Loading...

Articles on Cyber Security

Impact of Cyber Laws in India: Cyber Law is a term that encapsulates the legal issues related to use of Communicative, Transactional, and Distributive aspects of networked information Devices and Technologies. It is less a distinct field of law in the way that property or contracts are, as it is a domain covering many areas of law and regulation. Some leading topics include Intellectual Property, Privacy, Freedom of Expression, and Jurisdiction. In Indian law, Cyber Crime has to be voluntary and willful, an act or omission that adversely affects a person or property. The IT Act provides the backbone for E-Commerce and India’s approach has been to look at E-Governance and E-Commerce primarily from the promotional aspects looking at the vast opportunities and the need to sensitize the population to the possibilities of the information age. There is the need to take in to consideration the security aspects.

Let us know Cyber Forensics & Cyber Crime: From the Editor’s Desk
Computer Forensics is the application of scientifically proven methods to gather, process, interpret, and to use digital evidence to provide a conclusive description of Cyber Crime activities.  Cyber Forensics also includes the act of making digital data suitable for inclusion into a criminal investigation.

Cyber Crime encompasses a broad range: From the Editor’s Desk
Cyber Crime encompasses a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories;

  • Crimes that target computer networks or devices directly;
  • Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

 Examples of crimes that primarily target computer networks or devices would include,
 

Spam:
Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying degrees. As applied to email, specific anti-spam laws are relatively new, however limits on unsolicited electronic communications have existed in some forms for some time.

A Young, inexperienced, and possessing Cyber Criminal/ Cracker with vast quantities of time to waste, to get into just one more system. However, there is a far more dangerous type of system cracker out there. One who knows the ins and outs of the latest security auditing and cracking tools, who can modify them for specific attacks, and who can write his/her own programs. One who not only reads about the latest security holes, but also personally discovers bugs and vulnerabilities. A deadly creature that can both strike poisonously and hide its tracks without a whisper or hint of a trail.

Achievements

Achievements:

  • Developed “SEDULITY OPERATING SYSTEM” on LINUX Platform along with different flavors.

Let’s consider the following scenario. A very large public utility with several nuclear power plants experiences a minor glitch with no real consequences. One evening, a hacker in the employ of an anti-nuclear activist group, using information provided by a disgruntled employee, gains access to the utility’s network, searches file servers until he finds one at the nuclear plant, and, after compromising it, locates copies of several of the lessons-learned memos. The Hacker delivers the memos to his employers who doctor them up a bit and deliver them with a strongly worded press release to a local reporter who has made a life-long career out of bashing the nuclear industry. Imagine the potential public relations consequences.

Social Engineering is the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action. Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. The hacker’s goal is to obtain information that will allow him/ her to gain unauthorized access to a valued system and the information that resides on that system.

Dear Readers, in this edition I am trying to tell you something about ‘Information Security & its challenges’ which is very important to know in this Computer Era and I am sure that it will help you all in your relative fields. Over the past 10 years the Internet has become very important source in the India. People of all ages use it on a regular basis, and it has become one of the driving forces of the economy. From banking to shopping to communication, it has radically changed the way many people go about their daily lives. The increased availability of broadband connections allows more people to experience all that the Internet has to offer.

Internet plays a very important role of Electronic communication which is done through electronic media like cell phones, computers, I-pods etc. However, to secure from the Cyber threats is a Challenging part. We hear almost daily that someone lost money or was cheated due to misuse of personal information on internet or hacking in the email account or stealing credit cards, etc. These unfortunate events can be easily and certainly avoided if we follow simple rules of internet, while transacting or interacting through electronic media.