International Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 3, Issue 2 April 2014 CYBER CRIME-Definition, challenges and the cost P.Sai Sheela, B-tech(CSE), Dronacharya College of Engineering Nitika Sharma, B-tech(CSE), Dronacharya College of Engineering Bhanu Bharadwaj, Asst. Prof, Donacharya College of engineering. Abstract: This paper provides an overview of the growing cyber crime problem. The paper attempts to reviews the definitions of cyber crime and the challenges faced. The paper further attempts to answer some major questions: Where’s the risk? Who’s been hacked? What could happen? It then analyses the Costs of Cybercrime. Finally this paper concludes with some suggestions for areas of future research. 1. Introduction: Cyber world or the virtual parallel world has become an integral part of our existence. The internet boom that one has experienced over the past decade or so has actually changed or ‘destroyed’ the old ways of communication. Roderic Broadhurst describes the rapidly developing computer connectivity, in his work “Developments in the global law enforcement of cyber-crime”, as information superhighways.[1] These information superhighways have made communication fast, easier and staple for every person aiming to achieve high economic business targets and to expand business in general. But with easy and fast digital technologies comes the risks of dealing with vulnerabilities of the system. 34 Sai, Nitika, Bhanu The important aspect of the vulnerabilities is that these are not some localised events but they are prevalent as national, regional and international phenomena often putting national security in a compromising position. So the best ways possible of putting these securities at bay is to first analyse what actually we mean by cybercrime and examining the challenges. 1.1. Definition: Although much is being said about cybercrime, there is not unanimous agreement on a single definition of the concept. However, the following definition, used by the Canadian Police College, is gaining acceptance: cybercrime is “a criminal offence involving a computer as the object of the crime, or the tool used to commit a material component of the offence.” [2] The Council of Europe’s Cybercrime Treaty uses the term “Cybercrime” to refer to offences ranging from criminal activity against data to content and copyright infringement as documented in by S.Gordon and R.Ford in their work titled “On the definition and classification of cybercrime”.[3] International Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 3, Issue 2 April 2014 The United Nations Manual on the Prevention and Control of Computer Related Crime includes fraud, forgery, and unauthorized access in its cybercrime definition. Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information.” We would further like to elaborate the first definition that says that cyber crime involves computers as a part of crime. Exactly what kind of crimes could be executed using a computer? 1.1.2. Unauthorised access as defined under the Computer Fraud and Abuse Act (CFAA), unauthorized access (to stored wire or electronic communications) means: intentionally accesses without authorization a facility through which an electronic communication service is provided; or intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system. [6] 1.1.3. Child pornography as defined by Wikipedia is : The work “On the definition and classification of cybercrime” provides us with some leads.[4] It includes frauds, unauthorised access, child pornography, cyber stalking etc. We would explore these further. 1.1.1. Frauds include a wide variety of crimes and Wikipedia defines frauds as “Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by: Altering in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect; Altering or deleting stored data; Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.[5] 35 Sai, Nitika, Bhanu “Child pornography is pornography that involves a child. It may be simulated child pornography or produced with the direct involvement of the child (also known as child sexual abuse images). Abuse of the child occurs during the sexual acts which are recorded in the production of child pornography. Child pornography may use a variety of media, including writings, magazines, photos, sculpture, drawing, cartoon, painting animation, sound recording, film, video, and video games.”[7] 1.1.4. Cyber stalking as defined by Wikipedia is as follows: “Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, International Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 3, Issue 2 April 2014 identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass.”[8] The above mentioned cybercrimes are just a few examples, while many other such activities take place. So understanding what cyber crime is very important first step in order to prevent such ills from taking over the goods. 1.2. Challenges faced by the governments: Cyber Crime – A Growing Challenge for Governments July 2011, Volume Eight of the KPMG international enlists the following challenges: Tracking the origin of the crime: According to Rob Wainwright, Director of Europol, criminal investigations of cyber crimes are complex, as the criminal activity itself is borderless by nature.82 Tracing cyber criminals poses a challenge. Growth of the underground cyber crime economy: A major threat that may hamper the fight against cyber crime is the growth of an underground economy, which for many cyber criminals can be a lucrative venture. e. Research shows that criminals are trading bank account information for US$10– 125, credit card data for up to US$30 per card, and email account data for up to US$12. Shortage of skilled cyber crime fighters: Implementing cyber security measures requires skilled manpower. However, most countries face a shortage of skilled people to counter such cyber attacks. According to Ronald Noble, Head of Interpol, “An effective cyber attack does not require an army; it takes just one individual. However, there is a severe shortage of skills and expertise to fight this type of crime; not only 36 Sai, Nitika, Bhanu at Interpol, but in law enforcement everywhere. Widespread use of pirated software: One of the major challenges to preventing cyber crime is the prevalence of software piracy, as pirated software is more prone to attacks by viruses, malware and trojans. Experts believe that the rapid growth of consumer PC markets in emerging countries — such as India, Brazil and China — has contributed largely to the rising piracy rates. The pirated software can include not only games, movies, office applications and operating systems, but also security software. Often, users prefer to obtain pirated security software, rather than purchase and upgrade legal version, therefore increasing the vulnerability of their systems to cyber attacks.[9] 2. Where’s the risk? Everywhere: Cyber-crime is on the rise. On average, there has been a reported cyber-security event every single day since 2006. If there’s a transaction that involves a card with a magnetic strip and a swipe, there’s a transaction that involves a risk. And if there’s a computer system with software designed to allow access by multiple users (e.g. by franchisees, vendors, or other providers) without security in mind, then there’s a major risk of being hacked for malicious or competitive purposes. Mobile devices, often containing sensitive data, are lost or stolen every day. Face it: With the proliferation of free hacking tools and cheap electronic devices such as key loggers and RF Scanners, if you use e-mail or your company’s systems are connected to the Internet, you’re being scanned, probed, and attacked constantly. 3. Who’s been hacked? International Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 3, Issue 2 April 2014 As they say in the cyber security world, there are only two kinds of computer systems: those that have been hacked and those that will be hacked. 4. What could happen? Lots of things: all of them bad. Accordingly, a company (particularly franchise businesses and other licensors) must evaluate its risk to determine and implement appropriate policies and procedures.[10] 5. Analysing the cost of cybercrime: As corporations and government offices are increasingly becoming the target of cyber attacks, the costs to maintain, protect and restore cyber infrastructure have increased rapidly. Of course security at personal level is important but to really ensure a safe virtual world a greater effort from the country heads is required. Hence we would focus on the costs that a government bears. So to actually have a safe network of computers it starts at installing the antivirus, insuring the organisation setup against any eventuality and threats. So that’s where a chunk of monetary funds go. In the event of any cyber attack/crime the monetary and the the loss of crucial information adds to the cost, such attacks also invites paying compensation to the victims. And last but certainly not the least is the father of all costs and that is the cost of maintenance of the systems and software along with ensuring that industry standards are met. 37 Sai, Nitika, Bhanu Future scope: Here we looked at the definition of cybercrime and explained cyber crime in detail. Then we looked at what exactly cyber crimes do to the victim and also analysed the costs of the cyber crimes for the government. The future scope definitely lies in making the cyber space safe and that came be partly achieved if the offenders are punished because the punishing rates are very low as we are at most of the times unable to establish the source of the offenders in a court of law. So the future lies in strengthening the anti-cyber crimes laws, and that’s a global effort because cyber crime itself is a global phenomena. This is in addition to the need of devising stronger and more reliable protection from cyber attacks. References: [1] Developments in the global law enforcement of cyber-crime [Revision 7.1.06 – 13256 words] Roderic Broadhurst, Queensland University of Technology * Policing: An International Journal of Police Strategies and Management 29(2) : pp. 408433.Copyright 2006 Emerald *PhD., Professor, email: r.broadhurst@qut.edu.au. [2] LIBRARY OF PARLIAMENT 1 PUBLICATION NO. 2011-36-E CYBERCRIME: ISSUES. [3][4] On the definition and classification of cybercrime-Sarah Gordon · Richard International Journal of Computer & Mathematical Sciences IJCMS ISSN 2347 – 8527 Volume 3, Issue 2 April 2014 Ford Received: 13 January 2006 / Revised: 11 February 2006 / Accepted: 29 March 2006 © Springer-Verlag France 2006. [5] fraud-wikipedia. [6]http://itlaw.wikia.com/wiki/Unauthoriz ed_access. [7] child pornography -wikipedia 38 Sai, Nitika, Bhanu [8] cyber-stalking –wikipedia. [9] Cyber Crime – A Growing Challenge for Governments July 2011, Volume Eight of the KPMG. [10] © 2009, Bruce S. Schaeffer, Henfree Chan, Henry Chan, and Susan Ogulnick.