INTRODUCTION INFORMATION TECHNOLOGY is one of the fastest growing technologies all over the world got evolved out of the marriage between two versatile technologies, namely computer and communication technologies. Information technologies refers to the creation, gathering, processing, storage, retrieval, presentation and dissemination of information and include the processes and devices that enable all this to be done.
The modern thief can steal more with a computer than with a gun. Information control and protection have become a key factor to establish supremacy in the world. The military installation, power plants, air traffic control centre, banks and tele communication network have become the most sensitive targets, not through physical attacks but through cyber attacks. In cyber warfare or information warfare, the enemy’s computer could blocked by introducing a computer virus or by firing electromagnetic burst to disrupt their tactical operation or display wrong information technology has pervaded into lives of every human being has greatly influenced his action.Traditionally, the information was being stored in the form of paper-based documents.
The highly vulnerable document were kept at a safe places, which occupied a lot of space, keeping and analysis of the voluminous set of documents has been a time consuming job and a criminal wast of precious record of resources. With the advancement of technology, more and more information is now being stored in the electronic format on computer media. The quantum of data that can be stored in a computer has grown tremendously in the past few years. In spite of this cost of storage media has also been drastically reduces. Such changes in the manner of storing data have created paperless offices, which are more efficient in discharging their basic function rather than concentrating on mundane. This made human lifestyle and attitude totally dependent task on technology. The master as well as the slave of the slaves.
Computer not only facilitates smooth, efficient and quick functioning of an organization but also store vital information whose true value can not be estimated. Computers have proliferated into the economic sectors and social sectors.The internationalization and commercialization of computer networking gave birth to newer issues that were legal, social and commercial.
As is the case with all the other technologies the information technology also has certain vulnerabilities, which are being exploited by unscrupulous element in the society for disrupting peace. 1. MEANING OF CYBER CRIME Cyber as a prefix, firt appeared in the word cybernetics in 1948, which was coined by Nobert Weiner in his Weiner derived it from the greek word for steersman and the idea of control is central to it. The meaning of cyber has evoved over the past decade.”Cyberspace” was originally used for electronic space.
The brain and senses were directly linked with the world of computer and communication and so could experience it as an actual landscape. Later on it was used for intangible electronic domain. Now it is being used, as a loose synonym for electronic cyberspace, therefore is the place where two people meet, not physically but virtually and communicate with each other electronically.We are in the process of learning how to live in this newly available spae. During this leaving process, we commit blunders and go about setting it right. The cyberspace is also afflicted with the same ills and blessed with all the good things of life as in the real world what used to take hours or even months earlieris done now in seconds through the use of internet, emails, fax using fiber optics and satellite communication. The information processing speed has increased to the levels, which are unimaginable a few decades ago. Most of the government in the world are aware of the nature and potential of electronic networks.
No longer is any electronic territory static and almost any territory on the electronic frontier is up for grabs.In the cyber world, the world has become a global village. Physical distance and geographical boundaries is no longer a barrier for communication connectivity and hence the information technology also eliminated the barrier of time, distance and resources which hinder business transactions. The number of people using the computer has gone up and almost traditional terms are being perfined with the vowel e to indicate electronics. The electronic marketplace refers to the emerging market economy where producer, intermediaries and consumer interact electronically or digitally. It is a virtual representive of the traditional physical market, but with a wider reach.
The economic activities undertaken by this electronics marketplace collectively represent the digital economy. Electronic commerce is broadly concerned with the electronic marketplace, wherein all the products are available on line and all the transaction are made digitally, except the physical delivery of good. E- commerce attacks have arisen and affecting credit card, smart card, bank account, denial of service attacks, extortion, organized crime, identify theft etc. 2. TRADITIONAL CRIME GO HI-TECH Crimes have been perpetrated right from the ancient days.
History tells us about various laws and courts that were framed by different rules and the way punishment were awarded of the offenders. Some of the investigation has been righteous while others have been inhuman cruel. Before the advent of computer crimes, the law enforcement agencies bound by some ground rules.
There were established procedure for investigation and prosecution of all types of crime.In case of traditional crime large number of physical evidence in generally available at the scene of crime. Collection of such physical evidence material needed a lot of common sense and a little technical knowledge. Forensic assistance could also be provided easily since the labrotary examination procedures are fully established.For example, in case of bank robbery, wherein a cash locker have been broken and the cash is stolen, the bank premises become the crime scene for the investigation where the physical clues are available forensic analysis. The police personally, under whose jurisdiction bank falls, would carry out investigation. In case of investigating officer feels that the culprit could have escaped from the area under their jurisdiction, this seek the assistant from other police stations.
The tools used in the bank robbery would generally be crude or of little sophistication. The maximum amount of cash the burglar could have stolen would be what was available at that time in the bank and their ability to carry the booty. As a consequence of this, the bank no doubt in cures the some loss, but it does not go bankrupt.
Bank would no doubt, quickly recover and continue with its normal operations. It clearly shows that in case of traditional crimes, the scenes of crime is confirmed, the level of sophistication involved is much level, and the impact and intensity of the crime is not sever.Information technology provides an opportunity to a criminal to commit traditional crimes like cheating, fraud, theft, embezzlement of bank deposit, credit cards, fraud , industry and political espionage etc.
at the same time, it also helps in perpetrating non traditional information technology specific attacks, against the security of critical infrastructure like tele communication, banking or emergencies services. Such as crime may be committed through computer network across the national border, affecting not mere individual, they may instead result in compromising the security and economic of the nation. Whether it is a local area network(LAN) wide area network (WAN) or the world wide web (www) they are fertile ground for mushrooming of criminal ded that would pose a serious threat to public welfare, morality and justice delivery system of the country. Nation at war would increasing depend on the crippling enemy through sabotage of the information system.
Various surveys indicate that the attacks on the computer are going to increase manifold through tele communication network, theft of tele communications services and the use of computer to commit crime of data manipulation. 3. DIGITAL FORMS OF CRIME From the law enforcement perspective, the internet is simply a new medium used anyone to commit offence.
Cyber crimes are”crimes directed at a computer or a computer system”.For example, the fraudsters perform various activities such as impersonation, theft and credit information from digital communication network, fraudulent electronic banking, electronic gambling, lottery frauds and frauds in commercial using email etc. on the net similar to their in the physical world, and may also include tele communication and tele marketing fraud deceptive advertising, and security frauds. A fraudster may set up a site on world wide web (www) and claim that the site belongs to a reputed organisation. Victims are induced to reveal valuable information or part with money by way of credit card payment. The case of eurp lottery of Vijaywada in an example.
The opportunities for computer abuse are directly related to the growth of computer technology, and it widespread used for increasing no. of application. The organization are becoming more dependent on information technology and therefore, a large no. of people has accessed to computer. In each succeeding generation, the child are becoming more and more computer literate age. More personal data and proprietry information are being stored in the computer. Wide area network, especially the internet, continue rapidly.
Consequently with the connection of each new segment to the internet, opportunities to the criminals grow, and the job opf hacker hunting becomes more complex. 4. BROADCASTING AS CYBER THREAT Cyber threats to financial institutions, electric utilities, broadband providers, government agencies, Hollywood studios and even emerging Web-connected household appliances get a lot of ink. But one major potential threat vector, television and radio broadcasting, doesn’t conjure up the kind of concerns that these other avenues of cyber intrusion do.
That’s changing, though, in the wake of major cyber attack that took place last April when French broadcaster TV5Monde was hijacked, with eleven of its channels going dark and its social media outlets commandeered to display pro-ISIS messages. Although a group called the CyberCaliphate claimed credit for the damaging breach, the French government has lately cast some blame on Russian hackers who, the government suggests, was using the CyberCaliphate as a false flag. Whatever the case may be, the TV5Monde attack was a wake-up call to the broadcasting sector that it too is vulnerable to the kinds of disruptive cyber intrusions and attacks that affect other critical aspects of society. That’s why top broadcasting publication TVNewsCheck and I have joined hands to offer the first of its kind webinar, “Cybersecurity for Broadcasters: Ten Steps You Need to Take Right Now,” aimed at helping broadcasters come up to speed on how to protect their assets from unwanted and potentially damaging cyber intrusions and how to become more resilient in the face of what will undoubtedly be more future cyber attacks. 5. CYBER CRIMES AND TELE COMMUNICATION As the world becomes more dependent on technology and interconnected networks it changes the dynamic of how the world works.
Before extensive computer systems and digital networks both public and private enterprise alike kept much of their confidential information in physical form such as in documents filed in cabinets. It was during this time that organizations and government institutions had to concern themselves primarily with physical security and internal classification schemes to make sure that this information didn’t become available to those who didn’t have the rights and who could also cause substantial harm with the information in question.As our modern economy continues to shift towards a post-industrial economic base we begin to put much more emphasis on information and the providing of services. Much of this shift has lead to the increased dependency on digital systems to both store and process very large amounts of information.
This shift has given rise to extremely large and important databases and storage area networks. Through the use of these technologies it allows an organization to store and process amounts of information that would have been seen as impractical just twenty years ago. This availability of information allows an enterprise to be more efficient and profitable because business analysis and intelligence personnel can now use tools and their own developed skills to pour quickly through information stored in storage area networks and data warehouses in order to find market trends and possible areas of future profitability. The public sectors uses technology in just as important, and possibly more important, ways compared to the private industry. Federal and state databases that contain information on criminal DNA, fingerprints, open cases, evidence, and criminal histories allow investigators to 5 pour through large amounts of information quickly and efficiently in order to solve their cases as soon as they can.All of this information from both private and public industry is a very attractive target for attackers.
Because of the impressive amount of information that can be taken without even having to be physically on the scene makes for a target that is too enticing for some to ignore. The rate at which information systems are attacked and compromised skyrockets every year according to studies from both private interest groups such as the SANS Institute and through government agencies such as the FBI and their crime statistics.