15-09-2014, 04:16 PM
CYBER CRIMES
CYBER CRIMES.doc (Size: 269.5 KB / Downloads: 28)
ABSTRACT
In the current era of online processing, maximum of the information is online and prone to cyber threats. There are a huge number of cyber threats and their behavior is difficult to early understanding hence difficult to restrict in the early phases of the cyber-attacks. Cyber-attacks may have some motivation behind it or may be processed unknowingly. The attacks those are processed knowingly can be considered as the cyber-crime and they have serious impacts over the society in the form of economical disrupt, psychological disorder, threat to National defense etc. Restriction of cyber-crimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society. Therefore, the current manuscript provides the understanding of cyber-crimes and their impacts over society with the future trends of cyber-crimes.
So we should focus on such threats that might corrupt our data and cause serious harms to our computer devices and firm.
Introducation Of Cyber Crime
In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government with various services.
1) However it is through the same cyber networks which intrude and attack our privacy, economy, social life in a way which is harmful.
2) This raises some legal issues and concerns.
3) This paper presents important issues on the Security, Prevention, and Detection of Cyber Crime. The paper consists of four parts in Romanic Numbers. In Part I, the attempt here is simply to familiarize the reader with a careful understanding of the Cyber Crime. The author will trace back the meaning, history, and types of Cyber Crimes In Part II, one has to know the concept of Cyber Security; this will include meaning, background, types if any and important of Cyber Security.Part III will explain on Cyber Prevention and Detection the same will include meaning and history, Cyber Prevention and Detection Methodologies and Legal Instruments
Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.
Perhaps the most prominent form of cybercrime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming. Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to "steal" another person's identity. For this reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information.
Because cybercrime covers such a broad scope of criminal activity, the examples above are only a few of the thousands of crimes that are considered cybercrimes. While computers and the Internet have made our lives easier in many ways, it is unfortunate that people also use these technologies to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware blocking software and being carefulwhere you enter your personal information.
History of Cyber Crime
When computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems. Hackers even competed against one another to win the tag of the best hacker. As a result, many networks were affected; right from the military to commercial organizations. Initially, these hacking attempts were brushed off as mere nuisance as they did not pose a long-term threat. However, with malicious software becoming ubiquitous during the same period, hacking started making networks and systems slow. As hackers became more skillful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others.
How To Takel Cyber Crime
It has been seen that most cyber criminals have a loose network wherein they collaborate and cooperate with one another. Unlike the real world, these criminals do not fight one another for supremacy or control. Instead they work together to improve their skills and even help out each other with new opportunities. Hence, the usual methods of fighting crime cannot be used against cyber criminals. While law enforcement agencies are trying to keep pace with cyber criminals, it is proving to be a Herculean task. This is primarily because the methods used by cyber criminals and technology keeps changing too quickly for law enforcement agencies to be effective. That is why commercial institutions and government organizations need to look at other methods of safeguarding themselves.
The best way to go about is using the solutions provided by Cross-Domain Solutions. When organizations use cross domain cyber security solutions, they can ensure that exchange of information adheres to security protocols. The solution allows organizations to use a unified system comprising of software and hardware that authenticates both manual and automatic transfer and access of information when it takes places between different security classification levels. This allows seamless sharing and access of information within a specific security classification, but cannot be intercepted by or advertently revealed to user who is not part of the security classification. This helps to keep the network and the systems using the network safe.
Cross Domain Solution offers a way to keep all information confidential by using safe and secure domains that cannot be tracked or accessed. This security solution can be used by commercial and governmental organization to ensure an impenetrable network while still making sure that users can get access to the required information easily.
ACTS DEALING WITH CYBER CRIMES
“Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences
ELECTRONIC EVIDENCE GUIDE
Means of Electronic Evidence
Electronic evidence is information and data of investigative value that is stored on or transmitted by an electronic device. As such, electronic evidence is latent evidence in the same sense that fingerprints or DNA (deoxyribonucleic acid) evidence are latent. In its natural state, we cannot “see” what is contained in the physical object that holds our evidence. Equipment and software are required to make the evidence visible.
Electronic evidence is information and data of investigative value that is stored on or transmitted by an electronic device. Such evidence is acquired when data or physical items are collected and stored for examination purposes.
ADAPTIVE ALGORITHMS
The technology changes so fast, but is security catching up? Will security ever drew level? The speed at which technology is moving has left massive gaps in safety. Along with the rapid popularity of the internet, cyber crime rate also got rapidly high. With the rapid development of the internet, the network structure has becomes larger and more complicated and attacking methods are more sophisticated as well. Cyber security is the major concern of every organization. Indeed banks, corporations, insurance companies, casinos etc are increasingly mining data about their employees in view of detecting cyber crime. The main objective of this paper is to construct an efficient cyber crime detection system which is adaptive to the behavior changes by combining the data mining techniques. The proliferation, ubiquity and increasing power of computer technology has increased data collection storage and manipulation .As data sets have grown in size and complexity, direct hands on data analysis has increasingly been augmented with indirect, automatic data processing. This is being aided by data mining. Data mining is the process of applying various methods such as clustering, decision tree etc. to data with the intention of uncovering hidden patterns. A primary reason for using data mining is to assist in the analysis of collections of observations of behavior. Data mining proposes several classification techniques which can be effectively applied to detect fraudulent transactions. The main objective of this is to develop a security application for detection of cyber crime. The proposed system is a two stage cyber crime detection system which is based on the analysis of the user data in first stage and in second stage detects the false alarm.
INVESTIGATION METHODS
The globalisation of economic, political and social activities, supported by an increasing use of the Internet and other information and communication technologies, raises a wide range of questions regarding privacy and the protection of personal data. Countries developing cybercrime legislation therefore need to be familiar with relevant privacy and data protection issues.
The question is, what measures can be taken by governmental and police authorities to adapt to and restrain this development in a way that existing privacy rights are preserved? To what extent are authorities free to use personal data and from what sources? There is publicly available data from the Internet and other public sources, but also data acquired in the execution of public tasks, often available in governmental databases. Are criminal investigators allowed to use the data in the same way other governmental authorities use these sources?
Because of the international nature of crimes, international co-ordinated investigations and the use of personal data must be made possible, but with a sharp eye on their limitations in the interest of human rights and specifically the protection of the privacy of individuals and taking into account the evolution of data availability.
INVESTIGATION METHODS
The globalisation of economic, political and social activities, supported by an increasing use of the Internet and other information and communication technologies, raises a wide range of questions regarding privacy and the protection of personal data. Countries developing cybercrime legislation therefore need to be familiar with relevant privacy and data protection issues.
The question is, what measures can be taken by governmental and police authorities to adapt to and restrain this development in a way that existing privacy rights are preserved? To what extent are authorities free to use personal data and from what sources? There is publicly available data from the Internet and other public sources, but also data acquired in the execution of public tasks, often available in governmental databases. Are criminal investigators allowed to use the data in the same way other governmental authorities use these sources?
Because of the international nature of crimes, international co-ordinated investigations and the use of personal data must be made possible, but with a sharp eye on their limitations in the interest of human rights and specifically the protection of the privacy of individuals and taking into account the evolution of data availability.
CONCLUSION
Cyber detection is important in today‘s internet environment. The combination of facts such as the extensive growth of internet, the vast financial possibilities opening up in electronic trade, and the lack of truly secure systems make it an important field of research. An effective online cyber crime detection system should be able to discover both known and new attacks as early as possible. The detection process should be self-adjustable to allow the system to deal with the constantly changing nature of online attacks. The hybrid of the anomaly and misuse detection models can improve cyber crime detection and securely permit genuine transaction. This research uses a scalable algorithm for constructing decision tree incrementally for detecting the cyber crime where the training data set changes dynamically. Bootstrapping constructs several levels of the tree in only one scan over the training database, resulting in high performance gain than the existing decision tree algorithms. The accuracy of the proposed work is 94.67 % and it efficiently detects the false rate anomalies. This research focused on user level anomaly and misuse detection. In the future to achieve highly secure transaction we will extend this system for distributed level cyber crime detection also by profiling the system behavior.
To sum up, though a crime-free society is Utopian and exists only in dreamland, it should be constant endeavour of rules to keep the crimes lowest. Especially in a society that is dependent more and more on technology, crime based on electronic offences are bound to increase and the law makers have to go the extra mile compared to the fraudsters, to keep them at bay. Technology is always a double-edged sword and can be used for both the purposes – good or bad. Steganography, Trojan Horse, Scavenging (and even DoS or DDoS) are all technologies and per se not crimes, but falling into the wrong hands with a criminal intent who are out to capitalize them or misuse them, they come into the gamut of cyber crime and become punishable offences .
Society as on today is happening more and more dependent upon technology and crime based on electronic offences are bound to increase. Endeavor of law making machinery of the nation should be in accordance with mile compared to the fraudsters, to keep the crimes lowest. Hence, it should be the persistent efforts of rulers and law makers to ensure that governing laws of technology contains every aspect and issues of cyber crime and further grow in continuous and healthy manner to keep constant vigil and check over the related crimes.