Cyber Security Issues-GS-3

   Cybercrimes have risen 4-fold in 3 years


Introduction:

The number of cybercrime cases registered in India has risen by 350 per cent in the three-year period from 2011 to 2014, according to a joint study by PwC and Assocham.

In the past, attacks have been mostly initiated from countries such as the U.S., Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE, according to the study titled ‘Protecting Interconnected Systems in the Cyber Era.’ However, with the growing adoption of the Internet and smart-phones, India has emerged “as one of the favourite countries among cyber criminals.”

About Protecting Interconnected Systems in the Cyber Era Report

Some of the cyber security gaps in operational technology (OT) and consumer technology (CT) are as follows:

cyber-gaps

cyber-gaps-1

 cyber-gaps-2

 cyber-gaps-3

 


Types of Cyber Crimes

When any crime is committed over the Internet it is referred to as a cyber-crime. There are many types of cyber-crimes and the most common ones are explained below:

Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.

Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading.

Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.

Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cybercrime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.

Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.

Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.


Cyber security coordination centre to be set up

Introduction

With an aim to “fully secure the country’s cyber space”, the government has initiated the process to set up a National Cyber Security Coordination Centre (NCCC).

About NCCC

  1. NCCC will ensure near real time threat assessment and situational awareness that will help in analysis and generation of timely alerts and periodic reports
  2. The NCCC will collect, integrate and scan [Internet] traffic data from different gateway routers of major ISPs at a centralised location for analysis, international gateway traffic and domestic traffic will be aggregated separately
  3. NCCC will not target individuals but rather will seek to access threats to India’s cyber infrastructure as a whole.
  4. The new system will look for unusual data flow to identify and access cyber threats and not individual data
  5. NCCC will reportedly rely heavily on private sector cooperation
  6. NCCC “would be in virtual contact with the control room of all ISPs [Internet Service Providers] to scan traffic within the country, flowing at the point of entry and exit, including international gateway.”

“Massive training programme” would be undertaken to train the police officers and personnel at police stations across the country.

Emphasising on the government’s push for higher localisation of digital content, Prasad said that nearly $80 billion worth of electronic items are currently consumed in India and by 2020, and was likely to rise to $400 billion, primarily on back of mobile penetration.

 

Leave a Reply