CYBER CRIME-Definition, challenges and the cost

advertisement
International Journal of Computer & Mathematical Sciences
IJCMS
ISSN 2347 – 8527
Volume 3, Issue 2
April 2014
CYBER CRIME-Definition, challenges
and the cost
P.Sai Sheela, B-tech(CSE), Dronacharya College of Engineering
Nitika Sharma, B-tech(CSE), Dronacharya College of Engineering
Bhanu Bharadwaj, Asst. Prof, Donacharya College of engineering.
Abstract:
This paper provides an overview of the
growing cyber crime problem. The paper
attempts to reviews the definitions of cyber
crime and the challenges faced. The paper
further attempts to answer some major
questions: Where’s the risk? Who’s been
hacked? What could happen? It then
analyses the Costs of Cybercrime. Finally this
paper concludes with some suggestions for
areas of future research.
1. Introduction:
Cyber world or the virtual parallel world has
become an integral part of our existence. The
internet boom that one has experienced over
the past decade or so has actually changed or
‘destroyed’ the old ways of communication.
Roderic Broadhurst describes the rapidly
developing computer connectivity, in his work
“Developments in the global law enforcement
of
cyber-crime”,
as
information
superhighways.[1]
These
information
superhighways have made communication
fast, easier and staple for every person aiming
to achieve high economic business targets and
to expand business in general. But with easy
and fast digital technologies comes the risks
of dealing with vulnerabilities of the system.
34
Sai, Nitika, Bhanu
The important aspect of the vulnerabilities is
that these are not some localised events but
they are prevalent as national, regional and
international phenomena often putting
national security in a compromising position.
So the best ways possible of putting these
securities at bay is to first analyse what
actually we mean by cybercrime and
examining the challenges.
1.1. Definition:
Although much is being said about
cybercrime, there is not unanimous
agreement on a single definition of the
concept. However, the following definition,
used by the Canadian Police College, is gaining
acceptance: cybercrime is “a criminal offence
involving a computer as the object of the
crime, or the tool used to commit a material
component of the offence.” [2]
The Council of Europe’s Cybercrime Treaty
uses the term “Cybercrime” to refer to
offences ranging from criminal activity against
data to content and copyright infringement as
documented in by S.Gordon and R.Ford in
their work titled “On the definition and
classification of cybercrime”.[3]
International Journal of Computer & Mathematical Sciences
IJCMS
ISSN 2347 – 8527
Volume 3, Issue 2
April 2014
The United Nations Manual on the Prevention
and Control of Computer Related Crime
includes fraud, forgery, and unauthorized
access in its cybercrime definition.
Other forms of fraud may be facilitated using
computer systems, including bank fraud,
identity theft, extortion, and theft of classified
information.”
We would further like to elaborate the first
definition that says that cyber crime involves
computers as a part of crime. Exactly what
kind of crimes could be executed using a
computer?
1.1.2. Unauthorised access as defined under
the Computer Fraud and Abuse Act (CFAA),
unauthorized access (to stored wire or
electronic communications) means:

intentionally
accesses
without
authorization a facility through which an
electronic communication service is provided;
or

intentionally exceeds an authorization
to access that facility; and thereby obtains,
alters, or prevents authorized access to a wire
or electronic communication while it is in
electronic storage in such system. [6]
1.1.3. Child pornography as defined by
Wikipedia is :
The work “On the definition and classification
of cybercrime” provides us with some
leads.[4] It includes frauds, unauthorised
access, child pornography, cyber stalking etc.
We would explore these further.
1.1.1.




Frauds include a wide variety of
crimes and Wikipedia defines
frauds as “Computer fraud is any
dishonest misrepresentation of
fact intended to let another to do
or refrain from doing something
which causes loss. In this context,
the fraud will result in obtaining a
benefit by:
Altering in an unauthorized way. This
requires little technical expertise and
is not an uncommon form of theft by
employees altering the data before
entry or entering false data, or by
entering unauthorized instructions or
using unauthorized processes;
Altering, destroying, suppressing, or
stealing output, usually to conceal
unauthorized transactions: this is
difficult to detect;
Altering or deleting stored data;
Altering or misusing existing system
tools or software packages, or altering
or writing code for fraudulent
purposes.[5]
35
Sai, Nitika, Bhanu
“Child pornography is pornography that
involves a child. It may be simulated child
pornography or produced with the direct
involvement of the child (also known as child
sexual abuse images). Abuse of the child
occurs during the sexual acts which are
recorded in the production of child
pornography. Child pornography may use a
variety of media, including writings,
magazines, photos, sculpture, drawing,
cartoon, painting animation, sound recording,
film, video, and video games.”[7]
1.1.4. Cyber stalking as defined by
Wikipedia is as follows:
“Cyber stalking is the use of the Internet or
other electronic means to stalk or harass an
individual, a group of individuals, or an
organization. It may include the making of
false accusations or statements of fact (as in
defamation), monitoring, making threats,
International Journal of Computer & Mathematical Sciences
IJCMS
ISSN 2347 – 8527
Volume 3, Issue 2
April 2014
identity theft, damage to data or equipment,
the solicitation of minors for sex, or gathering
information that may be used to harass.”[8]
The above mentioned cybercrimes are just a
few examples, while many other such
activities take place. So understanding what
cyber crime is very important first step in
order to prevent such ills from taking over the
goods.
1.2.
Challenges
faced
by
the
governments:
Cyber Crime – A Growing Challenge for
Governments July 2011, Volume Eight of the
KPMG international enlists the following
challenges:

Tracking the origin of the crime:
According to Rob Wainwright, Director of
Europol, criminal investigations of cyber
crimes are complex, as the criminal activity
itself is borderless by nature.82 Tracing cyber
criminals poses a challenge.

Growth of the underground cyber
crime economy: A major threat that may
hamper the fight against cyber crime is the
growth of an underground economy, which
for many cyber criminals can be a lucrative
venture. e. Research shows that criminals are
trading bank account information for US$10–
125, credit card data for up to US$30 per card,
and email account data for up to US$12.

Shortage of skilled cyber crime
fighters: Implementing cyber security
measures requires skilled manpower.
However, most countries face a shortage of
skilled people to counter such cyber attacks.
According to Ronald Noble, Head of Interpol,
“An effective cyber attack does not require an
army; it takes just one individual. However,
there is a severe shortage of skills and
expertise to fight this type of crime; not only
36
Sai, Nitika, Bhanu
at Interpol, but in law enforcement
everywhere.

Widespread use of pirated software:
One of the major challenges to preventing
cyber crime is the prevalence of software
piracy, as pirated software is more prone to
attacks by viruses, malware and trojans.
Experts believe that the rapid growth of
consumer PC markets in emerging countries
— such as India, Brazil and China — has
contributed largely to the rising piracy rates.
The pirated software can include not only
games, movies, office applications and
operating systems, but also security software.
Often, users prefer to obtain pirated security
software, rather than purchase and upgrade
legal version, therefore increasing the
vulnerability of their systems to cyber
attacks.[9]
2.
Where’s the risk?
Everywhere: Cyber-crime is on the rise.
On average, there has been a reported
cyber-security event every single day since
2006. If there’s a transaction that involves
a card with a magnetic strip and a swipe,
there’s a transaction that involves a risk.
And if there’s a computer system with
software designed to allow access by
multiple users (e.g. by franchisees,
vendors, or other providers) without
security in mind, then there’s a major risk
of being hacked for malicious or
competitive purposes. Mobile devices,
often containing sensitive data, are lost or
stolen every day.
Face it: With the proliferation of free
hacking tools and cheap electronic devices
such as key loggers and RF Scanners, if you
use e-mail or your company’s systems are
connected to the Internet, you’re being
scanned, probed, and attacked constantly.
3. Who’s been hacked?
International Journal of Computer & Mathematical Sciences
IJCMS
ISSN 2347 – 8527
Volume 3, Issue 2
April 2014
As they say in the cyber security world,
there are only two kinds of computer
systems: those that have been hacked and
those that will be hacked.
4.
What could happen?
Lots of things: all of them bad.
Accordingly, a company (particularly
franchise businesses and other licensors)
must evaluate its risk to determine and
implement appropriate policies and
procedures.[10]
5.
Analysing the cost of cybercrime:
As corporations and government offices
are increasingly becoming the target of
cyber attacks, the costs to maintain,
protect and restore cyber infrastructure
have increased rapidly.
Of course security at personal level is
important but to really ensure a safe virtual
world a greater effort from the country
heads is required. Hence we would focus
on the costs that a government bears.
So to actually have a safe network of
computers it starts at installing the antivirus, insuring the organisation setup
against any eventuality and threats. So
that’s where a chunk of monetary funds
go.
In the event of any cyber attack/crime the
monetary and the the loss of crucial
information adds to the cost, such attacks
also invites paying compensation to the
victims.
And last but certainly not the least is the
father of all costs and that is the cost of
maintenance of the systems and software
along with ensuring that industry standards
are met.
37
Sai, Nitika, Bhanu
Future scope:
Here we looked at the definition of
cybercrime and explained cyber crime in
detail. Then we looked at what exactly
cyber crimes do to the victim and also
analysed the costs of the cyber crimes for
the government.
The future scope definitely lies in making
the cyber space safe and that came be
partly achieved if the offenders are
punished because the punishing rates are
very low as we are at most of the times
unable to establish the source of the
offenders in a court of law. So the future
lies in strengthening the anti-cyber crimes
laws, and that’s a global effort because
cyber crime itself is a global phenomena.
This is in addition to the need of devising
stronger and more reliable protection from
cyber attacks.
References:
[1] Developments in the global law
enforcement of cyber-crime [Revision
7.1.06 – 13256 words] Roderic
Broadhurst, Queensland University of
Technology * Policing: An International
Journal of Police Strategies and
Management
29(2)
:
pp.
408433.Copyright 2006 Emerald *PhD.,
Professor, email: r.broadhurst@qut.edu.au.
[2] LIBRARY OF PARLIAMENT 1
PUBLICATION
NO.
2011-36-E
CYBERCRIME: ISSUES.
[3][4] On the definition and classification
of cybercrime-Sarah Gordon · Richard
International Journal of Computer & Mathematical Sciences
IJCMS
ISSN 2347 – 8527
Volume 3, Issue 2
April 2014
Ford Received: 13 January 2006 /
Revised: 11 February 2006 / Accepted: 29
March 2006
© Springer-Verlag France 2006.
[5] fraud-wikipedia.
[6]http://itlaw.wikia.com/wiki/Unauthoriz
ed_access.
[7] child pornography -wikipedia
38
Sai, Nitika, Bhanu
[8] cyber-stalking –wikipedia.
[9] Cyber Crime – A Growing Challenge
for Governments July 2011, Volume Eight
of the KPMG.
[10] © 2009, Bruce S. Schaeffer, Henfree
Chan, Henry Chan, and Susan Ogulnick.
Download