You are on page 1of 16

CYBERSPACE AND ITS

SHORTFALLS
1) 18CVE1023
2) 18CVE1024
3) 18CVE1025
4) 18CVE1027
5) 18CVE1028
6) 18CVE1029
INTRODUCTION
• Cyberspace describes the virtual space which
facilitates online communication.
• Cyberspace allows us to interact and share information
with others through the medium of Internet.
• Cyberspace is a figurative space existing within the
internet whereas the internet is a network linking
computers and servers.
CASE STUDIES
BSNL - Unauthorized Access
• In a leading cybercrime case, the Joint Academic Network (JANET) was hacked by the
accused, after which he denied access to the authorized users by changing passwords along
with deleting and adding files. Making it look like he was authorized personnel, he made
changes in the BSNL computer database in their internet users’ accounts.
• When the CBI carried out investigations after registering a cybercrime case against the
accused, they found that the broadband Internet was being used without any authorization.
The accused used to hack into the server from various cities like Chennai and Bangalore,
amongst others. This investigation was carried after the Press Information Bureau, Chennai,
filed a complaint.
• In the verdict by the Additional Chief Metropolitan Magistrate, Egmore, Chennai, the
accused from Bangalore would be sent to prison for a year and will have to pay a fine of
Rs.50,000 under Section 420 IPC and Section 66 of the IT Act.
A Look-alike Website
• A nine person crime, was registered under Sections of the
Information Technology Act, along with Sections of the
Indian Penal Code.
• Under the complaint of this cyber fraud case in India, a
company representative in the business of trading and
distribution of petrochemicals in India and abroad had filed
the report against the 9 accused of using a similar looking
website to carry on illegal trade.
• The accused ran a defamation campaign against the company,
causing them crores of rupees of loss from their customers,
suppliers and even producers.
Bomb Hoax Mail

In an email hoax, sent by a 15-year-old boy from Bangalore,


the Cyber Crime Investigation Cell (CCIC) arrested him in
2009. The boy was accused of sending an email to a private
news company saying, “I have planted 5 bombs in Mumbai,
you have two hours to find them”. The concerned authorities
were contacted immediately, in relation to the cyber case in
India, who traced the IP address (Internet Protocol) to
Bangalore.
Short Falls of Cyberspace

• Spread of fake news due to social media

The damage caused due to fake news on social media


has increased due to the growth of the internet
penetration in India, which has risen from 137 million
internet users in 2012 to over 600 million in 2019.
India is the largest market for WhatsApp, with over 230
million users, and as a result one of the main platforms
on which fake news is spread
1. Trolls and stalkers

Troll
Anyone who has spent time on the Internet has encountered trolls or abusive people.

Stalkers
With people sharing information on the Internet, stalkers may experience less
difficulty finding personal information about others through various means

2. Data vulnerability and privacy


Vulnerabilities manifest themselves as design flaws or coding mistakes in
the system, much like bugs.
● Identity theft, hacking, viruses, and cheating

With access to billions of computers, computer hackers and


malicious users can hack accounts and steal personal information that
could be used for identity theft. The Internet also connects all
computers to each other, so hackers can scan millions of computers
and quickly identify what computers are vulnerable to attack.

The Internet also enables students to cheat on their studies, or find


others on the Internet to do their homework.
● Depression, loneliness, and social isolation

Social networking sites can also lead to depression as many people


tend to compare their lives with others. The Internet and online games
facilitate communication with others. Although you may find new
connections around the world, you may also find yourself
disconnecting from those in your real life.
Statistical Analysis of Cyber Crimes

Bar Graph depicting Global Cyber Crime Pie Chart showing


Statistics Cyber Crime Annual Revenues
Remedies for Cyberspace Shortfalls
• Ethical Hacking ,also known as Red Teaming, is the legal
action of locating weaknesses and vulnerabilities of computer
and information systems by duplicating the intent and actions of
malicious hackers. It is highly useful in testing the authorization
of the site.
• Counterfeiting of security documents should be confronted.
Plagiarism leading to the intellectual property theft can be
countered with highly secured authentication systems.
• The information in the form of Pixel Trackers or Web Bugs
should be embedded in the E-mails by the sender so that it
could not be hacked.
Remedies for Cyberspace Shortfalls
• Cyber-bullying should be hindered severely and anyone
causing offence shall be punished under “Anti-Cyber bullying
Act of India”,2015.
• Cyber Forensics assists to prove and prosecute cyber crime
legally. It is the process of extracting information and data from
computers to serve as digital evidence.
• We need to create awareness regarding Cyber Criminology and
Cyber Security among the people.
• The Copyright Infringement , the encroachment on the legal
rights of the official works of the organizations. The ISPs of the
infringers should be tracked and immediate actions should be
taken.
Conclusion
The cyber crime is a new invention of crimes made by a class of intellectual,
sophisticated criminals. Since long time the criminal jurisprudence was totally ignorant
of such types of crimes, although these were committed in different forms during early
development of crimes and criminology. One can say that the cyber crimes started to
operate when technology reaches its peak and took new tum to satisfy human needs
and
desires.
Because such crime being committed with the help of machines and on
arithmetical formulation, are different types in nature from that of ordinary types of
crimes. These crimes contain the elements of blue colour and white colour crimes.
These are blue colour crimes because these are not very different from other prototype
crimes, though recognized by various names. These are also white colour in nature
because crimes are usually committed by a class of criminals who are having
knowledge about science and technologies. For this reason I dare to say that cyber
crimes are an amalgamation of blue colour and white colour crimes.
In the selected subject of work, I made a thorough study on the new forms of
crimes. The criminals of this advanced age endeavour to commit this new crimes with
the help of computers through Internet by exploiting cyber space. This is a new subject
and the world facing problem to tackle the situation.
Suggestion
I. Improvement of technology is in need of the days. Cyber crimes are such types
of crimes which can primarily be prevented along with other measures.
Technological improvement may be helpful for detection, prevention and
commission of such crimes. High standards for security and network reliability
have to be required. Effective technological "locks" to prevent end users from
copying and distributing copyrighted music in digital form.
2. Special Statutes on cyber crime is required to be passed to deal with the new
form of crimes and to protect digital data. It will include Intellectual Property
crimes and crimes relating to human rights.
3. The Government has to create a special branch of Cyber crimes and Intellectual
Property Crimes within its criminal infrastructure, so that the enforcement
personnel may take quick action against the Cyber Criminals.
4. All sorts of infrastructure facilities are required to be available to the
investigating officers, especially in regard to mobility, connectivity, use of
technology. Scientific training to be provided to the investigating officers to
deal with the new problems under separate investigating agency to deal with the
cyber crimes.
Thank you

You might also like