You are on page 1of 9

2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)

The Impact of India’s Cyber Security Law and


Cyber Forensic On Building Techno-Centric
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) | 978-1-7281-8529-3/20/$31.00 ©2021 IEEE | DOI: 10.1109/ICCCIS51004.2021.9397243

Smartcity IoT Environment


Md Iman Ali Dr. Sukhkirandeep Kaur
Department of Computer Application School of Computer Science and Engineering
Lovely Professional University Lovely Professional University
Phagwara, Punjab, India Phagwara, Punjab, India
mdiman@rediffmail.com sukhkirandeep.23328@lpu.co.in

Abstract— Cyber Security and Cyber forensic infrastructure has complete end-to-end technology-driven cybersecurity law
always been a dependent component to achieve the goal of smart city, ecosystem is not matured to cope up with current threat
techno-centric ecosystem development. The non-existence of a management. Is existing cyber security landscape is sufficient
Technology-Driven collaborated ecosystem of Cyber defense, cyber enough to build and protect the country from cyber threats or it
forensic, and cyber law has led to a situation of fragmenting the needs transformation is a major question.
objective of techno-centric smart city evolvement. Trends of connecting
humans and things in smart cities have merged everything in a single Indian Cybersecurity law transformation question cannot be
digital network and cybercriminals are getting integrated platforms to answered until an in-depth analysis is performed for smart city
conduct cybercrimes. This indicates that there is a need for movement, existing cyber law system and cybercrime
collaboration of Cybersecurity and cyber forensic infrastructure with landscape.
the PPP model at the national and international levels for securing
cyberspace. Different countries have adopted different approaches to A. India Smart City movement
deal with the exponential growth of cyber attacks depending upon the In June 2015 The Ministry of Urban Development initiated
country’s specific cyber law. Due to lack of Integration between India’s a smart city project[3] towards the movement of urbanization.
Smart City Development Policy and Cyber Security Policy leading to a In the digital world, IoT and BYOD become part of the human
major roadblock in smart city development. Achievement of major ecosystem. In the smart city ecosystem, a human-independent
Smart city objective of India become critical due to non-existence of comfortable lifestyle is expected for digital transformation and
collaborative approach between different cyber defense ecosystem urbanization. Most of the countries in the world are working
pillars and country-specific regional cyber law. India’s Cybersecurity
towards urbanization, where India is also part of the
policy “National Cyber Security Policy” 2013 is significant approach
transformation. The increased rate of urbanization is the
but not enough to create a robust techno-centric smart city. In this
paper, we have proposed collaborative PPP model cyber law and
objective of the smart city. In India, 63% of GDP contributors
cybersecurity technology ecosystem to enable secured cyber confident are from Urban Area. By the year 2030, 75% of GDP
citizenship in the techno-centric smart city environment of India. This contributors will be from Urban areas as per the census done in
paper addressed the need for a dynamic technology-driven 2011[3]. The use of IoT and BYOD devices is increasing
cybersecurity law ecosystem , “Call the police” by technology in smart exponentially, by the year 2020 more than 50 Billion IoT
city to build India’s techno-centric stable smart city ecosystem. devices will get on board in the world[4]. India’s Smart city is
designed to enable IT services for all citizens. The smart city
Keywords—Cyberlaw, Cyber Security, Cyber Forensic, IoT, project aims to improve the quality of life, People must be happy
Smart city. and motivated to use the advanced technology of the smart city
system[5]. The growing rate of IoT and BYOD devices
I. INTRODUCTION increased the rate of cybercrime which becomes a challenging
The importance of Cyber Security law reformation has a factor to address. In a study, India’s Rank on cybercrime is 11th
positive and strong correlation with Digital transformation, in the world [6]. Rampant growth in Cybercrime has been seen
cybercrime and cyber forensic investigation. A techno-centric over time with new tools and techniques. Criminal activities are
smart city movement and providing cyber confident citizenship increasing in this borderless world of cyberspace and these
requires an inline technology-driven cyber law system crimes have become a serious matter over time. Types of fraud
otherwise aim of building the digital transformation and are evolving depending on the technology change. The fast-
ecosystem might get fragmented. On average, it takes 23.6 hours growing technology has opened the door for cybercrime
[1] to address cybercrime aftermath where we need to address activities in the digital world either internal cybercrime or
this in less than 1 minute. Indian Cybersecurity law is external cyber fraud. More than 20 billion IoT devices are
formulated multiple times and regulated by ten [2] different expected to communicate with each other by 2020[7] which will
authorities according to the time and depending upon situations escalate the number of cybercrime. The cybercrime
arising in the cybercrime world. Bits and pieces of cybersecurity investigation portfolio has changed. Different category of cyber
law have been established and amended but the orientation of a forensic technology has been broadly identified as Email

ISBN: 978-1-7281-8529-3/21/$31.00 ©2021 IEEE 751


1

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Forensic, Mobile Forensic, Data Leak Forensic, Cloud Forensic,

27482
Malware Analysis Forensic, Computer Forensic, E-discovery 35000

NUMBEROFCRIME
Forensic, Network Forensic, ERP Application Forensic. Cyber 30000
Fraud Risk Assessment Forensic area becomes one important 2013
25000

12317
11592
area. 2014
20000

9622
B. India’s Digital Adoption Landscape 15000 2015

4356
The smart city movement is a complete ecosystem movement 10000 2016
towards digitization. In a study conducted by Mckinsey, Digital 5000
Adoption in India has increased. The below figure shows the 2017
0
index of India’s digitization.
2013 2014 2015 2016 2017
YEAR
Digital Adoption Index
150 Fig. 3. Cybercrime record from 2014 to 2016.
99

90

75

73
67

67
66

66
65
64
64
61

58
57

100

50
47

35
50
In India Crime, fraud, bribery has increased which indicates
that there is a serious need for the advancement of a technology-
0
South…
South…

driven law enforcement system to reduce crime and a strong


UK
China

Canada
Australia
Italy

Brazil
USA
France

Singapore
Indonesia

India
Germany

Russia
Japan

Sweden
anti-corruption system to be built. Hackers get huge
opportunities because of the enhanced threat surface in a Smart
city environment/IoT environment. The entire techno-driven
smart city can get compromised with a single intrusion[12].
Fig.1. Digital adoption from 2014-2017, source Mckinsey: [8]. Cybersecurity has always been a pain point. This indicates that
India's Cyber Security Law is not up to date to cope up with
Index of Digital Adoption is showing that out of multiple current threats, crimes, and fraud management. There is a need
countries India is moving fast towards digitalization. As per to draw a complete circle system of Smart cities, technology,
World Economic Forum 2016, the Index of India in Network people, process and devices.
Readiness as below fig.2.
Forensics outlook 2018[7] of EY In a survey done by EY’s
EMEIA Fraud Survey 2017 the result shows the index of India
is significantly on the higher side.

Briberyandcorruptpractices

Inda
51
71 UAE

SouthAfrica
61 27
Emergingmarket
Fig. 2. The Network Readiness Index of India. 79 Global
These statistics clearly show that there is a serious
requirement of exploring the landscape of Indian Cyber Security Fig. 4. Bribery and Crime Practice Index.
Law whether cybersecurity law is inline or not. As per the study
of PWC “Global Crisis Survey[9]” Cybersecurity risk is a major A study of the Cyber Security model concluded in 2019 that
digital business risk today. Cyber Security threat is the second- there is a definite need of establishing a formal framework for
highest risk for the organization as per KPMG 2018 Global CEO Cyber Security as Cyber resilience and a trusted environment
outlook [10]. The movement towards IoT/BYOD is also one of are going to increase the cyber confidence of the citizen. [13].
the major challenges in smart city development as a Global Innovation Index 2017 of the United nation stated:
cybersecurity risk[11]. “emerging innovation center in Asia”[14]. This is a clear demand
C. Cybercrime Landscape that India has to reform the cybersecurity law to gear up with
business movement else fragmentation of upward movement is
Due to the increased amount of digital adoption,
definite. Cybersecurity is considered the fastest global risk by the
cybersecurity risk has also increased. The below figure shows
World Economic Forum, to tackle cybersecurity threat WEF has
the increased rates of Cyber Crime as per the National Crime
launched the “Global Center for Cyber Security” in 2018[15].
Record Bureau of India from 2014 to 2017.
All these facts and figures indicate that India indeed needs an
advanced level of cybersecurity strategy which can prevent the
country's intellectual properties and reduce cyber threat. To

752
2

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
support building Smart City and cyber secured Techno Centric Post Cyberattack in 2010, the government has built a
Citizenship, strategy to be built as One Team, One Goal to Taskforce on Cyber Defense and Preparedness which was
prevent damage and loss due to modern tools and techniques of chaired by NTRO (National Technical Research Organization ).
cybercrime. The same Taskforce has contributed to formalizing India’s first
“National Cyber Security Policy” in 2013. THE PERSONAL
In this approach, the article is organized step by Step in detail. DATA PROTECTION BILL, 2018 was the movement towards
The rest of the paper is ordered as followed: In section , we data protection, notification, and appointing a data protection
have mentioned the initiative and strategy of Govt of India personal[19]. National Cyber Security strategy defines the future
concerning Cybersecurity. In section , Methodology and readiness of the Cyber Security infrastructure of India which has
Framework are described. The case study is discussed in section a positive correlation to the development of technology-driven
. The Result and Discussion are mentioned in section . In smart city movement.
section , contains the conclusion, and the Current and Future
Development section VII is mentioned before the Declaration, Cyber Security Organizations and hierarchical bodies are
Acknowledgement and Reference Section. shown in the figure below:
II. INDIA CYBER CRIME PREVENTION STRATEGY
A. Indian Cyber Security Law
Existing Cyber project running in India are at different levels
and being run by different entities. Cyber Security law in India
was initially recorded in the Information Technology Act 2000
and the I.T. Amendment Act 2008 to regulate and address issues
related to electronic offense. Cyber Crime is not defined in detail
in this Act either in the Information Technology Act 2000 or in
the Amendment Act 2008.
Fig. 5. Indian Cyber Security hierarchy.
IT Act 2008 stated in the preface “to provide legal
recognition for transactions carried out employing electronic Table  shows different organizations of Cyber Security bodies
data interchange and other means of electronic communication, under different organizations.
commonly referred to as "electronic commerce", which involve The key point of the highlight is an integration of these Cells
the use of alternatives to paper-based methods of communication with collaboration and exchange of data until in-depth
and storage of information, to facilitate electronic filing of collaboration within these cybersecurity cells with Law and
documents with the Government agencies and further to amend enforcement happens, India’s Cyber Security can’t be a
the Indian Penal Code, the Indian Evidence Act, 1872, the successful model. The major impact of the development of
Bankers' Books Evidence Act, 1891 and the Reserve Bank of technology-driven Smart cybersecurity exists in this silo model
India Act, 1934 and for matters connected therewith or incidental of cybersecurity strategy.
thereto.” Post an impetus of globalization and computerization.
India Smart City dream project can’t be a technology-driven TABLE . SHOWS DIFFERENT ENTITY OF CYBER SECURITY CELL
project until cyber Security Law is in line with the Smart city MINISTRY OF COMMON
development techno-centric project. There are certain needs for PM OFFICE/CABINET SECY INFO TECHNOLOGY
cyber policy [16]or technology policy in digital India and smart (PMO/CAB SEC) (MCIT)
city project transformation. In Canada, Germany, UK, the Department Of Information
National Security Council (NSC) Technology (DIT)
internet policy has been reformed, whereas the Indian Internet National Technical Research Org
policy is still traditional which is not at all connecting people, (NTRO) Department of Telecom (DoT)
policy, and technology altogether. Different interpretations of
rules and regulations in India’s Cyber Security can’t be denied. National Critical Info Infrastructure Indian Computer Emergency
Protection Centre (NCIIPC) Response Team CERT-IN
In 1970 under the Programme of UNDP (United Nations Educational Research Network
Development Programme), India started working towards Joint Intelligence (ERNET)
computing in India for formulating the strategy. In 1995, the
Internet became available to Indian Public and since then internet Research & Analysis Wing (RAW) Informatics Center (NIC)
Centre for Development of
usage is increasing. National Cyber Security Policy 2013 was Multi Agency Center Advanced Computing C-DAC
formalized with a vision of securing the critical infrastructure of Standardisati on, Testing and
Cyberspace for Citizen, Government, and business. India was not National Information Board (NIB) Quality Certification (STQC)
having any Cyber Security laws till 2013. Cyber Security, MINISTERY OF HOME NON GOVT
technology laws, and innovation depend on the index of India's AFFAIRS (MHA) ORGANIZATION (NGO)
standing rank. In “Global Tech readiness countries” according National Cyber Corrd Centre Cyber Security And Anti
(NCCC) Hacking Organisation (CSAHO)
to the World economic forum [17] ranking of India is 89. The
Directorate of Forensic Science
network readiness index in 2016 become 91 as per World (DFS) Cyber Society of India (CSI)
Economic Forum 2016[18].
National Disaster Mgt Authority Centre of Excellence for Cyber
(NDMA) Security Research &

753
3

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
Development in India Central surveillance and technology-driven crime activity
(CECSRDI) monitoring system is not yet in place to handle exponential
growth rates of crimes. The complete new cadre in police needs
Central Forensic Science Lab to be built in all the states with the most recent technology
(CFSL) Cyber Security of India (CSI)
National Cyber Security of India
experts which will be called “Cyber Police” or the “Technology
Intelligence Bureau (IB) (NCS) Police”[16]. However, the Crime & Criminal Tracking Network
Cyber Attacks Crisis and Systems (CCTNS)[26] project initiate the Digital Police
MINISTRY OF DEFENCE Management Plan of India Portal which was launched in 2017, which was initiated to be part
(MOD) (CACMP) of the digital India movement with the core concept of
MINISTRY OF EXTERNAL computerized police process. This project again needs to have
Tri-Service Cyber Command AFFAIRS (MEA)
further collaboration with similar project initiatives.
Army (MI) Ambassadors & Ministers
D. PPP model of Cyber response Team
Navy (NI) Defense Attaches
20th March 2018, [27]Ministry of Home Affairs, Govt of
Air Force (AFI) Joint Secretary (IT) India has initiated the PPP model of the cyber response team for
Def Info Assurance & Research digital safety and cybersecurity. The intelligent Cyber response
Agency (DIARA) --- and immediate monitoring systems are not possible with a single
Defense Intelligence Agency (DIA) --- entity to fight against international level cyber-crimes. There is a
Defense Research Dev Authority need for the PPP model Cyberthreat response team that should
(DRDO) --- include multiple private organizations, agency, government,
national and international level collaboration. Cyber threat has
become the world's top major risk as a global threat, which needs
B. Smart city, Cyber Security and Cyber Law a PPP model of a collaborative approach for addressing cyber
Cyber Security Law has a positive correlation with Cyber threats [28] as per Forbes.
forensic which has to go hand in hand. Digital investigation
process development depends on the back-end framework of E. Dedicated Cyber Police station and Cyber Crime Court
Cyberlaw. Forensic investigation component which is [20] Setting up a dedicated Cyber Police station with advanced
Network Forensic, Computer Forensic, Mobile Forensic, level technology and tools are the fundamental needs. Setting up
Database Forensic. This again is dependent on Cyberlaw which such a Cyber Police Station and related Cyber Security
connects people. cyber forensic component which connects [21] Jurisdiction system is a correlated requirement. Currently,
(a) Human, (b) digital evidence, and (c) Process. International Mumbai becomes the first State of setting up 4 numbers of Cyber
level initiatives have been taken to the advancement of Cyber Police stations. Bandra Kurla Complex, Mumbai, India is the
Security law in different countries. The requirement of first cyber police station where some more police stations are
Improvement in Cyber Security standards has been identified coming up in the pipeline.
globally. The USA government has taken the initiative to
This indicates that if the Indian Cyber Security law
improve the Cyber Security law and released The Internet of
framework can be addressed the need for cyber police, cyber
Things Cyber Security improvement act, 2017[22].CPS public
incident management, the cyber forensic system as a technology-
working group (CPWG) of National Institute of Standard and
driven cyber defense system, then India's techno-centric smart
Technology in 2017 released Cyber Security strategy and
city ecosystem can be addressed to cyber confident citizenship.
privacy for the common elements – Identification, Monitoring
This study has explored how technology-driven cyber defense
and implementation of Cyber Security services[23] which is a
ecosystems can be built to protect the country and being part of
continuous initiative of Cyber Security law to cope up with the
the global cyber defense ecosystem.
different cyber attacks. “Cyber Security and Resilience of
Intelligent Public Transport” released in 2015, European Union III. METHODOLOGY AND FRAMEWORK
Agency for Network and Information Security[24] towards
Cyber Security on smart city public transport, security and The enactment of the India Smart city project to build a smart
resilience including involvement of framework “Certification ecosystem is arguably reflecting a negative direction due to
Framework for Devices” consisting of rules evaluation of India's Cyber Security Laws and Cyber Threat Mechanism
security properties in 2017[25] was released in this direction. System. In this study, few techniques are demonstrated and
European progress on cyber-crisis situation cybersecurity developed a technology-driven law enforcement system. This
policies is defined on the “European Union (EU) Network and study has built a model of Cyber Security Law and cybercrime
Information Security (NIS) Directive for Sectoral Supervision” investigation background system for a sustainable smart city
for network and information security systems in line with law techno policy-driven system. This technology-driven cybercrime
enforcement system. This development indicates that response system or the Cyber forensic team is enabled
cybersecurity Law should be adequate to support today’s automatically based on the category of crime detection. Before
advanced level Cyber activities and should be improved any crime is conducted, if the cybercrime response can be
continuously. automated then this will reduce the number of crimes and even
post crime if automated incident management can be done with
C. Indian Cyber Police and Technology Police the cyber forensic investigation then smart city techno-driven
India’s Cyber Police or Indian Technology police initiate has project can be successful, which was addressed in this
not yet turned up which is the most significant requirement. framework.

754
4

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
A. Automated Cyber Incident Alert Management more productivity. This design has given a more collaborated
Real-time sharing of cyber threats with cyber defense teams cyber defense ecosystem.
and law enforcement agencies [29] becomes a critical The collaboration of Cyber Police, technology police from all
requirement to fight against cybercrime. In this phase, the different tangents of the digital business transformation model is
concept of the alert system to Cyber Police is explored. From the the next step to move forward. This required public, private
perimeter Firewall or Perimeter web gateway of the organization organization collaboration. Construction of cyberthreat system,
alert system to cyber police in initial observation if malicious digital crime branch including all organization, national,
activity is observed. In this approach recently a novel algorithm international level technology expert which will form a
was created to deal with malicious agents [30]. This system governance body of cyberthreat security body. A PPP model
generating an alert to the cybercrime police station to analyze cybersecurity system is required as announced by Obama, USA
malicious activity. The figure below shows that Perimeter president in 2016 to improve the national cybersecurity
firewall generating alerts to cybercrime police to start monitoring system[32].
malicious activity and source of the attack. This needs integration
between every organization's external firewall/web gateways to D. Integration of Smart City, Organization, Cloud, Service
the cybercrime police station, national Cybercrime system. Provider, Government Entity, People Process Under a
Single Platform
Protecting Critical infrastructure is difficult because of the
integration of IT and things as most of the critical infrastructure
in a smart city zone is owned by the private sector and regulated
by the public sector[28]. This phase of the implementation is
connecting all organizations, government entities, institutions,
smart city development projects under a single platform and
connect to the digital crime detection and protection mechanism.
This will integrate all private organizations security gateways,
cloud security, monitoring system.
The below figure shows the integration system to build a
Fig.6. Integration of Digital Police System with the Technology-Driven
System, Organizations.
cybersecurity model.

B. Development of Cyber Police, Technology Police System.


Development of Cyber Police [16] or Technology Police
system becomes fundamental needs in every level with special
training and advanced level cybersecurity knowledge. This
requirement is addressed with this technology-driven police
system, and police stations with high technology play a key role
to build a smart cyber defense system.
The need for a Digital Cyber Police station (DCPS) set up at
all levels with integration and collaboration is addressed with this
model. This DCPS has a correlative view of all cybercrimes,
malicious activities across the industry, organization, smart city
environment, IoT, BYOD, and service provider traffic ingress
and egress point. Integration of all the perimeter level firewalls,
Web security gateways with all the Internet exit and entry points.
This meets the requirement of real-time [29] alert update of
malicious activities to the cyber defense system. This integration
with DCPS with the norms of the General Data Protection
Regulations (GDPR). The DCPS was integrated with the
organization’s perimeter devices and the event of the malicious Fig. 7. Technology-driven Cyber Security model
activities is sent towards the DCPS alert correlation system. Then
DCPS again back to back connected with the PPP model of cyber Collaboration model for developing the techno-driven
forensic investigation system as Cyber Lab is opened in the USA cybersecurity law and enforcement platform.
with a collaboration with cisco[31].
E. Integration of Forensic investigation under PPP model
C. Construct PPP Model Cyber Police, Technology Police, Enhancement of current tools and techniques[33] of cyber
and Technology Jurisdiction forensic has become a continuous requirement to conduct a
The ministry of home affairs notification dated 20th march cyber-forensic investigation.
2018 regarding the PPP model of the cyber response system was
a major initiative[27], which needed more collaborated This phase integrates all the forensic investigation projects,
integration. This need for cybercrime digital police systems has technology under a single platform with specific types of access
control mechanisms. A Secured integration model of Forensic

755
5

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
technology between Government, private and public threat detection and protection emergency response team which
organizations which also should further interconnect with will connect from the state level, national level, international and
international forensic organizations, the Indian Inter pole system, public-private organization collaboration which need to be
CBI, CID, State Digital crime branch police, the private entity of confined with single cyber law.
forensic project all need to get integrated.
The number of IoT devices is increasing which is an
F. Integration of Indian Crime Jurisdiction Law Enforcement indication that a Smart city environment and IoT environment
Agency, International Level Law Enforcement Agency will increase the number of devices so that cybercrimes will also
There should be one team, one goal approach. An get increased.
international collaboration of cybercrime is a fundamental B. The United State of America one team, one goal strategy
requirement to conduct a criminal investigation without which it
One team one goal approach of cybersecurity and cyber
is next to impossible to stand as one team against the global
defense model is a successful model. The United state of
largest man-made risk. National, international level
America’s National Cyber forensic approach is one of the
collaboration between Interpol, CBI, FBI and multiple country
success model for other countries. Different organizations,
Interpol(NCBs of Interpol) collaboration was indeed a
companies, private sector and research centers' collaboration
requirement to conduct cybercrime investigation, find the digital
approach results in a great success model to mitigate attack risk
evidence[34], develop international technical standards and
and prevention even before the attack occurs. The two-way
share information quickly. There is a need for integration of
collaboration model of the National Cyber Forensic and Training
special crime Jurisdiction, all the cybercrime law enforcement
Alliance (NCFTA) shows how to identify the potential attack
teams, an International level collaboration of crime jurisdiction
before the attack disrupts and mitigation. Running different
system which will act immediately on run time basis
programs under one umbrella transformed the ecosystem
dynamically. Suppose a crime is detected, action on immediate
towards a matured model. Running program under this model is
effect needs to be triggered like taking action through the digital
BCP (Brand Consumer Protection), Cyber financial (Cyfin) and
system and online punishment system as lockout bank account
Malware Cyberthreat[35]. Like malware and Cyber threat
and system involved in the crime and stop transactions, etc
program[36] focused on only technical threats along with the
should be considered. Certain action needs to be triggered on a trend of dark-web. Likewise many programs running under this
run-time basis so that criminal comes back to the system umbrella. Cyber threats and Cyber labs both are integral to cyber
automatically rather than running behind with the criminal. The law. In this direction, the First world City-based Cyber Lab is
collaboration of countries, technologies, forensic investigation opened in the USA with a collaboration with cisco[31] for Cyber
private-public agencies are addressed in this study. Fig. 7. shows Intrusion Command Center.
that collaboration, integration have resulted in a successful
model of the cyber forensic system to conduct a cyber-forensic As NCTFA is result-focused to prevent potential loss.
investigation and built a forensic readiness techno smart city Results show that worth $1 billion potential loss was prevented
ecosystem. and also a significant contribution of this approach is shown in
table .
G. Re-structuring of Cybercrime Policy In International
Collaboration TABLE . NCTFA CASES AND SUCCESS DATA DURING 2015-2019[35]
In India, there are different interpretations of Cyber Security Prevented Intelligence Case referred Arrested by law
laws, rules, and regulations with different organizations and finical loss reported to law and and
people. Cyber Security system is not itself technology-driven in enforcement enforcement
India. Complex and Incomplete Rules and Cyber Laws in India $2.26 15187 2517 1096
need to be of international standard. A collaboration of Cyber
Law with a single policy for all the countries for cybercrime This result depicts a significant success of the partnering
should be in effect and action. Multi-dimensional classification model of the cyber defense system. Sensitive information
of laws and regulations are required to build sustainable smart sources have been always explored by the intelligence teams.
ecosystem development. Transformation of existing Cyber Apart from this Federal trade commission[37] which is
Security Law is required and should be a technology-driven protecting America’s consumer space, the United State
framework. This study has explored that international Securities and Exchange[38] also been engaged to contribute in
collaboration of Cyber Security law and integration has a major monitoring strictly about policy enforcement in various entities,
contribution to protect the country and contribution to the global inline support has been also provided to these organization by a
cyber defense network. central body to handle with the situation. National Cyber
Forensic Task Force consistently developing the ecosystem with
IV. CASE STUDY partners, domestic authorities, public and private sector for
national security solutions and investigation of crimes. Finally,
A. Technology-driven Hierarchical Cyber Threat detection
the FBI plays a core master role in the risk and consequence of
and protection mechanism. the cyber attack. One step ahead has always been planned by the
World Economic Forum recommends that the Private, core team and the counter-terrorism department contributes
Public, partnership[29] model can be a successful model for towards the planning before the attack, how attackers are
Cyberthreat management to fight against cybercrime. The planning for the crime so that massive attack can be protected.
industry of cyber crimes is growing like anything, so there is a For example, NSA and FBI [39] unfolded the sophisticated
need for advanced level technology-driven hierarchical Cyber malware from Russia as well. All these successes indicate a

756
6

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
partnering model is a successful model and keynote is the “One 2017 AVERAGE CYBER CRIME
Team, One Goal” model. City-based PPP model Cybersecurity VICTIM SPENT TIME AFTERMATH

55.1
50.7
strategy is one of the key approaches in the USA where a large

47.9
60
number of security events are analyzed [31] which contribute 50

34.1
33.9
towards a Cyber Secured Citizenship.

28.3
40

22.1

19.8
19.2
18.9

22
16.2
30

14.8
14.6

14.6
C. Central control strategy of the USA FBI Model

16
10.3
20

5.6

5.6
Fighting against the cyber threat for a long time and

9
10
investigation of one crime to un-fold other related and expected 0
crime which is a quite proactive approach in the USA. FBI

MAXICO

UK
CANADA

SPAIN
CHINA

INDIA
INDONESIA

USA
AUSTRALIA

GERMANY
HONGKONG

JAPAN

UAE
BRAZIN

FRANCH

ITALY

NEWZEELAND
NEITHERLAND

SINGAPORE

SWADEN
agency looks at this matter in a closer way which is a unique
approach to battle with cyber-crime. This approach finally
becomes harder for the criminal to conduct a further crime.

DAYS
World-class capability, talents are engaged and leveraged the
partnership model with all different authorities. Innovation,
evolution and adoption of new approaches become symbolic for
the USA to combat cybercrime. It is believed that cyber-terror Fig. 8. Average cybercrime report, Source: Nortel Cyber Security Inside
Report[1]
can steal US financial data, IP and damage US network which
cant be addressed by a single body. To build a cyber secured In the existing model average Cyber Response Time to deal
ecosystem FBI play a key role in partnering with different federal aftermath country-wise as per Nortel Cybersecurity Inside
counterparts, private agency and multi-country strategy in Report[1]
developing the right strategy. Along with the law and
enforcement sector and intelligence team for taking action to The significant result of the change in cybercrime response
defend and monitor malicious cyber activities. No matter who time on the proposed design is comparative law.
will get the credit but all together wherever they are during the
crisis situation to defend [40] with the situation which is a central TABLE . EVENT AND RESPONSE TIME
approach collaborating the public, private sector agency or even Sl No Event type Response time
with other govt agency. Different institutions, universities, 1 First alert generation Less than 60 second
research organizations, NGOs and companies altogether in 2. Investigation time will be reduced 23.5 hrs divided by 12
collaboration with the central FBI task force makes the because as the collaboration of cyber entity=1.95 hrs
ecosystem very strong to defend against crime. National Cyber defense system of PPP model, tools and
technology used to investigate will be
investigation joint Task Force (NCIJTF) [41] collaborates with divided by the number of the entity in
more than 30 different intelligence teams, communities and law collaboration because consolidate view
and enforcement agencies to stand strong and strengthen the information is available from the
capabilities of the cyber defense model. Resultant of this centralized system
approach builds a powerful analytical and operational team of
Cyberattack Defense System. Since the government can’t do it As a result of this collaboration, the cyber defense system is
alone so the collaboration approach is followed to build nation’s reduced from 23.5 hrs which is quite acceptable. In case if more
cyber strategy. Cyber defense mission was again boost up by numbers of collaboration entities, tools, and technology can be
engaging multiple agencies, public private sectors by the used in optimal design this will give a better time duration to
National Cyber Security alliance (NCSA)[42] which is again address cybercrime.
collaborations of contractors, alliances sit together to form cyber
secured intelligence system. New York City and Pittsburgh B. Forensic Investigation Advancement
collaboration center with different partners, research institutes, Realtime vulnerability[43] correlation and the number is
financial sectors, corporate industries by National Cyber forensic large from a single interface. In a smart city IoT environment,
and training alliance increased the capability of the cyber defense these numbers are expected to compound exponential value. This
system. Identification then mitigation and disrupt cyber crime threat management handling technique needs a very strong
was the main goal of the National Cyber forensic and training network of forensic investigation platform and collaboration.
alliance NCFTA([35]. Cyber Forensic investigation time has a positive correlation to
reduce the cyber threat. If the forensic investigation cannot be
V. RESULTS AND DISCUSSION completed within time and cannot present digital evidence to law
enforcement agencies in a shorter time then crimes are expected
A. Cyberdefense Response Time
to increase. The average investigation time to resolve a case is
This designed framework of Technology-driven approx. 40 hrs [44] which is quite high. The suggested model
cybersecurity, law enforcement, and cyber defense ecosystem reduces this time drastically because of the PPP model of the
has addressed the response time of cybercrime. A significant forensic investigation process having a collaboration of
change in cyber defense response time from 23.5 hrs on average advanced level tools and techniques under a single network. In
to less than 5 minutes with a comparison of the existing order to get the significant advance on this model , it required
traditional model and suggested model is shown below. reformations of regional country-specific cybersecurity law,
especially Indian cybersecurity law alignment with the smart city

757
7

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
movement. Certain implications on this reformation are expected DECLARATION
because of the GDPR[45]. The research, hypothesis, assessments, and analysis
VI. CONCLUSION articulated in this paper are those of the authors alone and not the
organization with whom the authors are associated.
“Call the Cyber Police by the Technology” is the key area
addressed in this study. The challenge of Cyber Security in Smart REFERENCES
City Development of India is one of the primary concern which [1] “2017 Norton Cyber Security Insights Report - Global Results,” p. 30,
is addressed in this study by developing a technology-driven 2018.
cyber defense system. Smart Cyber Security, an advance level [2] “International Comparative Legal Guides,” International Comparative
forensic investigation mechanism is explored in this study. Legal Guides International Business Reports. https://iclg.com/practice-
Introduction of PPP model Cyber Police and Cyber Forensic areas/cybersecurity-laws-and-regulations/india (accessed Sep. 26,
2019).
model is well addressed to fight against the exponential growth [3] S. C. Mission, “Mission Statement and Guidelines-http://smartcities.
of Cyberattack. In a study of the Mumbai Taj Attack in 2008, gov. in/writereaddata,” SmartCityGuidelines. pdf.
where Mumbai police may have ignored important digital [4] C. Diwaker, A. Sharma, and P. Tomar, “IoT’s Future Aspects and
intelligence information from the USA that warned of a potential Environment Surrounding IoT,” in 2019 Amity International
attack. The study also highlights that the attack could have been Conference on Artificial Intelligence (AICAI), Dubai, United Arab
Emirates, Feb. 2019, pp. 752–755, doi: 10.1109/AICAI.2019.8701402.
avoided[46] if India's cybersecurity infrastructure had advanced [5] H. Kumar, M. K. Singh, M. P. Gupta, and J. Madaan, “Moving towards
technology. This example is in line with what has been suggested smart cities: Solutions that lead to the Smart City Transformation
to have an advanced level of Cyber Police System or Framework,” Technological Forecasting and Social Change, p. 119281,
Development of Technology Police, Digital Police, technology- Apr. 2018, doi: 10.1016/j.techfore.2018.04.024.
driven digital law enforcement system. The cyber confident [6] “Volume 9, Special Issue, April 2019, 4th National Conference On
Recent Trends in Humanities, Technology, Management & Social
citizenship requirement is addressed by developing the PPP Development (RTHTMS 2K19); KIET School Of Management,
model of a cyber defense system. Also, this study addresses the Ghaziabad, UP, India,” Social Development, vol. 9, p. 15, 2019.
need for Multi-Jurisdictional collaboration in Cyber Security [7] A. Singh, “Forensic Outlook 2018,” p. 20.
law. This study has explored the socio-economic technology- [8] “Digital India: Technology to transform a connected nation |
driven model to build a sustainable techno smart city McKinsey.” https://www.mckinsey.com/business-functions/digital-
environment mckinsey/our-insights/digital-india-technology-to-transform-a-
connected-nation (accessed Sep. 22, 2019).
This study suggests conducting a further exploration of [9] “PwC’s Global Crisis Survey 2019,” p. 22.
[10] “Consumer Loss Barometer 2019_KPMG International,” p. 32, 2019.
Indian Cybersecurity Law alignment with Smart City
[11] “Cyber security - a necessary pillar of smart cities,” Smart City, p. 24.
development. The further study strongly recommended for [12] “Creating cyber secure smart cities,” p. 32.
building a model of end to end global cyber confident citizenship [13] “Cybersecurity in smart cities - KPMG | IN,” KPMG, Feb. 22, 2019.
as one team, one goal with national and international level https://home.kpmg/in/en/home/insights/2019/02/cybersecurity-
collaboration with the implication of PPP model for regional smartcities.html (accessed Sep. 14, 2019).
country level law system to form a global technology-driven [14] PTI, “India ranked top exporter of ICT services: UN report,”
@businessline.
cyber law ecosystem. https://www.thehindubusinessline.com/news/world/india-ranked-top-
exporter-of-ict-services-un-report/article9728432.ece (accessed Sep.
VII. CURRENT AND FUTURE DEVELOPMENT 14, 2019).
The biggest platform for cybercriminals is getting the [15] “To Prevent a Digital Dark Age: World Economic Forum Launches
Global Centre for Cybersecurity,” World Economic Forum.
accessibility of the digital world from anywhere and anytime. https://www.weforum.org/press/2018/01/to-prevent-a-digital-dark-age-
Now the digital world becomes single by connecting a network world-economic-forum-launches-global-centre-for-cybersecurity/
of networks and technology collaborated. Regional country- (accessed Sep. 14, 2019).
specific cyber law becomes a roadblock to fight against advanced [16] J. Saxena, “Development of Cyber Police,” vol. 2, no. 1, p. 5, 2019.
cyber threats. Cybercriminals are using advanced tools and [17] S. Dutta, T. Geiger, B. Lanvin, World Economic Forum, and Insead, The
technique in collaboration but cyber law are not connecting with global information technology report 2015: ICTs for inclusive growth.
2015.
the digital world similarly. [18] S. Baller, S. Dutta, and B. Lanvin, The Global Information Technology
Report 2016: Innovating in the Digital Economy. 2016.
This study suggests conducting a further exploration of [19] “Draft Personal Data Protection Bill, 2018,” PRSIndia, Jul. 30, 2018.
Indian Cybersecurity Law alignment with Smart City https://prsindia.org/billtrack/draft-personal-data-protection-bill-2018
development. The further study strongly recommended building (accessed Sep. 14, 2019).
a model of end to end global cyber confident citizenship as “One [20] Vishnu Institute of Technology, B. V. P. santhi, P. Kanakam, and S. M.
Team, One Goal” with national and international level Hussain, “Cyber Forensic Science to Diagnose Digital Crimes- A
collaboration with the implication of PPP model with regional study,” International Journal of Computer Trends and Technology, vol.
50, no. 2, pp. 107–113, Aug. 2017, doi: 10.14445/22312803/IJCTT-
country level law system to form a global technology-driven V50P119.
cyber law ecosystems. [21] Department of Informatics, Universitas Islam Indonesia, Yogyakarta,
Indonesia, Y. Prayudi, A. Ashari, and T. K Priyambodo, “A Proposed
ACKNOWLEDGMENT Digital Forensics Business Model to Support Cybercrime Investigation
in Indonesia,” International Journal of Computer Network and
Heartiest Acknowledged to Ayush Upadhyay, for the Information Security, vol. 7, no. 11, pp. 1–8, Oct. 2015, doi:
support, especially in formatting the paper, grammar check of 10.5815/ijcnis.2015.11.01.
the article. [22] M. Warner, “IN THE SENATE OF THE UNITED STATES,” p. 20.

758
8

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
[23] E. R. Griffor, C. Greer, D. A. Wollman, and M. J. Burns, “Framework [45] “General Data Protection Regulation (GDPR) guidance,” NHS Digital.
for cyber-physical systems: volume 1, overview,” National Institute of https://digital.nhs.uk/data-and-information/looking-after-
Standards and Technology, Gaithersburg, MD, NIST SP 1500-201, Jun. information/data-security-and-information-governance/information-
2017. doi: 10.6028/NIST.SP.1500-201. governance-alliance-iga/general-data-protection-regulation-gdpr-
[24] C. Lévy-Bencheton, E. Darra, European Union, and European Network guidance (accessed Sep. 26, 2019).
and Information Security Agency, Cyber security and resilience of [46] H. S. Lallie, “An overview of the digital forensic investigation
intelligent public transport: good practices and recommendations. infrastructure of India,” Digital Investigation, vol. 9, no. 1, pp. 3–7, Jun.
Heraklion: ENISA, 2015. 2012, doi: 10.1016/j.diin.2012.02.002.
[25] legroju, “The EU cybersecurity certification framework,” Digital Single
Market - European Commission, Sep. 19, 2017.
https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-
certification-framework (accessed Sep. 14, 2019).
[26] “Ministry of Home Affairs | Digital Police.” https://digitalpolice.gov.in/
(accessed Sep. 14, 2019).
[27] “Cyber Security.”
https://pib.gov.in/newsite/PrintRelease.aspx?relid=177722 (accessed
Sep. 24, 2019).
[28] C. Brooks, “Public Private Partnerships And The Cybersecurity
Challenge Of Protecting Critical Infrastructure,” Forbes.
https://www.forbes.com/sites/cognitiveworld/2019/05/06/public-
private-partnerships-and-the-cybersecurity-challenge-of-protecting-
critical-infrastructure/ (accessed Sep. 25, 2019).
[29] “recommendations-for-public-private-partnership-against-cyber-
crime.” https://www.zurich.com/knowledge/topics/cyber and data
risks/recommendations-for-public-private-partnership-against-cyber-
crime (accessed Sep. 24, 2019).
[30] Y. Shang, “Consensus of hybrid multi-agent systems with malicious
nodes,” IEEE Transactions on Circuits and Systems II: Express Briefs,
pp. 1–1, 2019, doi: 10.1109/TCSII.2019.2918752.
[31] “Mayor Garcetti Launches Nation’s First City-Based Cyber Lab | City
of Los Angeles.” https://www.lacity.org/blog/mayor-garcetti-launches-
nations-first-city-based-cyber-lab (accessed Sep. 14, 2019).
[32] “National Cybersecurity: A Collaborative Approach is Required,”
blogs@Cisco - Cisco Blogs, Oct. 31, 2016.
https://blogs.cisco.com/security/national-cybersecurity-a-collaborative-
approach-is-required (accessed Sep. 14, 2019).
[33] B. Vanlalsiama and N. Jha, “Cyber Forensic: Introducing A New
Approach to Studying Cyber Forensic and Various Tools to Prevent
Cybercrimes,” vol. 6, no. 1, p. 6, 2015.
[34] A. Rees, “International Cooperation in Cybercrime Investigations,” p.
25, 2007.
[35] M. Jacobs, “Home,” The National Cyber-Forensics and Training
Alliance. https://www.ncfta.net/ (accessed Jan. 03, 2021).
[36] M. Jacobs, “Malware and Cyber Threat Program,” The National Cyber-
Forensics and Training Alliance. https://www.ncfta.net/malware-and-
cyber-threat-program/ (accessed Jan. 03, 2021).
[37] “About the FTC,” Federal Trade Commission, Mar. 01, 2013.
https://www.ftc.gov/about-ftc (accessed Jan. 03, 2021).
[38] “SEC.gov | HOME.” https://www.sec.gov/ (accessed Jan. 03, 2021).
[39] “NSA and FBI Expose Russian Previously Undisclosed Malware
‘Drovorub’ in Cybersecurity Advi,” National Security Agency Central
Security Service. https://www.nsa.gov/news-features/press-
room/Article/2311407/nsa-and-fbi-expose-russian-previously-
undisclosed-malware-drovorub-in-cybersecu/ (accessed Jan. 03, 2021).
[40] “CISA Cybersecurity Summit: Addressing Threats Through
Partnerships — FBI.” https://www.fbi.gov/news/speeches/cisa-
cybersecurity-summit-addressing-threats-through-partnerships
(accessed Jan. 03, 2021).
[41] “National Cyber Investigative Joint Task Force,” Federal Bureau of
Investigation. https://www.fbi.gov/investigate/cyber/national-cyber-
investigative-joint-task-force (accessed Jan. 03, 2021).
[42] “National Cyber Security Alliance (NCSA) – About Us,” Stay Safe
Online. https://staysafeonline.org/about/ (accessed Jan. 03, 2021).
[43] Z. Tian et al., “Real-Time Lateral Movement Detection Based on
Evidence Reasoning Network for Edge Computing Environment,” IEEE
Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4285–4294,
Jul. 2019, doi: 10.1109/TII.2019.2907754.
[44] World Congress on Engineering and Computer Science et al., World
Congress on Engineering and Computer Science: WCECS 2017: 25-27
October, 2017, San Francisco, USA. volume 1: ... Hong Kong:
Newswood Limited, IAENG (International Association of Engineers),
2017.

9759

Authorized licensed use limited to: Nitte Meenakshi Institute of Technology. Downloaded on June 03,2022 at 11:38:51 UTC from IEEE Xplore. Restrictions apply.

You might also like