Cyber Laws in India
Cyber Laws in India
Cyber Laws in India
Roll No: 54
Last Name: Kamath
Topic: 1. Cyber Laws in India
Cyberspace
Cyberspace can be defined as an intricate environment that involves
interactions between people, software, and services. It is maintained by the
worldwide distribution of information and communication technology devices and
networks.
With the benefits carried by the technological advancements, the cyberspace today
has become a common pool used by citizens, businesses, critical information
infrastructure, military and governments in a fashion that makes it hard to induce
clear boundaries among these different groups. The cyberspace is anticipated to
become even more complex in the upcoming years, with the increase in networks
and devices connected to it.
Cybersecurity
Cybersecurity denotes the technologies and procedures intended to safeguard
computers, networks, and data from unlawful admittance, weaknesses, and attacks
transported through the Internet by cyber delinquents.
ISO 27001 (ISO27001) is the international Cybersecurity Standard that delivers a
model for creating, applying, functioning, monitoring, reviewing, preserving, and
improving an Information Security Management System.
The Ministry of Communication and Information Technology under the
government of India provides a strategy outline called the National Cybersecurity
Policy.
The purpose of this government body is to protect the public and private
infrastructure from cyber-attacks.
Cybersecurity Policy
The cybersecurity policy is a developing mission that caters to the entire field of
Information and Communication Technology (ICT) users and providers. It
includes
Home users
Small, medium, and large Enterprises
Government and non-government entities
It serves as an authority framework that defines and guides the activities associated
with the security of cyberspace. It allows all sectors and organizations in designing
suitable cybersecurity policies to meet their requirements. The policy provides an
outline to effectively protect information, information systems and networks.
It gives an understanding into the Government’s approach and strategy for security
of cyber space in the country. It also sketches some pointers to allow collaborative
working across the public and private sectors to safeguard information and
information systems. Therefore, the aim of this policy is to create a cybersecurity
framework, which leads to detailed actions and programs to increase the security
carriage of cyberspace.
Cyber Crime
The Information Technology Act 2000 or any legislation in the Country does not
describe or mention the term Cyber Crime. It can be globally considered as the
gloomier face of technology. The only difference between a traditional crime and a
cyber-crime is that the cyber-crime involves in a crime related to computers.
Traditional Theft : A thief breaks into Ram’s house and steals an object kept in the
house.
Hacking : A Cyber Criminal/Hacker sitting in his own house, through his
computer, hacks the computer of Ram and steals the data saved in Ram’s computer
without physically touching the computer or entering in Ram’s house.
The I.T. Act, 2000 defines the terms
access in computer network in section 2(a)
computer in section 2(i)
computer network in section (2j)
data in section 2(0)
information in section 2(v).
Nature of Threat
Among the most serious challenges of the 21st century are the prevailing and
possible threats in the sphere of cybersecurity. Threats originate from all kinds of
sources, and mark themselves in disruptive activities that target individuals,
businesses, national infrastructures, and governments alike. The effects of these
threats transmit significant risk for the following −
public safety
security of nations
stability of the globally linked international community
Malicious use of information technology can easily be concealed. It is difficult to
determine the origin or the identity of the criminal. Even the motivation for the
disruption is not an easy task to find out. Criminals of these activities can only be
worked out from the target, the effect, or other circumstantial evidence. Threat
actors can operate with considerable freedom from virtually anywhere.
Criminals, terrorists, and sometimes the State themselves act as the source of these
threats. Criminals and hackers use different kinds of malicious tools and
approaches. With the criminal activities taking new shapes every day, the
possibility for harmful actions propagates.
Enabling People
The lack of information security awareness among users, who could be a simple
school going kid, a system administrator, a developer, or even a CEO of a
company, leads to a variety of cyber vulnerabilities. The awareness policy
classifies the following actions and initiatives for the purpose of user awareness,
education, and training
A complete awareness program to be promoted on a national level.
A comprehensive training program that can cater to the needs of the national
information security (Programs on IT security in schools, colleges, and
universities).
Enhance the effectiveness of the prevailing information security training
programs. Plan domain-specific training programs (e.g., Law Enforcement,
Judiciary, E-Governance, etc.)
Endorse private-sector support for professional information security
certifications.
Vision
To build a secure and resilient cyberspace for citizens, businesses, and
Government.
Create Awareness
While the U.S. government has declared October as the National Cybersecurity
Awareness month, India is following the trend to implement some stringent
awareness scheme for the general public.
The general public is partially aware of the crimes related to virus transfer.
However, they are unaware of the bigger picture of the threats that could affect
their cyber-lives. There is a huge lack of knowledge on e-commerce and online
banking cyber-crimes among most of the internet users. Some of them are:
Filter the visibility of personal information in social sites.
Do not keep the "remember password" button active for any email address
and passwords
Make sure your online banking platform is secure.
Keep a watchful eye while shopping online.
Do not save passwords on mobile devices.
Secure the login details for mobile devices and computers, etc.
Areas of Development
The "Cyber law Trends in India 2013" and "Cyber law Developments in India in
2014" are two prominent and trustworthy cyber-law related research works
provided by Perry4Law Organization (P4LO) for the years 2013 and 2014.There
are some grave cyber law related issues that deserve immediate consideration by
the government of India. The issues were put forward by the Indian cyber law
roundup of 2014 provided by P4LO and Cyber Crimes Investigation Centre of
India (CCICI). Following are some major issues:
A better cyber law and effective cyber-crimes prevention strategy.
Cyber-crimes investigation training requirements.
Formulation of dedicated encryption laws.
Legal adoption of cloud computing.
Formulation and implementation of e-mail policy.
Legal issues of online payments.
Legality of online gambling and online pharmacies.
Legality of Bitcoins.
Framework for blocking websites.
Regulation of mobile applications
With the formation of cyber-law compulsions, the obligation of banks for cyber-
thefts and cyber-crimes would considerably increase in the near future. Indian
banks would require to keep a dedicated team of cyber law experts or seek help of
external experts in this regard.
Case Study
Hacking of Iranian nuclear plant through the internet.
Explanation − A program was designed to automatically run the Iranian nuclear
plant. Unfortunately, a worker who was unaware of the threats introduced the
program into the controller. The program collected all the data related to the plant
and sent the information to the intelligence agencies who then developed and
inserted a worm into the plant. Using the worm, the plant was controlled by
miscreants which led to the generation of more worms and as a result, the plant
failed completely.
Cyber Law - Policies To Mitigate Cyber Risk
There were various policies laid to minimize cyber risk. It is only with well-
defined policies that the threats generated in the cyberspace can be reduced.
Promotion of R&D in Cybersecurity
Due to the ever-increasing dependence on the Internet, the biggest challenge
we face today is the security of information from miscreants. Therefore, it is
essential to promote research and development in cybersecurity so that we
can come up with robust solutions to mitigate cyber risks.
Cybersecurity Research
Cybersecurity Research is the area that is concerned with preparing solutions
to deal with cyber criminals. With increasing amount of internet attacks,
advanced persistent threats and phishing, lots of research and technological
developments are required in the future.
Threat Intelligence
Research work to mitigate cyber-threats is already being commenced in
India. There is a proactive response mechanism in place to deal with cyber
threats. Research and Development activities are already underway at
various research organizations in India to fight threats in cyberspace.
Authentication Techniques
Authentication techniques such as Key Management, Two Factor
Authentication, and Automated key Management provide the ability to
encrypt and decrypt without a centralized key management system and file
protection. There is continuous research happening to strengthen these
authentication techniques.
Cyber Forensics
Cyber Forensics is the application of analysis techniques to collect and
recover data from a system or a digital storage media. Some of the specific
areas where research is being done in India are
Disk Forensics
Network Forensics
Mobile Device Forensics
Memory Forensics
Multimedia Forensics
Internet Forensics
Antivirus
An antivirus is a tool that is used to detect and remove malicious software. It was
originally designed to detect and remove viruses from computers.
Modern antivirus software provide protection not only from virus, but also from
worms, Trojan-horses, adwares, spywares, key loggers, etc. Some products also
provide protection from malicious URLs, spam, phishing attacks, botnets, DDoS
attacks, etc.
Content Filtering
Content filtering devices screen unpleasant and offensive emails or webpages.
These are used as a part of firewalls in corporations as well as in personal
computers. These devices generate the message "Access Denied" when someone
tries to access any unauthorized web page or email.Content is usually screened for
pornographic content and also for violence- or hate-oriented content. Organizations
also exclude shopping and job related contents.
Content filtering can be divided into the following categories:
Web filtering
Screening of Web sites or pages
E-mail filtering
Screening of e-mail for spam
Other objectionable content
Intrusion Detection Systems
Intrusion Detection Systems, also known as Intrusion Detection and Prevention
Systems, are the appliances that monitor malicious activities in a network, log
information about such activities, take steps to stop them, and finally report them.
Intrusion detection systems help in sending an alarm against any malicious activity
in the network, drop the packets, and reset the connection to save the IP address
from any blockage. Intrusion detection systems can also perform the following
actions
Correct Cyclic Redundancy Check (CRC) errors
Prevent TCP sequencing issues
Clean up unwanted transport and network layer options
Bazee.com case
CEO of Bazee.com was arrested in December 2004 because a CD with
objectionable material was being sold on the website. The CD was also being sold
in the markets in Delhi. The Mumbai city police and the Delhi Police got into
action. The CEO was later released on bail. This opened up the question as to what
kind of distinction do we draw between Internet Service Provider and Content
Provider. The burden rests on the accused that he was the Service Provider and not
the Content Provider.
Bibliography
https://www.tutorialspoint.com/information_security_cyber_law/quick_guide.
htm
https://en.wikipedia.org/wiki/Larceny#:~:text=Traditionally%20intent%20to
%20steal%20is,possession%20of%20the%20property
%20permanently.&text=However%2C%20it%20is%20not%20a,did%20not
%20belong%20to%20him.
https://www.google.com/search?
q=hacking+meaning&oq=hacking&aqs=chrome.1.69i57j0l7.3690j0j7&sourcei
d=chrome&ie=UTF-8
http://www.legalserviceindia.com/legal/article-1019-importance-of-cyber-law-
in-india.html#:~:text=Cyber%20law%20is%20important%20because,legal
%20and%20cyber%20legal%20angles.