism gives the answers of ‘why’ questions of the novel: Why humanity is in chaos, why humanity has organized the world according to its own needs as if there were no living creatures apart from humanity. Therefore, The Year of The Flood meets the reader as a compact embodiment of science fiction, postmodernism and ecocriticism not only with its theme, but also with its narrative techniques.


Sign in / Sign up

Export Citation Format

Share Document