top of page
Search
livincameeveala

Best EBook Of Indian Cyber Crime Law



A multilayer approach to prevention is your best defense against sophisticated, carefully targeted attacks. Engaging a Managed Security Service Provider (MSSP) can help you stay ahead of attacks by fast-evolving threats. BlueVoyant provides advanced cyber threat intelligence, managed security services, and proactive professional services to businesses of all sizes.




Best EBook Of Indian Cyber Crime Law



Because of the growing cyber-crime-as-a-service (CaaS) economy, cyber attackers can now rent or buy tools for an attack. This has freed up time to research and strategically target companies more likely to pay a ransom or otherwise provide a better return on investment.


The cyber crime-as-a-service economy puts the accumulated knowledge and tools of thousands, if not millions, of hackers and cyber criminals at the fingertips of an individual attacker. This makes it easy for inexperienced hackers to rapidly stage complex attacks.


Now, hackers can use a machine to automate cyber crime activities, letting them execute thousands of attacks a day. Ransomware is becoming so common that only the largest attacks seem to garner any media attention.


Infosec goes on to explain that you could also become involved with professional cybersecurity organizations, such as the BCS Cybercrime Forensics Specialist Group and the Association of Certified Fraud Examiners (ACFE). Internships can also help you get a foot in the door.


Cybercrime is an expensive, challenging problem with $4.1 billion lost to cybercrime in 2020, which is why experienced, skilled professionals are needed. As a cybercrime investigator, you have the opportunity to truly make a difference on the front lines.


In 2017, the WannaCry and Petya (NotPetya) cyber attacks, masquerading as ransomware, caused large-scale disruptions in Ukraine as well as to the U.K.'s National Health Service, pharmaceutical giant Merck, Maersk shipping company and other organizations around the world.[65][66][67] These attacks are also categorized as cybercrimes, specifically financial crime because they negatively affect a company or group.[68]


Computer hacking represents a modern threat in ongoing global conflicts and industrial espionage and as such is presumed to widely occur.[89] It is typical that this type of crime is underreported to the extent they are known. According to McAfee's George Kurtz, corporations around the world face millions of cyberattacks a day. "Most of these attacks don't gain any media attention or lead to strong political statements by victims."[94] This type of crime is usually financially motivated.[95]


The United Arab Emirates has launched several cyber-attacks in the past targeting dissidents. Ahmed Mansoor, an Emirati citizen, was jailed for sharing his thoughts on Facebook and Twitter.[204] He was given the code name Egret under the state-led covert project called Raven, which spied on top political opponents, dissidents, and journalists. Project Raven deployed a secret hacking tool called Karma, to spy without requiring the target to engage with any web links.[205]


Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it.


Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.


Cybercrime can take many forms but they all have the digital environment in common. In general terms a good cybercrime definition would be: Offences committed to harm the reputation or cause physical or mental harm to the victim, using computers and/or networks such as the Internet or mobile networks.


Computer as a target crimes require a much higher expertise from the perpetrators and are usually committed as a group of individuals rather than loners. Given the technical expertise required to execute and the novelty of these types of crimes, these are the ones that society is more unprepared to face. Fortunately, this type of cybercrime is the least common, due to the expertise and coordination that they require. These crimes usually depend on computer viruses, malware and denial of service attacks.


Computer as a tool are much less technically unrefined crimes, thus making them way more common; on these the attacker relies on human weaknesses to exploit. These include thefts, scams and harassment, that have been existing for centuries, way before computer science started to develop. Since these are the most common cybercrimes we will be focusing on these ones for this article.


Usually, these cybercrimes are committed by impersonating trusted and popular brands creating fake social media profiles and rogue websites to lure users into them. These sites copy the appearance of the real website to create a sense of security and usually ask to fill forms with personal information to receive some kind of benefit, such as discounts. The most refined of these sites might include malicious scripts that scrap this information out of your browser, without the need of forms.


Identity theft is closely related to the phishing scams that were discussed earlier. As another computer as a tool cybercrimes, they existed much earlier than the Internet did, but it has certainly improved their reach and ease of execution.


It is very important that we, both in our personal life and in our professional one are mindful of these and other cybercrimes and keep an eye open, especially in a time of crisis when wrongdoers proliferate.


Dr. Talat Fatima's Cyber Crimes has been thoroughly revised with updated statutes, case laws, and analysis of a new league of cybercrimes that have come into existence in the past few years. Three new chapters addressing Net Neutrality, Dark Web, and Deep-fakes have been added to the third edition.


From the vacuum created by the quashing down of Section 66-A, Information Technology Act to the analysis of the statistics of the cybercrime cases in India, the author has expanded on a range of topics in this edition. New topics include Child Pornography on the Darknet, Privacy in the Artificial Intelligence Era, Data Protection Bill, 2019, Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, and more. The overlap of the IT Act, 2000 with the Penal Code, 1860 has been dealt with fresh eyes and includes the analysis of case laws to bring out the juxtaposition.


Important cases on Cyber Crimes such as R. Malkani v. the State of Maharashtra (1973) 1 SCC 471, Swami Ramdev v. Facebook Inc., 2019 SCC OnLine Del 10701, and many more important cases have been included. This widely appreciated book is a must-have for legal practitioners, researchers, Judges, students, and all those interested in the field of cybercrimes.


Today, the India IT Act of 2000 is the most important law in India dealing with ecommerce and cybercrime. It is also considered one of the strictest privacy laws in the world, and to avoid potential penalties, those who operate from India need to understand what's in it.


With almost everything of importance in our daily lives now being connected to the Internet, it makes sense to have cyberlaws or rules that govern the cyberspace. And, along with the need for cyberlaw also arises the need for cyberlawyers.Dr Karnika Seth, India's topmost cyberlawyer, sheds light on a career in the field of cyberlaw, the future of this field, the cybercrime scene in India and more. Here are excerpts from the interview.1. What is cyberlaw?Cyberlaw is the study of laws that govern the cyberspace and its emerging technologies, and netizens and their activities, responsibilities and liability.2. Why do we need cyberlaws today?Laws that deter perpetrators of crime in the offline world need application in the cyberspace as well to maintain law and order, and safeguard gullible individuals from being duped or attacked. In the absence of cyberlaws, there would be no code of ethics to follow, freedom wouldn't be respected and criminals wouldn't be punished. So, to maintain the rule of law on the Internet, we need cyberlaws.3. Share with us what prompted you to study cyberlaw for a career...The right use of technology is empowering and uplifting, but, at the same time, it is challenging to make and enforce laws on emerging technologies. This fascinates me as there is always a new challenge to work on! Also, what interests me is the dynamic nature of the Internet.4. What are the different types of cybercrimes?Some of the cybercrimes we often come across are identity theft, cheating by personation, cyberbullying, sextortion, hacking, phishing, revenge pornography, trolling, defamation, grooming, online child trafficking and extortion.5. What are some of the cybercrimes that take place in India?Cyberbullying is the most rampant crime against children, followed by phishing attacks and hacking. In fact, reliable sources indicate that there is one cybercrime committed every 10 minutes.6. What kind of cybercrimes cases do you handle? I deal with complex cases of data theft, online harassment, child grooming, hacking, identity theft, defamation, intellectual property frauds and phishing attacks. I also deal with some other types of cybercrimes. I practice law in the Supreme Court and other courts in India, and deal with both civil and criminal cases. I also advise the Government, private companies and individuals on cyberlaw issues, including policymaking such as curbing fake news, launching of e-businesses and data security.7. How does India fare when it comes to cybercrimes?Every year cybercrimes register a 10 per cent increase. Cybercrimes keep evolving and new types keep emerging such as blue whale attacks, pornography, online gambling and child trafficking. Other cybercrimes include fake news, sexting, revenge porn, ransomware and man in the middle attacks.8. Some tips to prevent falling prey to cybercrimes...All of us should do a few simple things like creating strong passwords and not sharing OTP with anyone. Also, have a two-step verification for NetBanking, install filters to prevent children from accessing content not fit for their age, and come up with strict screen time guidelines for children.9. Where can we report a cybercrime?You can do so at the nearest police station and to the website/service provider concerned at the earliest. Also, ensure that you keep electronic evidence safe by taking screenshots and printouts.10. What are the reasons behind the spurt in cybercrimes?Two major reasons include the anonymity afforded by cyberspace and the use of spoofing tools which hide the real identity of the criminal. Other reasons include the lack of awareness among the general public and training among law enforcement agencies to combat cybercrimes.11. Do you think cyberlaw is a good career option for youngsters?Yes, it is, but the field will take some time to develop into a full-fledged practice area, particularly as litigation in this sphere is very complex. However, the field of cyberlaw is definitely growing.12. What are the challenges for those opting to study cyberlaw? I chose to practice cyberlaw as I have a creative bent for this subject! Moreover, a lot of work I have done in this field is also pro bono for the government and other law enforcement bodies. Before adopting cyberlaw as a specialisation, it's necessary to practise in all other fields of law for at least 4-5 years. Having said that, I feel that a fresh law graduate should first focus on areas that will pay off, and the opportunity to be paid is perhaps higher in other fields of law.13. Some of the skills that students of cyberlaw should try to develop in themselves...Anyone interested in taking up cyberlaw for a career should engage in extensive reading, writing and research about new technologies and laws applicable thereto such as artificial intelligence and block chain technologies.14. According to you, what kind of online behaviour makes an individual prone to falling victim to cybercrime?If one acts without thinking, it can be very damaging. I have handled cases of hacking and phishing where individuals clicked on suspicious links without realising that such an action could compromise their devices. Also, the habit of sharing OTPs, leaving phones unattended, typing 'NetBanking' in a search engine instead of the URL of the bank, using ATM machines with skimmers, and careless use of plastic money increase the chances of falling victim to cybercrime.15. More parents and children are sharing their pictures and personal details on the Internet. What kind of dangers does such behaviour expose them to?Such actions can lead to many unwanted consequences. Images and videos can be easily morphed and sold on online pornographic sites. Cybercriminals may contact these kids through social media and gain more information about their families. This may lead to sexual attacks and sextortion crimes. Swindling of money may also happen, if a child shares credit card information with a stranger who promises inducements such as sending an online game to play or a free gift.16. With most of us having social media accounts, what kind of information can we safely share about ourselves?Festival pictures or dinner parties are fine but I recommend posting travel pictures and messages once the trip is over. Personal pictures of children especially bathing or changing clothes should not be posted.17. Tell us what your book, 'Computers, internet and new technology laws', delves into...It's a comprehensive reference book for lawyers, academicians, government and law enforcement officials, and everyone interested in knowing about the laws that regulate the Internet. The content of my book is simple and serves those who belong to the tech world as well as those who aren't so tech savvy. My other book, 'Protection of Children on Internet', is on best practices to maintain cyber safety. It's beneficial for children, parents, schools and teachers. On a request from the National Commission for Protection of Child Rights (NCPCR), I have also co-authored a handbook titled, 'Child Victims of Cyber Crime Legal Toolkit', which is available for free online.18. Your message to those youngsters who are interested in pursuing a career in cyber law... Be ready to put in ten times more hard work and traverse uncharted paths as cyberlaw is still evolving. Also, take keen interest in the tech world and forensics, develop good research and drafting skills, and focus on advocacy skills.Dr Karnika Seth is an internationally acclaimed cyberlawyer, policy maker, distinguished author and educator. She practices law at the Supreme Court of India and advises Government and private companies on emerging public policy challenges and compliance strategy issues such as curbing fake news or cyberdefense. She is an official trainer to National Police Academy and National Judicial Academy and law enforcement agencies, including CBI, BPR&D and NIA. She received the National Gaurav Award in 2017, Digital Empowerment Award in 2015, Law Day award in 2012, 2015, 2018 and has authored several books, ebooks and papers on cyberlaw. She spearheads a social initiative to spread cyberawareness in India in educational institutions through the not for profit, Foundation for Institutional Reform & Education. She can be contacted at karnika@sethassociates.com and mail@firengo.com.Looking for expert tips and interesting articles on parenting? Subscribe now to our magazine. Connect with us on Facebook Twitter Instagram YouTubeConnect with us onComments 2ff7e9595c


0 views0 comments

Recent Posts

See All

Download carros relâmpago

Como baixar Cars Lightning e curtir corridas com seus personagens favoritos Se você é fã do filme Carros da Disney-Pixar, talvez queira...

Comentarios


bottom of page