|Ms. Palak Patel | |Lecturer, | |BCA Dept-SK Patel,BPCCS, | |Gandhinagar-382023, India. |
Large-scale commercial, industrial and financial operations are becoming ever more interdependent, and ever more dependent on IT. At the same time, the rapidly growing interconnectivity of IT systems, and the convergence of their technology towards industry-standard hardware and software components and sub-systems, renders these IT systems increasingly vulnerable to malicious attack. This paper is aimed particularly at readers concerned with major systems employed in medium to large commercial or industrial enterprises. It examines the nature and significance of the various potential attacks, and surveys the defence options available. It concludes that IT owners need to think of the threat in more global terms, and to give a new focus and priority too their defence. Prompt action can ensure a major improvement in IT resilience at a modest marginal cost, both in terms of finance and in terms of normal IT operation. The term ‘cyber crime’ is a misnomer. This term has nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state. Before evaluating the concept of cyber crime it is obvious that the concept of conventional crime be discussed and the points of similarity and deviance between both these forms may be discussed. The increased dependence on IT and communication technology for dynamic and fast business solutions has its own side effect. The effect of digital information technologies upon our world certainly poses endless benefits for the citizens of our growing global village. The dark side of it, not surprisingly, is the misuse of Information Technology for criminal activities. Cyber Crimes are a new genus of crimes, which use computers and networks for criminal activities. Cyber Crimes are any illegal activities committed using computer. Target of the criminal activity can be a computer, network or operations. In another sense, criminal activity can be against a person, an organization or a government. A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”(3) The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.
The difference between traditional crimes and cyber crimes is that cyber crimes can be transactional in nature which limits the law enforcement agencies ability to catch the culprit and put them behind the bars. Anybody who is having a computer and internet connection can inflict damage to a remote system or network and can remain anonymous. The anonymity on the net is a real problem faced by law enforcement agencies. Another issue is the jurisdiction in cyber crimes. A crime in one country may not be treated as a crime...