20-07-2012, 11:58 AM
CYBERDYNE
CYBERDYNE.docx (Size: 92.88 KB / Downloads: 28)
INTRODUCTION
India is on the verge of a technology revolution and the driving force behind the same is the acceptance and adoption of Information and Communication Technology (ICT) and its benefits. This technology revolution may, however, fail to bring the desired and much needed result if we do not adopt a sound and country oriented e-governance policy. A sound e-governance policy presupposes the existence of a sound and secure e-governance base as well. The security and safety of various ICT platforms and projects in India must be considered on a priority basis before any e-governance base is made fully functional. This presupposes the adoption and use of security measures more particularly empowering judiciary and law enforcement manpower with the knowledge and use of cyber forensics and digital evidencing.
It is quite disheartening to put this fact across that India has been prone to Cybercrime for a long time now and the burgeoning effect of this is very devastating with as many as 76% of Indians having fallen victims to cybercrime according to a report – ‘Norton Cybercrime Report : The Human Impact’. It is even more overwhelming to know that globally the affected populace includes 65% of internet users and in that over three-quarters of Indian web surfers are victims of cyber attacks. This personifies India to feature in the not so elite panel of countries that are most affected by Cybercrimes. There are always many hassles that the security system in India faces as attackers easily find a way to sneak in and do their cyber crime act and benefit from the same. Hence the entire security system seems to be flawed. Numerous bank consumers end up losing money either directly or through pass-along costs from our financial institutions and banks. How? Cyber Criminals use their skills and gain access to accounts and steal small amounts making them undetected and go scot-free. Ironically the blame is reversed on the consumers stating “Most people don’t even report a cybercrime which is very critical”.
This identity-authentication system for the Web, aims to streamline government operations online and strike down one of the biggest hurdles that keeps people from trusting Internet shopping sites and other such services.ThisWebsite Tracker would reveal everything needed to be known about the site-visitors. The Number of people who visit the website, how many of them get back, how they find the website, referrers, which search engine they utilize to reach the site, what keywords they type in the search engine, their countries, IP addresses, browsers, operating systems and a host of other useful information.
The proposed system comprises of three modules:-
1. Home user module
2. Cyber cafe module
3. Record maintenance module
Objective
The objective of the proposed system is to provide report for all the pages on the site tracked. These reports would be easily understandable .
A better understanding of the visitors and their surfing pattern would be provided.
The records would help to identify which individuals visited certain Web sites and possibly conducted searches using certain terms. The records would be retained for as long as two years. Most Internet companies discard such records after a few weeks or months.
The functionality of various modules are as follows:-
Home user module : The objective of this module is to maintain the personal record of home internet users. The home users have to register themselves and would be allowed access to internet only after authentication.The authentication would require a key as allotted to the user.
Organisation module: The objective of this is to maintain the cyber cafe record . The user would be required to register himself once and provided a unique id. This id could be used to access internet in any cyber cafe after authentication which includes face recognition technique or finger print matching technique.
This cyber café module also comprises of a management system which could be used to maintain the general records of the customer , evaluate charges on the basis of usage.
Record maintenance module: The objective of this module is to extract information from database such as:
1. Identification of user.
2. Sites visited by user and time spent on each site.
3. e-mail exchanges.
Need of this system
A system is needed to retain the records not only for use in terrorism investigations but also in investigating other crimes like intellectual property theft and fraud. There are always many hassles that the security system in India faces as attackers easily find a way to sneak in and do their cyber crime act and benefit from the same. Hence the entire security system seems to be flawed. Numerous bank consumers end up losing money either directly or through pass-along costs from our financial institutions and banks. How? Cyber Criminals use their skills and gain access to accounts and steal small amounts making them undetected and go scot-free.
The move of the Police to bring in a rule that "Cyber Cafe Visitors" should produce ID cards has evoked wide spread negative responses from the community. We need to look at this development along with the public interest litigation that has been filed in Delhi where the Government has been requested by a member of the public to introduce a similar provision as a "law". It appears therefore that there are both supporters and opposers for the move.
The issue is a sensitive one and is fit for a "Big Debate". Some of the issues involved are,
1. What are the objectives of the regulation?
2. Has the Crime situation been so desperate as to call for a measure such as these?
3. How is the regulation expected to be implemented?
4. What are the dangers behind this regulation?
5. Is it a "Privacy" Issue? or "Freedom" Issue?..or a "Decency" Issue?
6. Can the local Police institute regulations which are subject matter of law making by the legislators?
Objectives of the Regulation.
The regulation for insisting on ID s is being justified by the reason that "Cyber Cafe" is a public place and if a Cyber Crime takes place using a computer in the Cyber Cafe, it would be difficult to identify the culprit and make anybody accountable.
In the case of a computer at home or at office, prima facie accountability for the crime rests with the owner of the computer. On the other hand, Cyber Cafe is an "Intermediary" provideing connectivity between the Internet consumer and the Internet and is therefore protected under Sec 79 of the ITA-2000. Hence there has to be some method by which the Police can prevent the Cyber cafe's being used by criminals.