(IJCSIS) International Journal of Computer Science and Information Security,Vol. 10, No. 11, November 2012
The low cost of the PC and the growing use of the Internet hasshown the tremendous growth of business in India, in therecent years. According to the Indian Ecommerce Reportreleased by Internet and Mobile Association of India (IAMAI)and IMRB International, “ The total online transactions inIndia was Rs. 7080 crores (approx $1.75 billion) in the year2006-2007 and expected to grow by 30% to touch 9210 crores(approx $2.15 billion) by the year 2007-2008. 
Home Internet usage in India grew 19% from April 2006 toApril 2007. In April 2007 it became 30.32 million and theeMarketer accept that there will be 71 million total Internetusers in India by 2011. Rival tradeindia.com has 700,000registered buyers and it has the growth rate of 35% every yearwhich is likely to double in the year 2008. Indiamart.comclaims revenues of Rs. 38 crores and has a growing rate of 50every year. It receives around 500,000 enquiries per month.Undoubtedly, with the middle class of 288 million people,online shopping shows unlimited potential in India. The realestate costs are touching the sky. The travel portals' share in theonline business contributed to 50% of Rs 4800 crore onlinemarket in 2007-08. The travel portal MakeMyTrip.com hasattained Rs 1000 crores of turnovers which are around 20% of total e-commerce market in India. Further an annual growth of 65% has been anticipated annually in the travel portals alone.IV.
YBER CRIME AND CYBER THREAT
Life is about a mix of good and evil. So is the Internet. For allthe good it does us, cyberspace has its dark sides too. Unlikeconventional communities though, there are no policemenpatrolling the information superhighway, leaving it open toeverything from Trojan horses and viruses to cyber stalking,trademark counterfeiting and cyber terrorism.Cyber crime is an unlawful act where in the computer is eithera tool or a target which is used for creation of Cyber threat andCyber terrorism as a premeditated use of disruptive activities orthe threat in cyber space, with the intention to further social,ideological, religious, political or similar objectives, or tointimidate any person in furtherance of such objectives. TheCyber Criminals may be children and adolescents aged b/w 6-18 years, they may be organized hackers, may be professionalhackers or crackers, discontented employees, cheaters or evenpsychic persons.A full-fledged cyber attack on a nation may involve three steps.first, bring down the transportation and control systems.Second, bring down the financial systems (the stock marketsand banks) and third, take control of the nations’ utilities.A full-scale cyber attack can cause panic among people. It cantrigger alarm systems in all major establishments, be itParliament, Rashtrapati Bhavan, major hospitals, schools orcolleges. A hack into the traffic light systems can cause havocon roads in terms of accidents.A break into the IT systems controlling the metro rail servicescan cause disasters. A break into your bank’s system or taxdepartment can fish out your pan number, your salary, theinvestments you have made, the assets you possess to the carsyou own.A hack into your demat account can hurt you financially. Onecan know everything from details of your parents to thenumber of children you have. A hack into your personalcomputer can reveal all the searches you have made in the pastto all the chat windows.Imagine what chaos can prevail if the IT networks whichcontrol our power plants and nuclear plants fall into the handsof a rival nation. Imagine what can happen if one is able tobreak into the communication links of the defense ministry. Itis very important to find out the reasons behind any attack .
Motives behind any Attacks/ Internet Fraud:-
1. Creating threat in public.2. Create disobedience between different religious, racial,language, castes or communities.3. Destructing the government established by law4.Attitude of breaking the rules and integrity of the nation etc.
Tools of Cyber Terrorism:-
Cyber terrorists use various tools and methods to unleash theirterrorism. Some of the major tools are as follows:1. Hacking2. Cryptography3. Trojan Attacks4. Computer worms5. Computer viruses6. Denial of service attacks7. E-mail related crimes etc.V.
IMPACT OF INTERNET THREAT AT WORK
Unsafe IT behavior leads to unintentional loss of confidentialinformation. The survey was conducted by The NielsenCompany, India across five Indian metros fromManufacturing, IT, Pharmaceuticals, etc. - Mumbai, Delhi,Bangalore, Chennai and Hyderabad among Employees of large, medium and small organizations in India with Internetaccess to gauge the impact of Internet at work and the securityrisks it poses. 63 per cent of respondents from Delhi use theirpersonal email ID for work purposes, against the average of 36per cent. Delhi and Bangalore also have the highest proportionof respondents (32 per cent) who send work documents topersonal e-mail accounts, versus the average of 23 per cent. InBangalore, an average of 17 per cent of respondents admittedto clicking on links in e-mail sent from unknown sources and22 per cent on pop-up ads highlighting a significant section of Internet users who are ignorant of online threats.57 per centemployees feel leaking sensitive company information orinfecting their company with
malicious spyware or viruses (38per cent) puts them at greater risk of losing their job, than notadhering to their organization’s Internet policy (20 per cent).