A Study About Cyber Crimes And Cyber Law
In India
Krishna Kumar1
Department of Computer Science And Engineering,
Poornima Institute of Engineering & Technology,Jaipur
Dr. Praveen Gupta2
Professor, Department of Computer Science And Engineering,
Poornima Institute of Engineering & Technology,Jaipur
Abstract: Crime has been thriving around us since the more. These are known as Cyber crime. According to
beginning of the human civilization. Over the ages Techopedia, Cyber crime is defined as a crime in
weapons used to commit crime has grown more which a computer is the object of the crime (hacking,
sophisticated. With the introduction of computers and phishing, spamming) or is used as a tool to commit an
internet, the crime enterprise got new area to thrive in offense (child pornography, hate crimes). It is used as
the form of cyber crime. Criminals have always done a medium to access personal information, business
their best to use new technology to their advantages secrets, or uses internet for exploitative purpose. Cyber
and the rapid development of new digital technology crime in India increased at a rate of 300 percent from
and online markets has provided the criminal 2011 to 2014. There were 11,592 cyber crime related
entrepreneur with as much opportunity for innovation cases registered in India in 2015. We can define Cyber
as their legitimate counterpart. Law a legal system issued by the governing body to
tackle the increasing cyber crime and govern
cyberspace. Lack of awareness about such technology
Keywords: Cyber Laws in India, Cyber Crime, Cyber among people would end up in a severe damage on
Security, Hacking, Fraud, Finance, IT Acts finance, moral, emotional or ethical grounds. This
paper focuses on to find if people are aware about
cyber crimes and cyber laws. If yes, then up to what
1. INTRODUCTION extent. If no then what steps and measures can be taken
Internet has become an integral part of today’s life. by the government and NGOs to make people aware
Computers have made our life a lot easier. It is being about this issue. This paper aims at making people
used for various purpose such as banking, finance, know about various cyber crimes and cyber law in
education, government projects and purposes starting India.
from individual to large organizations. People uses
internet to get information related to banking, e-
commerce, weather forecasts, business deals, fitness 2. CYBER CRIME AND CYBER LAW
tips, entertainment etc. Upload, download and share
are daily routine of people now-a-days. It is estimated
that by 2020, there are going to be 666.4million 2.1 Classification of cyber crime
internet users in India (www.statista.com).
Technologies are developed for the better of the Cyber crime can be broadly classified into four major
mankind, but some people use them for negative categories which are mentioned below :-
purpose. Same has happened with internet and
computer technology. Many computer users are
utilizing computers for illegal purpose such as a) Cyber crime against Individual
hacking, banking fraud, spying, data stealing and many
These are the crimes carried against some individual.
Some of them are
2.2 Cyber Law in India
Email spoofing which means message appears to be
received from some different source other than actual Cyber Law is regulated by governing body in order to
source. put cyber space under check. The abuse of computers
are addressed by the Information Technology Act,
Spamming which are basically junk mails, multiple 2000 (IT Act, 2000). It is the primary law in India
copies of unsolicited emails. dealing with cyber crime. It is based on the United
Nations Model Law on Electronic Commerce
Cyber defamation uses cyber space to dilute 1996 (UNCITRAL Model) recommended by the
someone’s reputation General Assembly of United Nations by a resolution
Phishing is similar to masquerading in which sensitive dated 30 January 1997. The original Act contained 94
information such as password, account number, sections, divided in 13 chapters and 4 schedules. It
username, credit card number etc. are obtained by gave recognition to electronic records and digital
disguising as a trustworthy entity. signature. A major amendment was made in 2008. It
introduced section 66A for offensive messages, section
b) Cyber crime against property 69 to give authorities the power of "interception or
monitoring or decryption of any information through
Credit card fraud, Software piracy, Copyright
any computer resource".
infringement, Trademark violations, Theft of computer
source code and many more Some of the sections under IT Act, 2000 are mentioned
below:-
Section 65 – Tempering with computer source
c) Cybercrime against Organization
If someone intentionally destroy or make someone to
destroy/alter computer code used for computer
These are the cybercrime which are done against some
Penalty: - Someone, if is found guilty, could be jailed
sort of associations.
for 3 years or/and with fine up to Rs. 200,000
Unauthorized accessing of data and
changing/deleting them
Section 66 – Hacking
Denial of Service which is caused when internet if
flooded with continuous bogus request to crash the If someone intentionally cause loss or damage to the
server public or destroys any information residing inside
computer.
Virus attack in which a computer program is designed
to infect other computers. Penalty: - Someone, if is found guilty, could be jailed
for 3 years or/and with fine up to Rs. 500,000
Email Bombing in which server crashes due to lager
number of arriving mails.
Logic bomb is an event driven program which crashes Section 66B – Wrongfully receiving stolen
computers as soon as the required event occurs. computer or communication devices
Data diddling alters raw data just before it is being If someone retains a computer resource which is
processed. known to be stolen.
Penalty: - Someone, if is found guilty, could be jailed
for 3 years or/and with fine up to Rs. 100,000
d) Crime against society
Some of the cyber crimes done against society are
forgery, cyber terrorism, web jacking etc. Section 66C – Unauthorized use of someone else
password
If someone intentionally uses password, digital Publishing or transmitting of material containing
signature or other unique identification of another images of child in sexually explicit act, etc. in
person electronic form.
Penalty: - Someone, if is found guilty, could be jailed Penalty: - Someone, if is found guilty, could be jailed
for 3 years or/and with fine up to Rs. 100,000 for 5 years or/and with fine up to Rs. 10,00,000
Section 66D – Using computer resources to cheat Section 68 – Failure to comply with orders
If someone cheats somebody with the help of computer If someone intentionally fails to comply with orders
resources by personating them over communication
devices. Penalty: - Someone, if is found guilty, could be jailed
up to 3 years or/and with fine up to Rs. 2,00,000
Penalty: - Someone, if is found guilty, could be jailed
for 3 years or/and with fine up to Rs. 100,000
Section 66E – Violation of privacy Section 69– Failure/Refusal to decrypt data
If someone intentionally captures, publishes or If someone fails to provide support to decrypt some
transmits the image of private area of a person without message which governing body considers important to
their permission. maintain the unity, integrity, sovereignty or security of
India.
Penalty: - Someone, if is found guilty, could be jailed
for 3 years or/and with fine up to Rs. 200,000 Penalty: - Someone, if is found guilty, could be jailed
up to 7 years and possible fine
Section 66F – Cyber terrorism
Section 70 – Attempt to access a protected system
If someone intentionally uses computer resources to
threaten the unity, integrity, sovereignty or security of If someone makes attempt to access a protected
India. system.
Penalty: - Lifetime imprisonment Penalty: - Someone, if is found guilty, could be jailed
up to 10 years and possible fine
Section 67 – Publishing obscene information
Section 71 – Misrepresentation
Publishing or transmitting of material containing
sexually explicit act, etc. in electronic form. If someone obtain any license or digital signature
certificate using misrepresentation to the Controller or
Penalty: - Someone, if is found guilty, could be jailed the Certifying Authority
for 5 years or/and with fine up to Rs. 10,00,000
Penalty: - Someone, if found guilty, could be jailed up
to 3 years and/or fine up to Rs1,00,000
Section 67A – Publishing obscene information
Publishing or transmitting of image containing
sexually explicit act, etc. in electronic form.
3. CASE STUDY
Penalty: - Someone, if is found guilty, could be jailed
for 5 years or/and with fine up to Rs. 10,00,000. SIM Swap Fraud
In August 2018, two men were arrested from Navi
Mumbai who were involved in activity of money
Section 67B – Publishing obscene information transfer from bank accounts of many people by getting
their SIM card information through illegal means. It is considered as one of the biggest cyber attacks in
After getting information they were blocking their SIM the history which was carried around the world in May,
cards with fake documents after which they were 2017 including India. Its main target was enterprises
carrying out transactions. They were accused of and organizations. It infected computers running on
transferring 4 crores Indian Rupees. They even attempt older version of Microsoft OS such as XP. The
to hack a couple of companies. ransomware locked the user’s device and prevented
them from accessing data and software until a certain
ransom was paid which was $300in cryptocurrencies
Cyber Attack on Cosmos Bank like Bitcoin as per some reports.
Nearly 94 crores Indian rupees were stolen during a
cyber attack which was carried in August 2018 on BSNL Malware attack
Cosmos’s Bank Pune Branch. The money was
transferred to Hong Kong situated bank. Details of BSNL broadband network in Karnataka sector was
debit card holders were obtained by hacking the ATM greatly affected by a virus which affected 60,000
server of the bank. The centralized banking solution of modems with default “admin-admin”
Cosmos bank was not attacked by the attackers. The username/password combination. The infected
balance and the accounts statistics were not changed modems were not able to connect to internet. After
and the account of holder was having no effect. The this, BSNL had issued a notice for the user to replace
switching system which acts as interacting module their default username and password with a new one.
between the payments gateways and the banks
centralized solution was attacked. Numerous wrong
message were raised as malware attacked the Zomato Hack
switching system. 14000 transactions were created
with over 450 cards across 28 countries. It was first One of the largest restaurant aggregation in India,
attack in India on switching system which broke Zomato was hacked and some of its user’s accounts
communication between payment gateways and banks. were being sold on dark web. Users were lucky that
they didn’t faced any financial loss since Zomato
stores users’ information at a separate location.
Website Hacked
Between the months of April 2017 and January 2018,
over 22000 websites were hacked as per the report by
the Indian Computer Emergency Response Team. The 4. PRECAUTIONS AND
attacks were carried out in order to get information SUGGESTIONS
about the services and details of users in their network.
Following are the precautions people should follow to
safeguard themselves from potential cyber attacks.
Blue Whale Challenge
1. Install, use and regularly update antivirus and
The Blue Whale game was an online “suicidal game” antispyware software.
targeted at teenagers and had 50 tasks over 50 days 2. Use a firewall for internet connection.
with committing suicide as the final task on the list. 3. Download and install software updates for
The game caused numerous suicide around the world your operating system and application as they
including some cases in India. become available.
Some of the task were such as “Wake up in the middle 4. Always maintain backups of your data.
of the night” or “watch a scary movie”. As the day 5. Make your Wi-Fi networks as secure as
passes the game grew more and more sinister and possible.
included tasks such as “cut a whale into your arm”, 6. Regularly change passwords.
“stand on the edge of a building” 7. Don’t share your account information with
anyone.
8. Personal and private information on social
media should be kept locked.
WannaCry Ransomware
9. Be updates on major security breaches. [5] Anuranjan Misra,” A comprehensive legal framework of Indian Cyber
Laws”, SPC ERA International Journal of Law and Governance Vol.1,
10. Always use two-factor authentication. No.1 2013
11. Have different password for each accounts.
[6] Jigar Shah,” A Study of Awareness About Cyber Laws for Indian
12. Software should be downloaded from Youth”, International Journal of Trend in Scientific Research and
authenticated sites. Development, Volume 1(1)
13. Awareness should be spread on topics such as [7] R. M. Kamble, ” CYBER LAW AND INFORMATION
- Ethical use of internet TECHNOLOGY”, International Journal of Scientific & Engineering
- Internet security and its importance Research, Volume 4, Issue 5, May-2013 789 ISSN 2229-5518
- Cyber law [8] Animesh Sarmah, Roshmi Sarmah , Amlan Jyoti Baruah,” A brief study
- Technology and their drawbacks on Cyber Crime and Cyber Law’s of India”, International Research Journal
of Engineering and Technology (IRJET)
- Requirements to protect data from being
stolen
14. Government should collaborate with ethical
hackers to bring out more practical solution for
cyber attack.
15. More awareness campaigns should be carried
out by governments and NGOs to spread
awareness
5. CONCLUSION
Over the ages as the technology has developed the
crimes committed using them has also increased
significantly. The ways for committing crime has
become more and more sophisticated. Cyber crime has
been causing more and more personal and financial as
well as political losses. So protection against cyber
crime is important aspect which is needed to be
covered more practically and effectively. IT act, 2000
is an important step taken by the government to
regulate the cyberspace. Awareness program should
also be conducted. Main purpose of this paper is to
spread the content of cyber crime and cyber law to
people.
REFERENCES
[1] Ritu Sharma, Yogesh Chaba, Yudhvir Singh, “Analysis in Security
Protocol in Wireless ensor Network”, Int. J. Advanced Networking and
Applications, Volume: 02, Issue: 03, Pages: 707-713 (2010)
[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,
“Wireless sensor networks: A survey”, Computer Networks Journal,
Elsevier Science, Vol. 38, No. 4, pp 393– 422, March 2002.
[3] Umesh Sehgal & Dinesh Kumar,” WIRELESS NETWORK
SECURITY THREATS”, International Journal of Information Technology
and Knowledge Management January June 2009, Volume 2, No. 1, pp. 181-
183
[4] Anuraj Singh,” Studies Report on Cyber Law in India & Cybercrime
Security”, International Journal of Innovative Research in Computer and
Communication Engineering, Vol. 5, Issue 6, June 2017