Prevention of Cyber Crime and Fruad Management2
Prevention of Cyber Crime and Fruad Management2
Prevention of Cyber Crime and Fruad Management2
Certificate Examination in
Prevention of Cyber Crimes and
Fraud Management
( IIBF & Other Exams)
Compiled by
OBJECTIVE:
The objective of the course is to make the bankers familiar with different types of cyber crimes
perpetrated across the globe and acquire necessary knowledge and skill to prevent the occurrence of
such crimes in organizations.
DIPLOMA IN INFORMATION SYSTEM AUDIT (DISA)
Candidates who clear all the following three Certificate examinations under the revised syllabus will be
given a "DIPLOMA IN INFORMATION SYSTEM AUDIT (DISA)" from May 2017 :
a) Certificate Examination in IT Security (Revised Syllabus)
(Revised Syllabus)
c) Certificate Examination in Information System Banker (Revised Syllabus)
Candidates who clear all the above three Certificates under revised syllabus will however have to apply
for DISA certificate by paying Rs.500/- plus taxes as applicable.
For candidates who have already cleared any or all the above three examinations under the old syllabus,
i.e. prior to May 2017 need to apply and clear the examination under revised syllabus to become eligible
for DISA Certificate.
ELIGIBILITY
i) Employees of a Bank or Financial Institutions.
SUBJECT OF EXAMINATION
Cyber Crimes and Fraud Management
PASSING CRITERIA:
Minimum marks for pass in the subject is 50 out of 100.
EXAMINATION For Members For Non-Members
FEES* :
Particulars
First attempt Rs.1,000/- * Rs.1,500/- *
Subsequent each Rs.1,000/- * Rs.1,500/- *
attempt
Please Note : Candidates are required to Register for every attempt separately.
As a measure to streamline the traffic for registration, Institute will charge regular examination fee to
candidates who registers for the examination during the regular open period of registration. For the
extended days of registration, late fee of Rs.200 plus taxes, will be charged in addition to regular
examination fee. This extended days of registration, also gives candidates addition opportunity to register
for the examination, having missed the regular open period of registration.
The fee once paid will NOT be refunded or adjusted on any account.
MEDIUM OF EXAMINATION :
Examination will be conducted in English only.
PATTERN OF EXAMINATION:
(i) Question Paper will contain 120 objective type multiple choice questions for 100 marks.
b) List of Examination centers will be available on the website. (Institute will conduct examination in those
centers where there are 20 or more candidates.)
(ii) In respect of the examinations to be conducted by the Institute for the period August to January of a
calendar year, instructions / guidelines issued by the regulator(s) and important developments in banking
and finance up to 30th June will only be considered for the purpose of inclusion in the question papers.
INDEX
2. Syllabus
Certificate Examination in Prevention of Cyber Crimes and Fraud Management
The details of the prescribed syllabus which is indicative are furnished below. The Institute however,also
reserves to itself the right to vary the syllabus / rules / fee structure from time to time. Any alterations
made will be notified.
4. Computer Insecurity
• Bank Failure
5. Computer Hackers
Module - B :
Fraud Management :
6. Computer Fraud Protection
• Prevention Controls
• Detection Controls
• Mitigation Controls
• Encryption / Decryption
• Cyber Forensics
Module - C :
Electronic Transactions :
8. Online Transactions - (Concepts, Emerging Trends and Legal Implications)
• Associates
• Behavior
- “Integrity” means safeguarding the accuracy and completeness of information and processing methods
Non repudiation will tell creator ,sender,receiver& network providers has own responsibilty to send
message to next stage properly.
Authorisation will confirm the authorized user access
Authentication will authenticated the type of transaction by the user
1 factor Authentification 1FA.. simply PIN access
2FA …. OTP & PIN
3FA….2FA+ Biometric access
Electronic Signature As per Section 2(ta) of the IT Act, as inserted by the Amendment Act,
‘Electronic Signature’ means the authentication of any electronic record by a subscriber by means of
the electronic techniques specified in the Second Schedule to the IT Act and includes digital
signature.‘Electronic Signature Certificate’ has been defined as an Electronic Signature Certificate
issued under Section 35 and includes Digital SignatureCertificate [Section 2(tb)]. (As per Section 35,
any person can make an application to the Certifying Authority for the issue of a Electronic Signature
Certificate, by paying the prescribed fee and giving such other details) A new Section has been
inserted as Section 3A, wherein it is stated that notwithstanding anything in respect of the
authentication of an electronic record by affixing digital signature (under Section 3), a subscriber may
authenticate any electronic record by such electronic signature or electronic authentication technique
which is considered reliable and may be specified in the Second Schedule. For this purpose, an
electronic signature or electronic authentication technique shall be considered reliable, if –
(i) the signature creation data or the authentication data are, withinthe context in which they are used,
linked to the signatory or, as the case may be, the authenticator and no other person;
(ii) the signature creation data or the authentication data were, at the time of signing, under the control of
the signatory or, as the case may be, the authenticator and of no other person;
(iii) any alteration to the electronic signature made after affixing such signature is detectable;
(v) electronic signature should also fulfil such other conditions which may be prescribed under the rules.
CRYPTOGRAPHY
Asymmetric encryption: In this encryption technique the sender encrypts the message with the receiver’s
public key and the receiver decrypts the information with recipient’s private key. Hence this technique is
called public key encryption. Examples are: Diffie-Hellman, RSA, ECC, ElGamal, DSA etc.
Among the various models of symmetric cipher analyzed the Rijndael is the best. Actually it is the role
model of DES and AES. This model is adopted by different information security agencies like NSA, NIST
and FIPS.
Among the various asymmetric ciphers, RSA is a moderate and most useful cipher for small data
encryption like digital signature, ATM Pin etc.
But as discussed above, RSA (asymmetric technique) is much slower than Rijndael (symmetric technique)
and other symmetric cipher techniques. But the scalability of asymmetric cryptosystem is far higher than
the symmetric cryptosystem. Thus where the number of users is huge and required keys are very high,
asymmetric cryptosystem proves to be superior.
Phishing: Phishing is the fraudulent practice of sending emails purporting to be from reputable
companies in order to induce individuals to reveal personal information, such as passwords and
credit card numbers. Phishing has become rampant now a days and entities worldwide have lost
their sensitive data and money.
Spoofing: In the context of computer security, a spoofing attack is a situation in which one person or
program successfully pretending as another by falsifying data, thereby gaining an illegitimate
advantage. Spoofing is of two types. (1) Email spoofing is the creation of email messages with a
forged sender address. Because the core email protocols do not have any mechanism for
authentication, it is common for spam and phishing emails to use such spoofing to mislead the
recipient about the origin of the message. (2) Network spoofing-in computer networking, IP address
spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address,
for the purpose of hiding the identity of the sender or impersonating another computing system.
Sniffing: Sniffing is the act of intercepting and inspecting data packets using sniffers (software or
hardware devices) over the network. On the other hand, Spoofing is the act of identity
impersonation. Packet sniffing allows individuals to capture data as it is transmitted over a network
and is used by network professionals to diagnose network issues, and by malicious users to capture
unencrypted data, like passwords and usernames.
Spamming: Electronic spamming is the use of electronic messaging systems to send an unsolicited
message (spam), especially advertising, as well as sending messages repeatedly on the same site.
While the most widely recognized form of spam is email spam, the term is applied to similar abuses
in other media too. Spam can also be used to spread computer viruses, Trojan or other malicious
software. The objective may be identity theft, or worse (e.g., advance fee fraud). Some spam
Some examples of ransomware are Reveton, Cryptolocker, Cryptowall, Fusob and WannaCry. Wide-
ranging attacks involving encryption-based ransomware began to increase through Trojans such as
CryptoLocker, which had procured an estimated US$3 million before it was taken down by authorities,
and CryptoWall, which was estimated by the US Federal Bureau of Investigation (FBI) to have accrued
over $18m as ransom money by the attackers by June 2015.
In May 2017, the WannaCry ransomware attack spread through the Internet, using an exploit vector that
Microsoft had issued a "Critical" patch for (MS17-010) two months before on March 14, 2017. The
ransomware attack infected lakhs of users in over 150 countries, using 20 different languages to demand
money from users.
Against Phishing attacks, obviously there cannot be an antivirus tool for checking. Only appropriate user
education and generating awareness can prevent or reduce phishing menace
Spoofing attacks which take advantage of TCP/IP suite protocols may be mitigated with the use of
firewalls capable of deep packet inspection or by taking measures to verify the identity of the sender or
recipient of a message
To protect against sniffing, we need to encrypt all important data we send or receive, scan our networks
for any issues or dangers and use only trusted Wi-Fi networks.
To prevent spamming, most of the email services, viz., Gmail, Yahoo, Hotmail etc. provide filtering
facilities and also enable users to categorize certain messages as spam.
Best measures for protection against ransomware are taking regular backups of data, applying OS
patches regularly and using latest anti-malware solution.
2. Illegally using someone else’s computer or “posing” as someone else on the internet
5. Pyramid schemes or investment schemes via computer with the intent to take and use
someone else’s money
6. Emails attempting to gather personal information used to access and use credit cards or social
security numbers
9. Hacking into computer systems to gather large amounts of information for illegal
purposes
10. Hacking into or illegally using a computer to change information such as grades, work, reports,
etc.
11. Sending computer viruses or worms with the internet to destroy or ruin someone else’s
computer
Precautions
Refrain from opening e-mail and e-mail attachments from individuals you do not know. Have ALL external
storage devices scanned by virus-scanning software before inserted on your PC. Secure your Internet
Web browsing.
A new Section 43A has been inserted to protect sensitive personal data or information possessed, dealt
or handled by a body corporate in a computer resource which such body corporate owns, controls or
operates. If such body corporate is negligent in implementing and maintaining reasonable security
practices and procedures and thereby causes wrongful loss or wrongful gains to any person, such body
corporate shall be liable to pay damages by way of compensation to the person so affected. The
explanation to Section 43A defines ‘body corporate’ as any company including a firm, sole proprietorship
or other association of individuals engaged in commercial or professional activities. Further, ‘reasonable
security practices and procedures’ means security practices and procedures designed to protect such
information from unauthorised access, damage, use, modification, disclosure or impairment, as may be
specified in an agreement between the parties or as may be specified in any law for thetime being in force
and in the absence of such agreement or any law, suchreasonable security practices and procedures as
may be prescribed by theCentral Government in consultation with such professional bodies rassociations
as it may deem fit. ‘Sensitive personal data or information’means such personal information as may be
with Computer System’ has been substituted with a new Section titled as
dishonestly or fraudulently does any act for damage to computer system, etc.
which may extend to three years or with fine which may extend to Rs.5 lacs or
with both. For the purpose of this Section, the words ‘dishonestly’ and
Indian Penal Code respectively.A host of new Sections have been added after Section 66 as Sections
66A to 66F prescribing punishment for offences such as, obscene electronic
through communication services, etc. As per this section, any person who
character; or
(ii) any information which he knows to be false, but for the purpose
communication device; or
For the purpose of above stated Section, terms ‘electronic mail’ and
audio, video and any other electronic record, which may be transmitted with
the message.
Section 66B deals with the punishment for dishonestly receiving stolen
or with fine which may extend to one lac rupees or with both.
Section 66C deals with the punishment for identity, theft. As per this
which may extend to three years and shall also be liable to fine which may
using computer resource. As per this Section, whoever by means for any
punished with the imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to one
lac rupees.
transmits the image of a private area of any person without his or her consent
with imprisonment which may extend to three years or with fine not exceeding
Section 66F deals with the punishment for cyber terrorism. As per this
punishable with imprisonment which may extend imprisonment for life. The
to access computer resources; or(ii) attempting to penetrate or access a computer resource without
information, infrastructure specified under the Section 70 dealing with protected system.
The advancement of technology has made man dependent on Internet for all his needs. Internet has
given man easy access to everything while sitting at one place. Social networking, online shopping,
storing data, gaming, online studying, online jobs, every possible thing that man can think of can be done
through the medium of internet. Internet is used in almost every sphere. With the development of the
internet and its related benefits also developed the concept of cyber crimes. Cyber crimes are committed
in different forms. A few years back, there was lack of awareness about the crimes that could be
committed through internet. In the matters of cyber crimes, India is also not far behind the other countries
where the rate of incidence of cyber crimes is also increasing day by day.
In a report published by the National Crime Records Bureau report (NCRB 2011), the incidence of cyber
crimes under the IT Act has increased by 85.4% in the year 2011 as compared to 2010 in India, whereas
the increase in incidence of the crime under IPC is by 18.5% as compared to the year 2010.
Visakhapatnam records the maximum number of incidence of cases. Maharashtra has emerged as the
center of cyber crime with maximum number of incidence of registered cases under cyber crimes.
Hacking with computer systems and obscene publication were the main cases under IT Act for cyber
crimes. Maximum offenders arrested for cyber crimes were in the age group 18-30 years. 563 people in
the age group 18-30 years were arrested in the year 2010 which had increased to 883 in the year 2011.
Cyber crime is a broad term that is used to define criminal activity in which computers or computer
networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking
to denial of service attacks. It also covers the traditional crimes in which computers or networks are used
to enable the illicit activity.
1. The crimes in which the computer is the target. Examples of such crimes are hacking, virus attacks,
DOS attack etc.
2. The crime sin which the computer is used as a weapon. These types of crimes include cyber terrorism,
IPR violations, credit card frauds, EFT frauds, pornography etc.
3. Cyber Stalking:
In general terms, stalking can be termed as the repeated acts of harassment targeting the victim such as
following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property,
leaving written messages or objects. Stalking may be followed by serious violent acts such as physical
harm to the victim. Cyber Stalking means repeated acts of harassment or threatening behavior of the
cyber criminal towards the victim by using internet services. Both kind of Stalkers i.e., Online & Offline –
have desire to control the victims life.
a. The stalker may post this information on any website related to sex-services or dating services,
posing as if the victim is posting this information and invite the people to call the victim on her telephone
numbers to have sexual services. Stalker even uses very filthy and obscene language to invite the
interested persons.
b. People of all kind from nook and corner of the World, who come across this information, start
calling the victim at her residence and/or work place, asking for sexual services or relationships.
c. Some stalkers subscribe the e-mail account of the victim to innumerable pornographic and sex
sites, because of which victim starts receiving such kind of unsolicited e-mails.
d. Some stalkers keep on sending repeated e-mails asking for various kinds of favors or threaten
the victim.
e. In online stalking the stalker can make third party to harass the victim.
f. Follow their victim from board to board. They “hangout” on the same BB’s as their victim, many
times posting notes to the victim, making sure the victim is aware that he/she is being followed. Many
times they will “flame” their victim (becoming argumentative, insulting) to get their attention.
g. Stalkers will almost always make contact with their victims through email. The letters may be
loving, threatening, or sexually explicit. He will many times use multiple names when contacting the victim.
h. Contact victim via telephone. If the stalker is able to access the victim’s telephone, he will many
times make calls to the victim to threaten, harass, or intimidate them.
i. Track the victim to his/her home.
6. Software Piracy:
Software piracy refers to the illegal copying of genuine programs or the counterfeiting and distribution of
products intended to pass for the original. These kind of crimes also include copyright infringement,
trademarks violations, theft of computer source code, patent violations etc.
Domain names are also trademarks and protected by ICANN’s domain dispute resolution policy and also
under trademark laws. Cyber squatters register domain name identical to popular service provider’s name
so as to attract their users and get benefit from them .
7. Salami attacks :
These attacks are used for the commission of financial crimes. The key here is to make the alteration so
insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a
program, into the bank’s servers, that deducts a small amount of money (say Rs. 5 a month) from the
account of every customer. No account holder will probably notice this unauthorized debit, but the bank
employee will make a sizable amount of money every month.
8. Phishing:
Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate
enterprise in an attempt to scam the user into surrendering private information that will be used for
identity theft. The e-mail directs the user to visit a web site where they are asked to update personal
information, such as passwords and credit card, social security, and bank account numbers that the
legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s
information. By spamming large groups of people, the phisher counted on the e-mail being read by a
percentage of people who actually had listed credit card numbers with legitimately.
13. Forgery:
2. CYBER LAWS
The real power of today's Internet is that it is available to anyone with a computer and a telephone line.
Internet places at an individual's hands the immense and invaluable power of information and
communication.
Internet usage has significantly increased over the past few years. The number of data packets which
flowed through the Internet have increased dramatically. According to International Data Corporation
("IDC"), approximately 163 million individuals or entities will use the Internet by the end of this year as
opposed to 16.1 million in 1995. If left to its own measure, it is highly unlikely that such a trend can
reverse itself. Given this present state of the Internet, the necessity of Cyberlaws becomes all the more
important.
When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet
could transform itself into an all pervading revolution which could be misused for criminal activities and
which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the
anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity
and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal
activities in cyberspace. Hence the need for Cyberlaws.
Internet is believed to be full of anarchy and a system of law and regulation therein seems contradictory.
However, cyberspace is being governed by a system of law and regulation called Cyberlaw. There is no
one exhaustive definition of the term “Cyberlaw”. Simply speaking, Cyberlaw is a generic term which
refers to all the legal and regulatory aspects of Internet and the World Wide Web. Anything concerned
with or related to or emanating from any legal aspects or issues concerning any activity of netizens and
others, in Cyberspace comes within the ambit of Cyberlaw. The growth of Electronic Commerce has
propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the
legal infrastructure, so crucial to the success of Electronic Commerce. All these regulatory mechanisms
and legal infrastructures come within the domain of Cyberlaw.
Importance of Cyberlaw
Cyberlaw is important because it touches almost all aspects of transactions and activities on and
concerning the Internet, the World Wide Web and Cyberspace. Initially it may seem that Cyberlaws is a
very technical field and that it does not have any bearing to most activities in Cyberspace. But the actual
truth is that nothing could be further than the truth. Whether we realize it or not, every action and every
reaction in Cyberspace has some legal and Cyber legal perspectives.
Cyber crimes are anew class of crimes which are increasing day by day due to extensive
use of internet these days. To combat the crimes related to internet The Information Technology Act,
2000 was enacted with prime objective to create an enabling environment for commercial use of I.T. The
IT Act specifies the acts which have been made punishable. The Indian Penal Code, 1860 has also been
The various offenses related to internet which have been made punishable under the IT Act and the IPC
are enumerated below:
Online sale of Drugs under Narcotic Drugs and Psychotropic Substances Act
Online sale of Arms Arms Act
Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or
threaten someone. This crime can be perpetrated through email, social media, chat rooms, instant
messaging clients and any other online medium. Cyberstalking can also occur in conjunction with the
more traditional form of stalking, where the offender harasses the victim offline. There is no unified legal
approach to cyberstalking, but many governments have moved toward making these practices punishable
by law.
IP address :
The Internet is a network of computers. Each computer on the said network has its own distinct entity and
presence. That is the reason why every computer is given a distinct Electronic Address called the Internet
Protocol address or in short IP address. This IP address is given by numerical values like 202.54.15.75.
The IP address is just like any telephone number which identifies a particular computer on the Internet.
Domain Name :
Since it is not possible to remember each and every numerical value of an IP address, the system of
domain names evolved. Internet domain names, in a common man's language, are used as an easy-to-
remember alias which point to a specific IP address. The dominant purpose of the domain name is simply
to provide an easy method for remembering another's electronic address. It's a unique name used to
identify, among other things, a specific Web site. Thus a typical domain name would be http://
www.iibf.org
Any domain name consist of two components, namely the top level domain name(TLD) and a second
level domain name. Thus in the said example, http://www.iibf.org, ".org" would be the top level domain
name while "iibf" would be second level domain name.
As on date, there are two categories of top level domain names. In the first category comes the domain
names .com, .net, .org, .edu. When the system of registering domain names began, the norms were that
the .com name is to be given to commercial organizations, while others such as .org, .net, .gov and .edu
are to be assigned to non-commercial organizations, network providers, government agencies and
educational institutions respectively. However, as time has passed, due to the enhanced volumes of
domain name registrations, the said norms have been abandoned and today anyone can, without any
restriction of any kind whatsoever, can register any domain name.
The second category of top level domain names is the country code TLDs denoted by a two letter country
code. For instance, the top level domain name for India is .in. The responsibility for assigning the same is
given in each country to a specified country domain name registrar. In India, the TLD.in is registered by
NCST at Bombay.
The domain names were initially registered by Network Solutions only, who had the sole monopoly to
register the said TLDs. This monopoly of Network Solutions continued for many years and only in 1999,
the Internet Corporation Assigned Names and Numbers (ICANN) allowed other accredited registrars to
register domain names. Today there are more than 100 registrars with whom one can register a TLD.
The unique feature of domain names is that the said domain names are given on "first come, first served"
basis. This feature of domain names gives rise to numerous legal issues and disputes. Thus the
important thing in domain names registration is speed. To take an example, the domain name
www.microsoft.org was available and was registered by Amit Mehrotra much before Microsoft Corporation
could think of it. This led to numerous ticklish legal issues. Microsoft Corporation, despite having the
To put it simply, Domain names are indeed different from trademarks. While it is possible that the same
trademark may be registered by different persons in different categories and different lines of businesses,
it may be possible to only register one domain name corresponding to such trademark. This aspect of
domain names has led to numerous legal problems.
Another legal issue surrounding domain names is that of Cybersquatting. Cybersquatting is the practice
by means of which a person or legal entity books up the trade mark, business name or service mark of
another as his own domain name for the purpose of holding on to it and thereafter selling the same
domain name to the other person for valuable premium and consideration. Cybersquatters book up
domain names of important brands in the hope of earning quick millions .
The Internet history has shown that while some corporate players have been willing to and have indeed
coughed up money to get back their legitmate domain names, the recent trend is more towards taking the
cybersquatters by the horns and fighting them out by legal processes. Courts throughout the world,
including in India, have been proactive and have been granting injunctions to stop cybersquatters from
operating their web sites.
The latest breath of fresh air in the fight against Cybersquatting has been the Uniform Domain Name
Dispute Resolution Policy which has been duly approved by ICANN. Under the said Domain Names
Dispute Resolution Policy, a summary procedure is adopted to adjudicate the complaint of any
complainant relating to any domain name on payment of processing fees. This policy has been in
operation since the end of last year.
Under the said policy, Indian companies are also beginning to get back their legitimate domain names.
The domain name www.theeconomictimes.com and www.timesofindia.com have been won back under
the said policy. Two recent success for Indian Companies under the said policy include winning back the
domain names www.tata.org and www.philipsindia.com by TATA and Philips India respectively.
Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or
some other response in return for stopping or remediating the attack.
Cyber-extortion can come in many different forms, but at its simplest, it is when someone online threatens
some sort of harm unless you meet their demands.
For example, the cybercriminal may use "ransomware" to encrypt your data, which means you can't read
your data without the encryption key – and the cybercriminal will withhold this key until payment is made.
A hacker overwhelms a target’s server with malicious traffic. Typically, the attacker will use a botnet (i.e.,
a network of infected computers) to generate a flood of traffic on the server.
The traffic sends more connection requests than a server can handle. Or, the botnet sends the target
huge amounts of data to use up its bandwidth
.
The target’s site is shut down. Believe it or not, some people pay extortionists to silence websites they
don’t like. Shutting down a small site or keeping a small organization offline for a week can cost as little
as 10000/-
If a business doesn’t meet the extortionist’s demands, the hacker could keep the site offline long enough
to run the business into the ground. Or, the hacker may be able to remotely access control panels and
start deleting files necessary to keep the site or business running.
Any of your…
Websites.
Computer systems.
Severs.
The attackers will only cease and desist when their demands have been met. Because most small
businesses operate with the help of computers, cyber extortion is a growing problem.
Sabotage: Military and financial computer systems are at risk for the disruption of normal
operations and equipment, such as communications, fuel, power and transportation
infrastructures.
A premeditated attack against a computer system, computer data, programs and other information with
the sole aim of violence against clandestine agents and subnational groups. The main aim behind cyber
terrorism is to cause harm and destruction.
Cyber terrorism can be explained as internet terrorism. With the advent of the internet, individuals and
groups are misusing the anonymity to threaten individuals, certain groups, religions, ethnicities or beliefs.
Cyber terrorism can be broadly categorized under three major categories:
Simple: This consists of basic attacks including the hacking of an individual system.
Advanced: These are more sophisticated attacks and can involve hacking multiple systems
and/or networks.
Complex: These are coordinated attacks that can have a large-scale impact and make use of
sophisticated tools
3.7 Phishing
Phishing is the fraudulent act of acquiring private and sensitive information, such as credit card numbers,
personal identification and account usernames and passwords. Using a complex set of social engineering
techniques and computer programming expertise, phishing websites lure email recipients and Web users
into believing that a spoofed website is legitimate and genuine. In actuality, the phishing victim later
discovers his personal identity and other vital information have been stolen and exposed.
Similar to fishing in a lake or river, phishing is computer lingo for fishing over the Internet for personal
information. The term was first used in 1996, when the first phishing act was recorded.
Phishing uses link manipulation, image filter evasion and website forgery to fool Web users into thinking
that a spoofed website is genuine and legitimate. Once the user enters vital information, he immediately
becomes a phishing victim.
Fortunately, phishing victimization is preventable. The following security precautions are recommended:
Use updated computer security tools, such as anti-virus software, spyware and firewall.
Never open unknown or suspicious email attachments.
Never divulge personal information requested by email, such as your name or credit card number.
Double check the website URL for legitimacy by typing the actual address in your Web browser.
Verify the website's phone number before placing any calls to the phone number provided via
ema
3.8 Vishing
Vishing is the illegal access of data via voice over Internet Protocol (VoIP).
Vishing is IP telephony’s version of phishing and uses voice messages to steal identities and financial
resources. The term is a combination of "voice" and "phishing."
Vishing attacks are designed to generate fear and immediate response and therefore occur within short
time frames. They are difficult to trace.
For example, a vishing perpetrator (visher) may gain access to a group of private customer phone
3.9 Smishing
SMS phishing occurs when a cell phone receives a SMS (Instant Message or IM) from a fake person or
entity. The unsuspecting cell phone user will respond to a fake SMS and visit a URL, inadvertently
downloading malware and installing a Trojan without the user's knowledge. Phishing is all about
extracting useful information, so in the case of SMS phishing, the Trojan harvests the data areas of the
cellphone and transmits them to the person who created the Trojan at the earliest opportunity.
SMS phishing attempts occur when cell phone user is the recipient of a message acknowledging receipt
of an unknown purchase. To terminate bogus purchases and avoid monthly or daily charges, consumers
are directed to phishing websites. Unknowingly, customers go directly to the website, allowing hackers to
access personal cell phone information. SMS phishing has become increasingly prevalent on social
website networks, such as Facebook.
SMS Phishing is a way of performing identity theft, as the inadvertently downloaded malware captures
and transmits all of the stored cellphone data, including stored credit card details, names, addresses and
other data, like password details for email accounts, which, when opened, increase the vulnerability of
online banking and other accounts.
The malware can then cover its tracks by wiping the phone clean, including all call records, causing
repeated rebooting or similar odd behavior rendering the phone unusable. Thus, the original phishing
attack is easily unnoticed by the user.
Viruses and phishing scams are far reaching to all types of digital devices. Wise consumers should
choose their products according to available product security software and data recovery technologies.
3.10 Pharming
Pharming refers to redirecting website traffic through hacking, whereby the hacker implements tools that
redirect a search to a fake website. Pharming may cause users to find themselves on an illegitimate
website without realizing they have been redirected to an impostor site, which may look exactly like the
real site.
Pharming occurs when hackers locate vulnerabilities in domain name server (DNS) software. Pharming
can also occur by rearranging the host’s file on the targeted computer. Online banking websites as well
as e-commerce organizations have become popular pharming targets. Desktops are also vulnerable to
pharming threats due to their lack of security administration. Pharming and phishing threats have been
used simultaneously and these can cause the most potential for online identity theft. Unfortunately, anti
virus and anti-spyware software are often incapable of protecting against this type of cybercrime
Routers have been surfacing as being just as vulnerable to pharming as hosts files. Unfortunately, router
pharming is much more difficult to detect. Harmful DNS information can land on routers in two ways:
Pharming is certainly nothing new, but it is being used more often and is causing increasing harm in the
computing world. Computer experts point the finger of blame at domain registrars for security loopholes
and a general lack of standards for keeping domains exclusive. Suggestions for mitigating these
problems include asking registrars for their written policies as well as insisting on immediate notification
should a registrar receive a domain move request. Other suggestions include keeping domains locked
and keeping authoritative contact information current, as well as using registrars with round-the-clock
availability. If none of these suggestions works in preventing pharming, contacting VeriSign, which is the
domain registry for .com and .net, may be useful
4.COMPUTER INSECURITY
Most current real-world computer security efforts focus on external threats, and generally treat the
computer system itself as a trusted system. Some knowledgeable observers consider this to be a
disastrous mistake, and point out that this distinction is the cause of much of the insecurity of current
computer systems - once an attacker has subverted one part of a system without fine-grained security, he
or she usually has access to most or all of the features of that system. [citation needed] Because
computer systems can be very complex, and cannot be guaranteed to be free of defects, this security
stance tends to produce insecure systems.
The 'trusted systems' approach has been predominant in the design of many Microsoft software products,
due to the long-standing Microsoft policy of emphasizing functionality and 'ease of use' over security.
Since Microsoft products currently dominate the desktop and home computing markets, this has led to
unfortunate effects. However, the problems described here derive from the security stance taken by
software and hardware vendors generally, rather than the failing of a single vendor. Microsoft is not out of
line in this respect, just far more prominent with respect to its consumer marketshare.
It should be noted that the Windows NT line of operating systems from Microsoft contained mechanisms
to limit this, such as services that ran under dedicated user accounts, and Role-Based Access Control
Financial cost
Serious financial damage has been caused by computer security breaches, but reliably estimating costs
is quite difficult. Figures in the billions of dollars have been quoted in relation to the damage caused by
malware such as computer worms like the Code Red worm, but such estimates may be exaggerated.
However, other losses, such as those caused by the compromise of credit card information, can be more
easily determined, and they have been substantial, as measured by millions of individual victims of
identity theft each year in each of several nations, and the severe hardship imposed on each victim, that
can wipe out all of their finances, prevent them from getting a job, plus be treated as if they were the
criminal. Volumes of victims of phishing and other scams may not be known.
Individuals who have been infected with spyware or malware likely go through a costly and time-
consuming process of having their computer cleaned. Spyware and malware is considered to be a
problem specific to the various Microsoft Windows operating systems, however this can be explained
somewhat by the fact that Microsoft controls a major share of the PC market and thus represent the most
prominent target.
Reasons
There are many similarities (yet many fundamental differences) between computer and physical security.
Just like real-world security, the motivations for breaches of computer security vary between attackers,
sometimes called hackers or crackers. Some are teenage thrill-seekers or vandals (the kind often
responsible for defacing web sites); similarly, some web site defacements are done to make political
statements. However, some attackers are highly skilled and motivated with the goal of compromising
computers for financial gain or espionage. An example of the latter is Markus Hess who spied for the
KGB and was ultimately caught because of the efforts of Clifford Stoll, who wrote an amusing and
accurate book, The Cuckoo's Egg, about his experiences. For those seeking to prevent security breaches,
the first step is usually to attempt to identify what might motivate an attack on the system, how much the
continued operation and information security of the system are worth, and who might be motivated to
breach it. The precautions required for a home PC are very different for those of banks' Internet banking
system, and different again for a classified military network. Other computer security writers suggest that,
since an attacker using a network need know nothing about you or what you have on your computer,
attacker motivation is inherently impossible to determine beyond guessing. If true, blocking all possible
attacks is the only plausible action to take.
Vulnerabilities
To understand the techniques for securing a computer system, it is important to first understand the
various types of "attacks" that can be made against it. These threats can typically be classified into one of
these seven categories:
Exploits
Software flaws, especially buffer overflows, are often exploited to gain control of a computer, or to cause
it to operate in an unexpected manner. Many development methodologies used by embedded software
licensing professionals rely on testing to ensure the quality of any code released;; this process often fails
to discover extremely unusual potential exploits. The term "exploit" generally refers to small programs
Eavesdropping
Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified by a
malicious person. Even machines that operate as a closed system (ie, with no contact to the outside
world) can be eavesdropped upon via monitoring the faint electro-magnetic transmissions generated by
the hardware such as TEMPEST. The FBI's proposed Carnivore program was intended to act as a
system of eavesdropping protocols built into the systems of internet service providers.
A computer system is no more secure than the human systems responsible for its operation. Malicious
individuals have regularly penetrated well-designed, secure computer systems by taking advantage of the
carelessness of trusted individuals, or by deliberately deceiving them, for example sending messages that
they are the system administrator and asking for passwords. This deception is known as Social
engineering.
Denial of service (DoS) attacks differ slightly from those listed above, in that they are not primarily a
means to gain unauthorized access or control of a system. They are instead designed to render it
unusable. Attackers can deny service to individual victims, such as by deliberately guessing a wrong
password 3 consecutive times and thus causing the victim account to be locked, or they may overload the
capabilities of a machine or network and block all users at once. These types of attack are, in practice,
very hard to prevent, because the behavior of whole networks needs to be analyzed, not only the
behaviour of small pieces of code. Distributed denial of service (DDoS) attacks are common, where a
large number of compromised hosts (commonly referred to as "zombie computers") are used to flood a
target system with network requests, thus attempting to render it unusable through resource exhaustion.
Another technique to exhaust victim resources is through the use of an attack amplifier - where the
attacker takes advantage of poorly designed protocols on 3rd party machines, such as FTP or DNS, in
order to instruct these hosts to launch the flood. There are also commonly vulnerabilities in applications
that cannot be used to take control over a computer, but merely make the target application malfunction
or crash. This is known as a denial-of-service exploit.
Indirect attacks
Attacks in which one or more of the attack types above are launched from a third party computer which
has been taken over remotely. By using someone else's computer to launch an attack, it becomes far
more difficult to track down the actual attacker. There have also been cases where attackers took
advantage of public anonymizing systems, such as the tor onion router system.
Backdoors
Methods of bypassing normal authentication or giving remote access to a computer to somebody who
knows about the backdoor, while intended to remain hidden to casual inspection. The backdoor may take
the form of an installed program (e.g., Back Orifice) or could be in the form of an existing "legitimate"
program, or executable file. A specific form of backdoors are rootkits, which replaces system binaries
and/or hooks into the function calls of the operating system to hide the presence of other programs, users,
services and open ports. It may also fake information about disk and memory usage.
Someone gaining physical access to a computer can install all manner of devices to compromise security,
including operating system modifications, software worms, key loggers, and covert listening devices. The
attacker can also easily download large quantities of data onto backup media, for instance CD-R/DVD-R,
tape; or portable devices such as keydrives, digital cameras or digital audio players. Another common
technique is to boot an operating system contained on a CD-ROM or other bootable media and read the
data from the harddrive(s) this way. The only way to defeat this is to encrypt the storage media and store
the key separate from the system.
Reducing vulnerabilities
Computer code is regarded by some as just a form of mathematics. It is theoretically possible to prove the
correctness of computer programs though the likelihood of actually achieving this in large-scale practical
systems is regarded as unlikely in the extreme by some with practical experience in the industry -- see
Bruce Schneier et al.
It's also possible to protect messages in transit (ie, communications) by means of cryptography. One
method of encryption —the one-time pad —has been proven to be unbreakable when correctly used. This
method was used by the Soviet Union during the Cold War, though flaws in their implementation allowed
some cryptanalysis (See Venona Project). The method uses a matching pair of key-codes, securely
distributed, which are used once-and-only-once to encode and decode a single message. For transmitted
computer encryption this method is difficult to use properly (securely), and highly inconvenient as well.
Other methods of encryption, while breakable in theory, are often virtually impossible to directly break by
any means publicly known today. Breaking them requires some non-cryptographic input, such as a stolen
key, stolen plaintext (at either end of the transmission), or some other extra cryptanalytic information.
Social engineering and direct computer access (physical) attacks can only be prevented by non-computer
means, which can be difficult to enforce, relative to the sensitivity of the information. Even in a highly
disciplined environment, such as in military organizations, social engineering attacks can still be difficult to
foresee and prevent.
In practice, only a small fraction of computer program code is mathematically proven, or even goes
through comprehensive information technology audits or inexpensive but extremely valuable computer
security audits, so it's usually possible for a determined cracker to read, copy, alter or destroy data in well
secured computers, albeit at the cost of great time and resources. Extremely few, if any, attackers would
audit applications for vulnerabilities just to attack a single specific system. You can reduce a cracker's
chances by keeping your systems up to date, using a security scanner or/and hiring competent people
responsible for security. The effects of data loss/damage can be reduced by careful backing up and
insurance.
Security measures
A state of computer "security" is the conceptual ideal, attained by the use of the three processes:
1. Prevention,
2. Detection, and
3. Response.
* User account access controls and cryptography can protect systems files and data, respectively.
* Firewalls are by far the most common prevention systems from a network security perspective as they
Today, computer security comprises mainly "preventive" measures, like firewalls or an Exit Procedure. A
firewall can be defined as a way of filtering network data between a host or a network and another
network, such as the Internet, and is normally implemented as software running on the machine, hooking
into the network stack (or, in the case of most UNIX-based operating systems such as Linux, built into the
operating system kernel) to provide realtime filtering and blocking. Another implementation is a so called
physical firewall which consists of a separate machine filtering network traffic. Firewalls are common
amongst machines that are permanently connected to the Internet (though not universal, as
demonstrated by the large numbers of machines "cracked" by worms like the Code Red worm which
would have been protected by a properly-configured firewall). However, relatively few organizations
maintain computer systems with effective detection systems, and fewer still have organised response
mechanisms in place.
Responding forcefully to attempted security breaches (in the manner that one would for attempted
physical security breaches) is often very difficult for a variety of reasons:
* Identifying attackers is difficult, as they are often in a different jurisdiction to the systems they attempt to
breach, and operate through proxies, temporary anonymous dial-up accounts, wireless connections, and
other anonymising procedures which make backtracing difficult and are often located in yet another
jurisdiction. If they successfully breach security, they are often able to delete logs to cover their tracks.
* The sheer number of attempted attacks is so large that organisations cannot spend time pursuing each
attacker (a typical home user with a permanent (eg, cable modem) connection will be attacked at least
several times per day, so more attractive targets could be presumed to see many more). Note however,
that most of the sheer bulk of these attacks are made by automated vulnerability scanners and computer
worms.
* Law enforcement officers are often unfamiliar with information technology, and so lack the skills and
interest in pursuing attackers. There are also budgetary constraints. It has been argued that the high cost
of technology, such as DNA testing, and improved forensics mean less money for other kinds of law
enforcement, so the overall rate of criminals not getting dealt with goes up as the cost of the technology
increase
Security is a constant worry when it comes to information technology. Data theft, hacking, malware and a
host of other threats are enough to keep any IT professional up at night.
Information Assurance (IA) refers to the steps involved in protecting information systems, like computer
systems and networks. There are commonly five terms associated with the definition of information
assurance:
Integrity
Availability
Authentication
Confidentiality
Nonrepudiation
IA is a field in and of itself. It can be thought of as a specialty of Information Technology (IT), because an
IA specialist must have a thorough understanding of IT and how information systems work and are
interconnected. With all of the threats that are now common in the IT world, such as viruses, worms,
phishing attacks, social engineering, identity theft and more, a focus on protection against these threats is
required. IA is that focus.
1. Confidentiality, in the context of computer systems, allows authorized users to access sensitive
and protected data. Specific mechanisms ensure confidentiality and safeguard data from harmful
intruders.
Confidentiality is one of the five pillars of Information Assurance (IA). The other four are authentication,
availability, integrity and nonrepudiation.
An authentication process, which ensures that authorized users are assigned confidential user
identification and passwords. Another type of authentication is biometrics.
Role-based security methods may be employed to ensure user or viewer authorization. For example,
data access levels may be assigned to specified department staff.
Access controls ensure that user actions remain within their roles. For example, if a user is authorized
to read but not write data, defined system controls may be integrated.
2. Integrity, in the context of computer systems, refers to methods of ensuring that data is real,
accurate and safeguarded from unauthorized user modification. Integrity is one of the five pillars
of Information Assurance (IA). The other four are authentication, availability, confidentiality and
nonrepudiation.
Events like storage erosion, error and intentional data or system damage can create data
changes. For example, hackers may cause damage by infiltrating systems with malware,
including Trojan horses, which overtake computer systems, as well as worms and viruses. An
employee may create company damage through intentionally false data entry.
Data integrity verification measures include checksums and the use of data comparison
3.Availability, in the context of a computer system, refers to the ability of a user to access information or
resources in a specified location and in the correct format. Availability is one of the five pillars of
Information Assurance (IA). The other four are integrity, authentication, confidentiality and nonrepudiation.
When a system is regularly non-functioning, information availability is affected and significantly impacts
users. In addition, when data is not secure and easily available, information security is affected, i.e., top
secret security clearances. Another factor affecting availability is time. If a computer system cannot
deliver information efficiently, then availability is compromised.
Data availability must be ensured by storage, which may be local or at an offsite facility. In the case of an
offsite facility, an established business continuity plan should state the availability of this data when onsite
data is not available. At all times, information must be available to those with clearance.
Nonrepudiation is often used for digital contracts, signatures and email messages.
By using a data hash, proof of authentic identifying data and data origination can be obtained.
5. In the context of computer systems, authentication is a process that ensures and confirms a user’s
identity. Authentication is one of the five pillars of information assurance (IA). The other four are integrity,
availability, confidentiality and nonrepudiation.
Authentication begins when a user tries to access information. First, the user must prove his access rights
and identity. When logging into a computer, users commonly enter usernames and passwords for
authentication purposes. This login combination, which must be assigned to each user, authenticates
access. However, this type of authentication can be circumvented by hackers.
A better form of authentication, biometrics, depends on the user’s presence and biological makeup (i.e.,
retina or fingerprints). This technology makes it more difficult for hackers to break into computer systems.
The Public Key Infrastructure (PKI) authentication method uses digital certificates to prove a user’s
identity. There are other authentication tools, too, such as key cards and USB tokens. One of the greatest
authentication threats occurs with email, where authenticity is often difficult to verify. For example,
unsecured emails often appear legitimate.
Eliminates credential reauthentication and help desk requests; thus, improving productivity.
Streamlines local and remote application and desktop workflow.
Minimizes phishing.
Improves compliance through a centralized database.
Provides detailed user access reporting.
With SSO, a user logs in once and gains access to different applications, without the need to re-enter log-
in credentials at each application. SSO authentication facilitates seamless network resource usage. SSO
mechanisms vary, depending on application type.
SSO is not suited for systems requiring guaranteed access, as the loss of log-in credentials results into
denial of access to all systems. Ideally, SSO is used with other authentication techniques, such as smart
cards and one-time password tokens.
Buffer overflow, stack overflow, command injection and SQL injections are the most common attacks on
the software.
Buffer and stack overflow attacks overwrite the contents of the heap or stack respectively by writing extra
bytes.
Command injection can be achieved on the software code when system commands are used
predominantly. New system commands are appended to existing commands by the malicious attack.
Sometimes system command may stop services and cause DoS.
SQL injections use malicious SQL code to retrieve or modify important information from database servers.
SQL injections can be used to bypass login credentials. Sometimes SQL injections fetch important
information from a database or delete all important data from a database.
The only way to avoid such attacks is to practice good programming techniques. System-level security
can be provided using better firewalls. Using intrusion detection and prevention can also aid in stopping
attackers from easy access to the system.
Hardware security module systems come in different flavors and form factors, and are less susceptible to
corruption and system failures. This is because they do not have an operating system and are externally
attached to the device they are serving. Examples of hardware security module systems include
physically shielded LAN appliances, smart cards and PCI plugin cards. Hardware security modules
provide protection against internal and external intruders using two-factor authentication.
Hardware security modules provide many distinct benefits, including:
The software and hardware present in the modules are specifically dedicated for security functions and
thus provide faster and superior results.
Deterrence: Methods and measures that are meant to deter attackers and intruders or prevent
natural events and accidents from affecting protected assets. The simple method for this is
through the use of physical barriers and signs. The signs serve as a warning to any intruder that
their actions will bring physical harm or prosecution. The physical barriers are meant to prevent
access entirely or simply to provide protection from external factors like storms or vehicular
accidents.
Network security is an over-arching term that describes that the policies and procedures implemented by
a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or
denial of the network and network resources.
This means that a well-implemented network security blocks viruses, malware, hackers, etc. from
accessing or altering secure information.
The first layer of network security is enforced through a username/password mechanism, which only
allows access to authenticated users with customized privileges. When a user is authenticated and
granted specific system access, the configured firewall enforces network policies, that is, accessible user
services.
However, firewalls do not always detect and stop viruses or harmful malware, which may lead to data loss.
An anti-virus software or an intrusion prevention system (IPS) is implemented to prevent the virus and/or
harmful malware from entering the network.
Network security is sometimes confused with information security, which has a different scope and relates
to data integrity of all forms, print or electronic.
1. Masquerade Attack
A masquerade attack is an attack that uses a fake identity, such as a network identity, to gain
unauthorized access to personal computer information through legitimate access identification. If an
authorization process is not fully protected, it can become extremely vulnerable to a masquerade attack.
Masquerade attacks can be perpetrated using stolen passwords and logons, by locating gaps in
programs, or by finding a way around the authentication process. The attack can be triggered either by
someone within the organization or by an outsider if the organization is connected to a public network.
The amount of access masquerade attackers get depends on the level of authorization they've managed
to attain. As such, masquerade attackers can have a full smorgasbord of cybercrime opportunities if
they’ve gained the highest access authority to a business organization. Personal attacks, although less
common, can also be harmful.
Masquerade attacks may happen in a number of ways. In case of an insider attack, a masquerade
attacker gains access to the account of a legitimate user either by stealing the victim's account ID and
password, or by using a keylogger. Another common method is by exploiting a legitimate user's laziness
and trust. For example, if a legitimate user leaves the terminal or session open and logged in, a co-worker
may act as a masquerade attacker.
Vulnerable authentication is one of the other factors that can trigger a masquerade attack, as it helps the
attacker to gain access much more easily. Once the attackers gain access, they can get into all of the
organization's critical data and can delete or modify it, steal sensitive data, or alter routing information and
network configuration.
For example, although a unique IP address is assigned to each individual computer, a hacker can
convince another system that it is the authorized user through spoofing, essentially convincing the target
computer that the hacker's computer has the same IP.
2.Trap doors
A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a
computer or its data. The backdoor access method is sometimes written by the programmer who
develops a program.
A backdoor is also known as a trapdoor.
Backdoor threats increase when multiuser and networking operating systems are used by many
organizations. In a login system, a backdoor used for system access may be in the form of a hard-coded
username and password.
A network administrator (NA) may intentionally create or install a backdoor program for troubleshooting or
other official use. Hackers use backdoors to install malicious software (malware) files or programs, modify
code or detect files and gain system and/or data access. Even backdoors installed by network
administrators pose security risks because they provide a mechanism by which the system can be
exploited if discovered.
BYOT
BYOT, or "bring your own technology" - also simply known as BYO or "bring your own device" (BYOD) -
is more than just an IT trend: It’s a new a way of life. And while BYOT may have its roots with executives,
who’ve long demanded the ability to use the latest mobile devices for work, it has spread among the
ranks, along with the proliferation of smartphones and tablet computers. The catchphrase often heard in
discussions of BYOT is "consumerization of IT." In other words, it’s no longer just the geeks or the execs
that want the best technology.
Not long ago, employees were thrilled simply to have a company phone. Now, employees become angry
when stuck with anything other than the latest and greatest models. As people increase dependence on
personal mobile devices in many life areas, it’s no wonder they want to be able to access company
emails and applications without giving up the convenience of their favorite devices.
INTERNET CRIMES
Virus
A virus is a type of malicious software (malware) comprised of small pieces of code attached to legitimate
programs. When that program runs, the virus runs.
Viruses are malicious programs that spread throughout computer files without user knowledge. Most
widespread virus infections spread through email message attachments that activate when opened. The
vicious cycle of a virus perpetuates as infected emails are forwarded to multiple users. Viruses also
spread through shared media, such as Universal Serial Bus (USB) drives.
Worm
A worm is a type of malicious software (malware) that replicates while moving across computers, leaving
copies of itself in the memory of each computer in its path.
A worm locates a computer’s vulnerability and spreads within its connected network like an infection,
while continually seeking new vulnerabilities. Like viruses, worms often originate from e-mail attachments
that appear to be from trusted senders. Worms then spread to a user’s contacts via his e-mail account
and address book.
Some worms spread and then do nothing while tthers cause harm. In such cases, the worm’s code is
known as payload.
Malicious software, commonly known as malware, is any software that brings harm to a computer system.
Malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits, etc., which steal
protected data, delete documents or add software not approved by a user.
Malware is software designed to cause harm to a computer and user. Some forms of malware “spy” on
user Internet traffic. Examples include spyware and adware. Spyware monitors a user’s location and if
enabled, it can capture sensitive information, e.g., credit card numbers, promoting identity theft. Adware
also acquires user information, which is shared with advertisers and then integrated with unwanted,
triggered pop-up ads.
Worms and viruses behave differently, as they can quickly proliferate and undermine an entire computer
system. They also may perform unsavory activities from a user’s computer without the user’s knowledge.
In the wake of a virus or worm, a computer system can experience significant damage.
Anti-malware should determine if there are threats by scanning a computer and removing them, if found.
Prevention is better than corrective action after infection. Although anti-virus programs should be
continually enabled and updated, certain types of threats, like spyware, often make their way into a
computer system.
At all times, a firewall should be in place for additional security. Multiple, compatible protective sources
are encouraged as additional insurance against malware.
Adware
Adware is free computer software that contains commercial advertisements. Adware programs include
games, desktop toolbars or utilities. Commonly, adware is Web-based and collects Web browser data to
target advertisements, especially pop-ups.
Adware is also known as freeware and pitchware.
Adware is categorized as follows:
Adware may appear innocuous and provide users with legitimate business software but then unleash
spyware that collects browser search data for targeted user-specific advertisements.
Uninstalling adware generally requires anti-adware software. A variety of free and paid versions are
available, but licensed adware is the most reliable, aggressive and recommended. Anti-adware software
is also included in virus scanning packages.
Trojan Horse
A Trojan horse is a seemingly benign program that when activated, causes harm to a computer system.
A Trojan horse is also known as a Trojan virus or Trojan.
The Trojan horse is named for ancient Greece’s apparent gift of peace to the Trojans, when a giant
wooden horse was secretly filled with Greek warriors. After the Trojans allowed the horse to enter their
great city, the Greek warriors emerged from the horse gained control of the city of Troy.
The following are types of trojan horses:
Backdoor Trojan: opens a back door for a user to access a victim’s system at a later time
Downloader: This Trojan downloads malicious software and causes harm to the victim’s
computer system.
Infostealer: This Trojan attempts to steal information from the victim’s computer.
Remote Access Trojan (RAT): This can be hidden in games or other programs of a smaller
variety and give the attacker control of the victim’s computer.
Data Sending Trojan: This gives the perpetrator sensitive information like passwords or other
information programmed to be hijacked.
Destructive Trojan: This destroys the victim’s files.
Proxy Trojan: As a proxy server, this allows the attacker to hijack a victim’s computer and
conduct illegal activities from the victim’s computer.
Spyware
Spyware is infiltration software that secretly monitors unsuspecting users. It can enable a hacker to obtain
sensitive information, such as passwords, from the user's computer. Spyware exploits user and
application vulnerabilities and is often attached to free online software downloads or to links that are
clicked by users.
Peer-to-peer (P2P) file sharing has increased the proliferation of spyware and its ramifications.
Anti-spyware applications locate and remove spyware and are recommended as a preventative line of
defense against infiltration and damage.
Anti-virus software removes PC viruses, but anti-virus scans do not always detect spyware. Spyware and
cookies are similar, but spyware conducts infiltration activity continuously until it is removed by specific
anti-spyware tools.
Users should take the following precautions to prevent spyware attacks:
An Internet bot, in its most generic sense, is software that performs an automated task over the Internet.
More specifically, a bot is an automated application used to perform simple and repetitive tasks that
would be time-consuming, mundane or impossible for a human to perform.
Bots can be used for productive tasks, but they are also frequently used for malicious purposes.
The term "bot" comes from robot. An Internet bot may also be known as a Web robot or WWW robot.
One of the best examples of a good bot is a search engine spider. Such bots troll the Web and index new
pages for a search engine. Other examples include the original Internet relay chat bots and chatterbots.
Malicious bots are typically blended threats that come as part virus/worm, part bot and are used in a
identity theft or to launch denial of service attacks. This is especially prevalent in a botnet, which is a
grouping of computers that are all infected with a malicious bot. Other illegal, or at least questionable
uses, involve bots that harvest email addresses for spam, scrape content or manipulate comments/votes
on sites that allow user feedback.
Rootkit
Provide the attacker with complete backdoor access, permitting them to falsify or steal documents.
Hide other malware, especially keyloggers. The keyloggers may then be used to access and steal
the victim's sensitive data.
Enable the attacker to use the infected machine as a zombie computer to trigger attacks on
others
Spoofing
5. COMPUTER HACKERS
Hacker
A hacker utilizes alternative system access methods to sabotage computer systems and networks.
Hacking actions are differentiated as illegal and unacceptable (black/grey hat hacking), or legal and
acceptable (white hat hacking).
Hacker is a term that refers to many different computing topics. However, in the mainstream, a hacker is
any individual or group that circumvents security to access unauthorized data.
Most hackers are highly skilled computer programmers that locate security gaps and access secure
systems via unique analytical skills. A great hacker is known to be able to "think outside the box."
Hacker types are delineated according to intent, as follows:
Black hat hackers break into computer systems illegally and cause harm by stealing or destroying
data, i.e., a banking system to steal money for personal gain.
White hat hackers use their skills to help enterprises create robust computer systems.
Grey hat hackers perform illegal hacking activities to show off their skills, rather than to achieve
personal gain.
Hacking is intentional modification of computer software or hardware that is outside the architectural
perimeters and design. Hacking tools come in a wide variety of applications and are specifically created
to assist in hacking. A hacking tool is commonly used to gain unauthorized access to a PC to insert
worms, siffers, viruses and Trojan horses.
A hacking tool is a tool or program that is specially designed to help a hacker. The true meaning of
hacking is derived from “hacking away”, which is used to refer to someone who is extremely proficient in
computer technology and hacks away at the bits and bytes. Today’s definition of hacking refers to a self-
taught prodigy or specialized programmer who is able to modify computer hardware or software outside a
developer’s architectural design.
Before the event, preventive controls are intended to prevent an incident from occurring e.g. by
locking out unauthorized intruders;
During the event, detective controls are intended to identify and characterize an incident in
progress e.g. by sounding the intruder alarm and alerting the security guards or police;
After the event, corrective controls are intended to limit the extent of any damage caused by the
incident e.g. by recovering the organization to normal working status as efficiently as possible.
According to their nature, for example:
Controls Overview
Controls are the means by which risk can be mitigated. Individual controls may
reduce the probability of a particular cybersecurity occurrence or the impact of such
an occurrence. Typically, to reduce both probability and impact of the occurrence
multiple controls will be applied.
Types of Controls
The word “controls” tends to conjure up images of electromechanical devices, but
in the cyber security context controls can take on many forms. Some examples of
Directive
Controls: Directive controls may be administrative instruments such as policies,
standards and procedures. An example of a directive control would be the
creation of an Acceptable Use Policy for employee use of information
Preventive controls A preventative control attempts to make the occurrence of a breach less
likely by making it more difficult for the threat source to cause one.
Examples are security guards, security fences, security training, firewalls and
intrusion prevention systems
Detective Controls A detective control detects a security breach once it has occurred. Examples
are intruder alarms, intrusion detection systems, system monitoring and log
monitoring
Corrective Controls :A corrective control reduces the effect of a security breach. An example is an
anti-virus system isolating an infected file
Recovery controls: A recovery control aims to restore business operations after a security breach.
Encryption
Symmetric encryption is the use of the same key and algorithm by the creator and reader of a file or
message. The creator uses the key and algorithm to encrypt, and the reader uses both to decrypt.
Symmetric encryption relies on the secrecy of the key. If the key is captured by an attacker, either when it
is exchanged between the communicating parties, or while one of the parties uses or stores the key, the
attacker can use the key and the algorithm to decrypt messages or to masquerade as a message creator.
Asymmetric encryption lessens the risk of key exposure by using two mathematically related keys, the
private key and the public key. When one key is used to encrypt, only the other key can decrypt.
Therefore, only one key (the private key) must be kept secret. The key that is exchanged (the public key)
poses no risk if it becomes known. For instance, if individual A has a private key and publishes the public
key, individual B can obtain the public key, encrypt a message to individual A, and send it. As long as an
individual keeps his private key secure from disclosure, only individual A will be able to decrypt the
message.
(ii) Typical areas or situations requiring deployment of cryptographic techniques, given the risks
involved, include transmission and storage of critical and/or sensitive data/information in an ‘un-
trusted’ environment or where a higher degree of security is required, generation of customer
PINs which are typically used for card transactions and online services, detection of any
unauthorised alteration of data/information and verification of the authenticity of transactions or
data/information.
(iii) Since security is primarily based on the encryption keys, effective key management is crucial.
Effective key management systems are based on an agreed set of standards, procedures, and
secure methods that address
d. Dealing with compromised keys, revoking keys and specifying how keys should be withdrawn
or deactivated
e. Recovering keys that are lost or corrupted as part of business continuity management
f. Archiving, destroying keys
g. Logging the auditing of key management-related activities
h. Instituting defined activation and deactivation dates, limiting the usage period of keys
(iv) Secure key management systems are characterized by the following precautions:
a. Additional physical protection of equipment used to generate, store and archive cryptographic
keys
b. Use of cryptographic techniques to maintain cryptographic key confidentiality
c. Segregation of duties, with no single individual having knowledge of the entire cryptographic
key (i.e. two-person controls) or having access to all the components making up these keys
d. Ensuring key management is fully automated (e.g., personnel do not have the opportunity to
expose a key or influence the key creation)
e. Ensuring no key ever appears unencrypted
f. Ensuring keys are randomly chosen from the entire key space, preferably by hardware
g. Ensuring key-encrypting keys are separate from data keys. No data ever appears in clear text
that was encrypted using a key-encrypting key. (A key encrypting key is used to encrypt other
keys, securing them from disclosure.)
h. Make sure that keys with a long life are sparsely used. The more a key is used, the greater
the opportunity for an attacker to discover the key
Normally, a minimum of 128-bit SSL encryption is expected. Constant advances in computer hardware,
cryptanalysis and distributed brute force techniques may induce use of larger key lengths periodically. It is
expected that banks will properly evaluate security requirements associated with their internet banking
systems and other relevant systems and adopt an encryption solution that is commensurate with the
degree of confidentiality and integrity required. Banks should only select encryption algorithms which are
well established international standards and which have been subjected to rigorous scrutiny by an
international cryptographer community or approved by authoritative professional bodies, reputable
security vendors or government agencies
Introduction:
With the advances in information technology, most banks in India have migrated to core banking
platforms and have moved transactions to payment cards (debit and credit cards) and to electronic
channels like ATMs, Internet Banking and Mobile Banking. Fraudsters have also followed customers
into this space. However, the response of most of the banks to frauds in these areas needs further
improvement, thereby avoiding putting the entire onus on the customer. There is also a lack of clarity
amongst banks on the reporting of these instances as frauds.
A need is therefore felt to have an industry wide framework on fraud governance with particular
emphasis on tackling electronic channel based frauds. This note endeavours to bring out the
challenges and suggests a framework which can be implemented across banks to effectively tackle
the electronic fraud menace. It would be useful to recall the definition of fraud at this stagyuo]\j;’e.
‘A deliberate act of omission or commission by any person, carried out in the course of a banking
transaction or in the books of accounts maintained manually or under computer system in banks,
resulting into wrongful gain to any person for a temporary period or otherwise, with or without any
monetary loss to the bank’.
This definition has been recommended as per para 9.1 of the Report of the Study Group on Large
Value Bank Frauds set up by the Reserve Bank of India in 1997. It follows that like other bank frauds,
various IT related frauds need to get captured through the fraud reporting system and banks should
take adequate steps to mitigate such risks.
Indian banks follow the RBI guideline of reporting all frauds above 1 crore to their respective
Audit Committee of the Board. Apart from this, banks are also putting up a detailed annual review
of frauds to their Audit Committee of the Board. The Board for Financial Supervision (BFS) of RBI
has observed that in terms of higher governance standards, the fraud risk management and fraud
investigation must be ‘owned’ by the bank’s CEO, Audit Committee of the Board and the Special
Committee of the Board.
Most retail cyber frauds and electronic banking frauds would be of values less than 1 crore and
hence may not attract the necessary attention of the Special Committee of the Board. Since these
frauds are large in number and have the potential to reach large proportions, it is imperative that the
Special Committee of the Board be briefed separately on this to keep them aware of the proportions
of the fraud, modus operandi and the steps taken by the bank to mitigate them. The Special
Committee should specifically monitor and review the progress of the mitigating steps taken by the
bank in case of electronic frauds and the efficacy of the same in containing fraud numbers and values
at least on a quarterly basis.
The activities of fraud prevention, monitoring, investigation, reporting and awareness creation should be
owned and carried out by an independent group in the bank. The group should be adequately staffed and
headed by a senior official of the Bank, not below the rank of General Manager.
Fraud review councils should be set up by the above fraud risk management group within various
business groups in the bank. The council should comprise of head of the business, head of the fraud risk
management department, the head of operations supporting that particular business function and the
head of information technology supporting that business function. The councils should meet every quarter
to review fraud trends and preventive steps taken by the business group, and report the same to the
Special Committee.
A strong internal control framework is the strongest deterrence for frauds. The fraud risk management
department along with the business/operations/support groups, continuously reviews various systems
and controls, to remove gaps if any, and to strengthen the internal control framework. The following are
some of the fraud prevention practices that are recommended for banks.
No new product or process should be introduced or modified in a bank without the approval of control
groups like compliance, audit and fraud risk management groups. The product or process needs to
be analysed for fraud vulnerabilities and fraud loss limits to be mandated wherever vulnerabilities are
noticed.
All residual/open risks in products and processes need to be covered by setting ‘fraud-loss' limits.
'Fraud-loss' limits need to be monitored regularly by the fraud risk management group and a review
needs to be undertaken with the respective business group when fraud loss amount reaches 90% of
the limit set. In case it is difficult to set a fraud- loss limit, a limit on the total number or total value of
frauds may be defined. For the purpose of deciding how much a product or a process has used up
the limit set, the cumulative value of frauds in that product or process during the financial year needs
to be considered.
All actual fraud cases above 10 lakhs and cases where a unique modus operandi is involved,
should be reviewed immediately after such a fraud is detected. The findings should be used to
redesign products and processes and remove the gaps so that they do not recur.
Most banks have incorporated several security measures for their documents, information, systems
and customer deliverables such as cheque books/debit cards. Security measures have also been
incorporated during delivery of instruments such as cards/cheque books/internet passwords to
customers through couriers. Internet banking systems have security features such as separate
transaction passwords, two factor authentication, multi-channel process for registering payees, upper
(f) Know Your Customer (KYC) and know your employee/vendor procedures
A strong KYC process is the backbone of any fraud prevention activity. Such a process enables
banks to prevent unscrupulous elements from gaining entry into the bank’s environment, which gives
them an opportunity to carry out their fraudulent intentions. Similarly, appropriate due diligence
procedures before recruitment of employees and vendors is essential to prevent known fraudsters or
people with fraudulent motives to have access to a bank’s channels. Banks have to implement strong
procedures to carry out due diligence of potential customers, employees and vendors before they are
enrolled.
All banks have a dedicated team to take care of the security of the physical infrastructure. This team
should conduct regular security audits of various offices to check for deviations/lapses. It is the
responsibility of this team to ensure that physical assets and data copied on magnetic/optical media
do not go out of the offices of the bank without authorisation.
Awareness on how to prevent and detect frauds is the basis of fraud management. Banks need to
adopt various measures to create awareness amongst staff and customers.
• Detection of fraud
b) Transaction monitoring
Banks should set up a transaction monitoring unit within the fraud risk management group. The
transaction monitoring team should be responsible for monitoring various types of transactions,
especially monitoring of potential fraud areas, by means of which, early alarms can be triggered. This
unit needs to have the expertise to analyse transactions to detect fraud trends. This unit should work
in conjunction with the data warehousing and analytics team within banks for data extraction, filtering,
and sanitisation for transaction analysis for determining fraud trends. Banks should put in place
automated systems for detection of frauds based on advanced statistical algorithms and fraud
detection techniques.
Banks can have dedicated email IDs and phone numbers for customers to report any fraudulent
activity that they may notice. A dedicated team can be created to reply to customer queries and
concerns through the above email IDs. Phone banking officers and branch staff should also be
trained on response to customers’ queries and concerns on frauds.
(iii)Fraud investigation
It is widely accepted that fraud investigation is a specialised function. Thus, the fraud risk
management group should undergo continuous training to enhance its skills and competencies. The
first step in an investigation process is gathering the entire transaction details, documents and
complete details of the customer/employee or vendor. In order to investigate into suspected cases,
the group would adopt various advanced techniques including computer forensics, forensic
accounting and tools to analyse large volumes of data.
The investigation team may conduct oral interviews of customers or employees to understand the
background and details of the case. In case an interview of the person accused of fraud is required to
be undertaken, the investigation group should follow a prescribed procedure and record statements
appropriately. The investigation activities need to be carried out discreetly and within a specified time
line. The investigating team should take into account all the relationships of the involved parties with
the bank while investigating and submitting an investigation report. The investigation report will help
the respective business groups take a decision on all the relationships of the customer with the Bank.
The investigation report should conclude whether a suspected case is a fraud and thereafter the
report would form the basis for further actions such as regulatory reporting.
In case of employee involvement in the fraud, the investigation report may be the basis of staff
accountability and HR actions. It may be noted that, during the course of the investigations, banks
should adopt only means permitted by law, regulations and code of conduct of the bank and any
inconvenience to customers or general public should be avoided. It is also important to note that
certain investigations are best carried out by law enforcement authorities and the bank should refer
cases to such authorities at the appropriate time, to enable them to carry out their responsibilities
efficiently.
In case of need, the investigating team should seek the support of other specialised groups within the
bank, such as the audit group to carry out investigations efficiently.
The concerned group in a bank, in which the fraud has occurred, should make all out efforts to
recover the amount lost. They may use specialised groups like legal or collections for this purpose.
The investigation team may also be able to recover some amounts during the course of their
investigation. The Police may also recover some amount during their investigation. This would be
deposited in Court pending final adjudication. The bank should liaise with the Police and keep track of
such amounts.
(iv)Reporting of frauds
As per the guidelines on reporting of frauds as indicated in the RBI circular, dated July 1, 2010, fraud
reports should be submitted in all cases of fraud of 1 lakh and above perpetrated through
misrepresentation, breach of trust, manipulation of books of account, fraudulent encashment of
instruments like cheques, drafts and bills of exchange, unauthorised handling of securities charged to the
bank, misfeasance, embezzlement,
misappropriation of funds, conversion of property, cheating, shortages, irregularities, etc. Banks should
also report frauds in the electronic channels and the variants of plastic cards used by a bank and its
customers for concluding financial transactions.
A special mention needs to be made here of frauds done by collusive merchants who use
skimmed/stolen cards on the POS terminals given to them by banks and then abscond with the
money before the chargeback is received on the transaction. It is imperative that the bank which has
provided acquiring services to such merchant, reports the case to RBI.
Also, it has been observed that in a shared ATM network scenario, when the card of one bank is
used to perpetrate a fraud through another bank’s ATM, there is a lack of clarity on who should report
Banks should readily share data and documents requested by the police even in cases where the
bank in question is not the victim of the fraud but has been a receiver of fraudulent monies into its
accounts.
Customer awareness is one of the pillars of fraud prevention. It has been seen that alert customers
have enabled prevention of several frauds and in case of frauds which could not be avoided, helped
in bringing the culprit to book by raising timely alerts. Banks should thus aim at continuously
educating its customers and solicit their participation in various preventive/detective measures. It is
the duty of all the groups in banks to create fraud risk awareness amongst their respective customers.
The fraud risk management group should share its understanding of frauds with each group, identify
areas where customer awareness is lacking and if required, guide the groups on programmes to be
run for creation of awareness amongst customers. The groups should ensure that in each of their
interaction with customers there is at least one message to make the customer aware of fraud risk.
The following are some of the recommended measures to create awareness amongst customers:
It should be ensured that the communication to the customer is simple and aimed at making them
aware of fraud risks and seeking their involvement in taking proper
Employee awareness is crucial to fraud prevention. Training on fraud prevention practices should be
provided by the fraud risk management group at various forums. Banks may use the following
methods to create employee awareness:
Class room training programmes at the time of induction or during risk related
training sessions
Safety tips flashed at the time of logging into Core Banking System (CBS), screen
savers, etc.
Emails sent by the respective business heads
A positive way of creating employee awareness is to reward employees who have gone beyond their
call of duty, and prevented frauds. Awards may be given to employees who have done exemplary
work in preventing frauds. Details of employees receiving such awards may be published in the fraud
newsletters.
(i) Incident management is defined as the process of developing and maintaining the capability to
manage incidents within a bank so that exposure is contained and recovery achieved within a
specified time objective. Incidents can include the misuse of computing assets, information
disclosure or events that threaten the continuance of business processes.
(ii) Major activities that need to be considered as part of the incident management framework include:
(iii) Common incident types include, but not limited to, outages/degradation of services due to
hardware, software or capacity issues, unauthorised access to systems, identity theft, data
leakage/loss, malicious software and hardware, failed backup processes, denial of service attacks
and data integrity issues.
(iv) A bank needs to have clear accountability and communication strategies to limit the impact of
information security incidents through defined mechanisms for escalation and reporting to the
Board and senior management and customer communication, where appropriate. Incident
management strategies would also typically assist in compliance with regulatory requirements.
Institutions would also need to pro-actively notify CERT-In/IDRBT/RBI regarding cyber security
incidents.
(v) All security incidents or violations of security policies should be brought to the notice of the CISO.
Electronic cards:
. PREPAID PAYMENT INSTRUMENTS : Eligibility : Banks who comply with the eligibility criteria would
be permitted to issue all
categories of pre-paid payment instruments. Non-Banking Financial Companies (NBFCs) and other
persons would be permitted to
issue only semi-closed system payment instruments. Capital requirements : Banks and Non-Banking
Financial Companies which
comply with the Capital Adequacy requirements prescribed by Reserve Bank of India from time-to-time,
shall be permitted to issue
pre-paid payment instruments. All other persons shall have a minimum paid-up capital of Rs 100 lakh and
positive net owned
funds. Safeguards against money laundering (KYC/AML/CFT) provisions - The maximum value of any
pre-paid payment
instruments (where specific limits have not been prescribed including the amount transferred) shall not
exceed Rs 100,000/-.
Deployment of Money collected: Non-bank persons issuing payment instruments are required to maintain
their outstanding balance
in an escrow account with any scheduled commercial bank subject to the following conditions:- The
amount so maintained shall be
used only for making payments to the participating merchant establishments. No interest is payable by
the bank on such balances.
Validity: All pre-paid payment instruments issued in the country shall have a minimum validity period of six
months from the date
of activation/issuance to the holder. The outstanding balance against any payment instrument shall not be
forfeited unless the
holder is cautioned at least 15 days in advance as regards the expiry of the validity of the payment
instrument
RuPay Debit Cards: It is a domestic card payment network established by National Payment Corporation
of India (NPCI)
having more than 100 Banks in India as members with its ATM network spread across the country. These
cards can be used
at all ATMs of NPCI network and POS terminals & e-com transactions (Internet) enabled for RuPay
acquiring. The various
types of RuPay Debit cards are as under:
Card Type Meant for
RuPay Kisan Farmers availing Agriculture production loans (Crop Loans)
RuPay Aadhaar Beneficiaries of Electronic Benefit Transfer (EBT) scheme
RuPay Debit Beneficiaries under Financial Inclusion schemes
It provides accidental insurance cover up to ?1 lakh without any charge to the customer. To avail this
benefit, the card
must be used minimum once in 90 days. The existing identification modes used in new delivery channels
has a major
drawback as it recognize the PIN but not the person. Sometimes, it leads to impersonation and may
cause financial loss. To
overcome the problem, biometric technologies such as Fingerprint Recognition, Face Recognition, Voice
Authentication,
Hand Geometry, Retinal Scanning, Iris Scanning and Signature Verification have come in to force.
Whenever the user
Data security
i. Banks need to define and implement procedures to ensure the integrity and consistency of all data
stored in electronic form, such as databases, data warehouses and data archives.
ii. A data security theory seeks to establish uniform risk-based requirements for the protection of
data elements. To ensure that the protection is uniform within and outside of the institution, tools
such as data classifications and protection profiles can be used, as indicated earlier in the
chapter.
iii. Data classification and protection profiles are complex to implement when the network or storage
is viewed as a utility. Because of that complexity, some institutions treat all information at that
level as if it were of the highest sensitivity and implement encryption as a protective measure.
The complexity in implementing data classification in other layers or in other aspects of an
institution’s operation may result in other risk mitigation procedures being used. Adequacy is a
function of the extent of risk mitigation, and not the procedure or tool used to mitigate risk.
iv. Policies regarding media handling, disposal, and transit should be implemented to enable the use
of protection profiles and otherwise mitigate risks to data. If protection profiles are not used, the
vi. The storage of data in portable devices, such as laptops and PDAs, poses unique problems.
Mitigation of those risks typically involves encryption of sensitive data, host-provided access
controls, etc.
vii. Banks need appropriate disposal procedures for both electronic and paper based media.
Contracts with third-party disposal firms should address acceptable disposal procedures. For
computer media, data frequently remains on media after erasure. Since that data can be
recovered, additional disposal techniques should be applied to sensitive data like physical
destruction, overwriting data, degaussing etc.
viii. Banks should maintain the security of media while in transit or when shared with third parties.
Policies should include contractual requirements that incorporate necessary risk-based controls,
restrictions on the carriers used and procedures to verify the identity of couriers.
ix. Banks should encrypt customer account and transaction data which is transmitted, transported,
delivered or couriered to external parties or other locations, taking into account all intermediate
junctures and transit points from source to destination.
x. A few other aspects that also needs to be considered include appropriate blocking, filtering and
monitoring of electronic mechanisms like e-mail and printing and monitoring for unauthorised
software and hardware like password cracking software, key loggers, wireless access points, etc.
xi. Concerns over the need to better control and protect sensitive information have given rise to a
new set of solutions aimed at increasing an enterprise’s ability to protect its information assets.
These solutions vary in their capabilities and methodologies, but collectively they have been
placed in a category known as data leak prevention (DLP). It provides a comprehensive approach
covering people, processes, and systems that identify, monitor, and protect data in use (e.g.,
endpoint actions), data in motion (e.g., network actions), and data at rest (e.g., data storage)
through deep content inspection and with a centralized management framework.
Most DLP solutions include a suite of technologies that facilitate three key objectives:
The main Indian act that addresses legal challenges specifically as they relate to the Internet is the
Information Technology (Amendment) Act, 2008, or for short, the IT Act. We highlight the sections that
have the greatest relevance for the Internet and democracy. This includes sections relating to
government takedowns, monitoring and interception of communication and intermediary liability.
Section 69A and the Blocking Rules: Allowing the Government to block content under
certain circumstances
Section 69A of the IT (Amendment) Act, 2008, allows the Central Government to block content where it
believes that this content threatens the security of the State; the sovereignty, integrity or defence of India;
friendly relations with foreign States; public order; or to prevent incitement for the commission of a
cognisable offence relating to any of the above. A set of procedures and safeguards to which the
Government has to adhere when doing so have been laid down in what have become known as the
Blocking Rules.
Section 79 of the Information Technology (Amendment) Act, 2008 regulates the liability of a wide range of
intermediaries in India. The section came in the limelight mostly because of the infamous Intermediary
Guidelines Rules, or IT Rules, which were made under it. The IT Rules constitute an important and
worrying move towards the privatisation of censorship in India.
The large amounts of ‘obscene’ material that circulate on the Internet have long attracted comment in
India. Not surprsingly, then, in the same way as obscenity is prohobited offline in the country, so it is
online as well. The most important tools to curtail it are sections 67 and 67A of the IT Act, prohibiting
obscene and sexually explicit material respectively.
Section 66A of the Information Technology (Amendment) Act, 2008 prohibits the sending of offensive
messages though a communication device (i.e. through an online medium). The types of information this
covers are offensive messages of a menacing character, or a message that the sender knows to be false
but is sent for the purpose of ‘causing annoyance, inconvenience, danger, obstruction, insult, injury,
criminal intimidation, enmity, hatred, or ill will.’ If you’re booked under Section 66A, you could face up to 3
years of imprisonment along with a fine.
Freedom of expression
To balance freedom of expression with other human rights is, at times, a difficult and delicate task. From
hate speech to intermediary liability, we tease out and shed greater light on the various challenges that
make this task particularly complicated, proposing ways forward that can further strengthen and promote
the right to freedom of expression, in India and beyond, as well.
With the advent of new technology, new security threats have emerged for people, businesses and states.
Oftentimes, responses to such threats, including states’ exercise of their unprecedented power to surveil
their populations, have been criticised for their negative impact on human rights. Can security and human
rights no longer be reconciled in the Internet age?
The Information Technology (Amendment) Act, 2008 an act to amend the IT Act 2000 received the assent
of the President on 5th February 2009. Several legal & security experts are in the process of analyzing the
contents and possible impacts of the amendments. The objective of this note is to try and study the
possible implications and impacts on Indian companies. This note is not intended to be a comprehensive
analysis of the amendments, but only certain key points which could impact Indian Companies
Data Protection
The IT Act 2000 did not have any specific reference to Data Protection, the closet being a provision to
treat data vandalism as an offense. The Government introduced a separate bill called “Personal Data
Protection Act 2006” which his pending in the Parliament and is likely to lapse. The ITA 2008 has
introduced two sections which address Data Protection aspects to an extent, which gives rise to certain
key considerations for the sector.
The sections under consideration are:
Section 43A: Compensation for failure to protect data
Section 72A: Punishment for disclosure of information in breach of lawful contract
Section 43A states
Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a
computer resource which it owns, controls or operates, is negligent in implementing and maintaining
In India, the financial system is regulated with the help of independent regulators, associated with the field
of insurance, banking, commodity market, and capital market and also the field of pension funds. On the
other hand, the Indian Government is also known for playing a significant role in controlling the field of
financial security and also influencing the roles of such mentioned regulators. You must be aware of the
regulatory bodies and their functions, before a final say. The most prominent of all is RBI or Reserve Bank
of India. Let us look in detail about various Financial Regulatory Bodies in India.
The Central Office is where the Governor sits and is where policies are formulated. Though originally
privately owned, since nationalization in 1949, the Reserve Bank is fully owned by the Government of
India.
Apart from RBI, SEBI also forms a major part under the financial body of India.
This is a regulator associated with the security markets in Indian Territory. Established in the year 1988,
the SEBI Act came into power in the year 1992, 12th April. The board comprises of a Chairman, Whole
time members, Joint secretary, member appointed, Deputy Governor of RBI, secretary of corporate affair
ministry and also part time member. There are three groups, which fall under this category, and those are
the investors, the security issuers and market intermediaries.
Other than the financial bodies mentioned above, FMC also plays a major role.
It is the chief regulator of the commodity(MCX, NCDEX, NMCE, UCX etc) of the Indian futures market. As
per the latest news feed, it has regulated the amount of Rs. 17 trillion, under the commodity trades.
Headquarter is located in Mumbai, and the financial regulatory agency is working in collaboration with the
Finance Ministry. The chairman of FMC works together with the Members of the same organization to
meet the required ends. The main aim of this body is to advise the Central Government on matters of the
Forwards Contracts Act, 1952.
The Reserve Bank of India issued new guidance in April 2011 for banks to mitigate the risks of use of
information technology in banking operations. RBI guidelines are result of the Working Group's
recommendations on information security, electronic banking, technology risk management and cyber
fraud. The Working Group was formed under the chairmanship of G. Gopalakrishna, the executive
director of RBI in April 2010.
The guidance is largely driven by the need for mitigating cyber threats emerging from increasing adoption
of IT by commercial banks in India.
technology (IT) security organization. The purpose of CERT-In is to respond to computer security
incidents, report on vulnerabilities and promote effective IT security practices throughout the country.
CERT-In was created by the Indian Department of Information Technology in 2004 and operates under
the auspices of that department. According to the provisions of the Information Technology Amendment
CERT organizations throughout the world are independent entities, although there may be coordinated
activites among groups. The first CERT group was formed in the United States at Carnegie Mellon
University.
CERT-In is operational since January 2004. The constituency of CERT-In is the Indian Cyber Community.
CERTIn
is the national nodal agency for responding to computer security incidents as and when they occur.
In the recent Information Technology Amendment Act 2008,CERT-In has been designated to serve as the
national
agency to perform the following functions in the area of cyber security:
Collection,analysis and dissemination of information on cyber incidents.
Forecast and alerts of cyber security incidents
Emergency measures for handling cyber security incidents
Coordination of cyber incident response activities.
Issue guidelines,advisories,vulnerability notes and whitepapers relating to information security
practices,procedures, prevention,response and reporting of cyber incidents.
Such other functions relating to cyber security as may be prescribed
3. What worm emailed people with the words "I LOVE YOU" in the year 2000?
A) The Love Bug
B) The Love Letter
C) The Valentine Connection
D) The Darling Link
4. What type of virus describes the awful consequences of not acting immediately?
A) Android
B) Spoofing
C) Misleading e-mail
D) Phishing
5. Which computer virus records every movement you make on your computer?
A) Malware Android
B) Key logger
C) DoS
D) Trapper
6. What is it called when someone changes the FROM section of an email so that the message you
receive appears to come from a person other than the one who sent it?
7. What program would you use to gain administrative rights to someone's computer?
A) Bot
B) Executive Android
C) Rootkit
D) Trojan horse
9. What type of hacker was the 16 year-old individual who hacked into NASA networks and downloaded
temperature and humidity control software worth $1.7 billion?
A) Thrill-seeker hacker
B) Black-hat hacker
C) Script kiddie
D) White-hat hacker
10. What is a person called when they try to hurt a group of people with the use of a computer?
A) White-hat intruder
B) Cracker
C) Social engineer
D) Cyber terrorist
ANSWERS:
1 2 3 4 5 6 7 8 9 10
B B A C B A C A D D
MCQs 2
Q6. Which among the following characteristics are correct about 'Cyberstalking':
a) Cyberstalking is the use of the internet or electronics to stalk or harass an individual or any group.
b) It includes making harassing phone calls, killing the victims pet, vandalizing victims property, leaving
written messages or objects
c) It may be offline as well as online
d) All of the Above*
e) None of These
Q11. Which among the following is best suitable for term "Software Piracy":
a) Counterfeiting original products
b) Illegal copying of genuine program
c) Both of Above*
d) None of These
MCQs 3
4. To protect a computer from virus, you should install -------- in your computer.
Answer c
A. Very Intelligent Result Until SourceB. Very Interchanged Resource Under SearchC. Vital
Information Resource Under SlegeD. Viral Important Record User Searched
Answer c
Answer c
Answer A
Answe ALL
9. Which of the following virus overtake computer system, when it boots and destroy
information?
Answer c
Answer c
Answer c
Answer d
13. Which of the following would most likely not be a symptom of a virus?
A. The web browser opens to an unusual home pageB. Odd message or images are displayed on
the screenC. Existing program files and icons disappearD. The CD–ROM stops functioning
Answer d
Answer b
15. -------- software are programs that are installed onto your computer and can scan and
remove known viruses which you may have contracted.
Answer d
Answer d
17. A -------- is a computer program that can replicate itself and spread from one computer to
another.
Answer d
18. Authentication is
A. modificationB. insertionC. hard to assure identity of user on a remote systemD. none of the
above
Answer c
19. -------- are attempts by individuals to obtain confidential information from you to falsifying
their identity.
Answer b
20. A virus that migrates freely within a large population of unauthorized email user is called a
-------
Answer c
21. -------- are often delivered to a PC through an email attachment and are often designed to
do harm.
Answer d
22. The altering of data so that it is not usable unless the changes are undone is
Answer d
23. When a logic bomb is activated by a time related event, it is known as -------
Answer d
24. A ------- is a computer program that can invade computer and perform a variety of
functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting
files
Answer D
Cyber terrorism
Q1.what is honey pot. Q2. What are steps involved in a Ecommerce transactions. Q3. Difference between
durability and consistency. Q4. What is firewell. Q5 .what is wankworm and NASA. Q6. Eucp published in
which year. Q7.OLA is not a popular app store. Q8.what is circumstantial evidences. Q9.BOSS (Bharat
operating system solution was developed by which organizations -CDAC Q10.what is malicious code
writer's. Q11.What is multylayered security Q12. What is data. Q13.blackmailing is an example of cyber
extortion. Q14 what is SCADA. Q15.what is cryptolocker Q16.smart card in metrorailway stations are
examples Q17.packet filter firewall. Q18.micro ATM. Q19.cross site Scripting. Q20. What is A hectivist...
Q21 . Rupay card is issued in which year. Q22 what is Trojan hourse. Q23. What is malware. Q.24.data
backup is an example of which type of control. Q25.what is Lebance loop modulas oprendi in atm card
frauds. Q26.CCTV is an example of which control. Q27.what is Cyber Smearing. Q28.what is operating
system vulnerability Q29.what is full form of CISA cyber security information sharing Act. Q30 what is
zeus viruses. Q31.what is hashh value and integrity. Q32.w difference between Authirization and
Authentication. Q33. What is INFO stealer. Q34.e.what is A beck End Access. Q35.what is meaning of
phrase of "Ab initio Unlawfully or Unlegally. Q36.what is security Administration and Quality Assurance.
Q37.what is CAPTCHA. Q38.Intentionally misrepresentation of Data is called A Fraud. Q39. What is
definition of Control. Q40.What is A John Deo Order. ...
Q41.what is payment walked and digital wallet Q42 what is Anonymous. Q43. What is trapdoor access.
AQ44..Total branch automation TMA. Q45. .com and .org are TLD. Q46. TCS fraud in Andhra Pradesh is
an example of reasonable security practises and procedures. Q47. The PVCL case in India refers to
which Act of IT act Act_69 power to moniter,intercept or Block URL. Q48.one question on CBS and TBA
total branch Automations. Q49. Sysadmin sysuser or teller all are examples of Spoofing. Q50.what is A
network Analysis. Q51.what is vulnerability Q52.what is DNS sinkholding. Q53.e.Contactless smart card
are example of which. Q54 .Lebance Loop card fraud rubber band type material inside Atm Fraud.
Q55.what is Contigency pkanning. Q56.what is Nigrean 419 Fraud. Q57.Dumpster Diving. Q58.what is
diffrence between Steersman and script kiddle Q59.Staganography. Q60. What is SSL injections and
Cross Site Scripting......
Script kiddie
Zeus
UTM
Cert
I4C
Eavesdropping
Mitm
Didi
Digital signature
Integrity
Authentication
Vulnerability (weakness) is a gap in the protection efforts of a system, a threat is an attacker who exploits
that weakness. Risk is the measure of potential loss when that the vulnerability is exploited by the threat
e.g. Default username and password for a server – An attacker can easily crack into this server and
compromise it.
2. What is the difference between Asymmetric and Symmetric encryption and which one is better?
Symmetric encryption uses the same key for both encryption and decryption, while Asymmetric
encryption uses different keys for encryption and decryption.
Symmetric is usually much faster but the key needs to be transferred over an unencrypted channel.
Asymmetric on the other hand is more secure but slow. Hence, a hybrid approach should be preferred.
Setting up a channel using asymmetric encryption and then sending the data using symmetric process.
IDS is an intrusion detection system whereas an IPS is an intrusion prevention system. IDS will just detect
the intrusion and will leave the rest to the administrator for further action whereas an IPS will detect the
intrusion and will take further action to prevent the intrusion. Another difference is the positioning of the
devices in the network. Although they work on the same basic concept but the placement is different.
Cross site scripting is a JavaScript vulnerability in the web applications. The easiest way to explain this is
a case when a user enters a script in the client side input fields and that input gets processed without
getting validated. This leads to untrusted data getting saved and executed on the client side.
Countermeasures of XSS are input validation, implementing a CSP (Content security policy) etc.
TIP: Know the different types of XSS and how the countermeasures work.
Point 1: Encryption is reversible whereas hashing is irreversible. Hashing can be cracked using rainbow
tables and collision attacks but is not reversible.
Although this is not something an information security guy is expected to know but the knowledge of
HTML, JavaScript and Python can be of great advantage. HTML and JavaScript can be used in web
application attacks whereas python can be used to automate tasks, exploit development etc. A little
knowledge of the three can be of great advantage - both in the interview and on the floor.
7. What is CSRF?
Cross Site Request Forgery is a web application vulnerability in which the server does not check whether
the request came from a trusted client or not. The request is just processed directly. It can be further
followed by the ways to detect this, examples and countermeasures.
Black hat hackers are those who hack without authority. White hat hackers are authorised to perform a
hacking attempt under signed NDA. Grey hat hackers are white hat hackers which sometimes perform
unauthorised activities.
A firewall is a device that allows/blocks traffic as per defined set of rules. These are placed on the
boundary of trusted and untrusted networks.
11. How do you keep yourself updated with the information security news?
Be sure to check and follow a few security forums so that you get regular updates on what is happening
in the market and about the latest trends and incidents.
12. The world has recently been hit by ……. Attack/virus etc. What have you done to protect your
organisation as a security professional?
Different organisations work in different ways, the ways to handle incident is different for all. Some take
this seriously and some not. The answer to this should be the process to handle an incident. Align this
with one you had and go on… just don’t exaggerate.
HIDS is host intrusion detection system and NIDS is network intrusion detection system. Both the
systems work on the similar lines. It’s just that the placement in different. HIDS is placed on each host
whereas NIDS is placed in the network. For an enterprise, NIDS is preferred as HIDS is difficult to
manage, plus it consumes processing power of the host as well.
Port scanning is process of sending messages in order to gather information about network, system etc.
by analysing the response received.
17. What are the objects that should be included in a good penetration testing report?
A VAPT report should have an executive summary explaining the observations on a high level along with
the scope, period of testing etc. This can be followed by no of observations, category wise split into high,
medium and low. Also include detailed observation along with replication steps, screenshots of proof of
concept along with the remediation.
Keep this simple and relevant, getting a security certification can be one personal achievement. Explain
how it started and what kept you motivated. How you feel now and what are your next steps.
In case you can’t ping the final destination, tracert will help to identify where the connection stops or gets
broken, whether it is firewall, ISP, router etc.
DDoS stands for distributed denial of service. When a network/server/application is flooded with large
number of requests which it is not designed to handle making the server unavailable to the legitimate
requests. The requests can come from different not related sources hence it is a distributed denial of
service attack. It can be mitigated by analysing and filtering the traffic in the scrubbing centres. The
scrubbing centres are centralized data cleansing station wherein the traffic to a website is analysed and
the malicious traffic is removed.
WAF stands for web application firewall. It is used to protect the application by filtering legitimate traffic
from malicious traffic. WAF can be either a box type or cloud based.
A basic web architecture should contain a front ending server, a web application server, a database
server.
Patch should be managed as soon as it gets released. For windows – patches released every second
Tuesday of the month by Microsoft. It should be applied to all machines not later than 1 month. Same is
for network devices, patch as soon as it gets released. Follow a proper patch management process.
Various security objects are governed with the help of KPI (Key Performance Indicators). Let us take the
example of windows patch, agreed KPI can be 99%. It means that 99% of the PCs will have the latest or
last month’s patch. On similar lines various security objects can be managed.
The first thing to do is to identify the scope of the audit followed by a document of the process. Study the
document carefully and then identify the areas which you consider are weak. The company might have
compensatory controls in place. Verify they are enough.
As security policy defines the security objectives and the security framework of an organisation. A
process is a detailed step by step how to document that specifies the exact action which will be
necessary to implement important security mechanism. Guidelines are recommendations which can be
customised and used in the creation of procedures.
Check the policy for the AV and then the alert. If the alert is for a legitimate file then it can be whitelisted
and if this is malicious file then it can be quarantined/deleted. The hash of the file can be checked for
reputation on various websites like virustotal, malwares.com etc. AV needs to be fine-tuned so that the
alerts can be reduced.
When the device generated an alert for an intrusion which has actually not happened: this is false positive
and if the device has not generated any alert and the intrusion has actually happened, this is the case of
a false negative.
31. What is data leakage? How will you detect and prevent it?
Data leak is when data gets out of the organisation in an unauthorised way. Data can get leaked through
various ways – emails, prints, laptops getting lost, unauthorised upload of data to public portals,
removable drives, photographs etc. There are various controls which can be placed to ensure that the
data does not get leaked, a few controls can be restricting upload on internet websites, following an
internal encryption solution, restricting the mails to internal network, restriction on printing confidential
data etc.
32. What are the different levels of data classification and why are they required?
Data needs to be segregated into various categories so that its severity can be defined, without this
segregation a piece of information can be critical for one but not so critical for others. There can be
various levels of data classification depending on organisation to organisation, in broader terms data can
be classified into:
Top secret – Its leakage can cause drastic effect to the organisation, e.g. trade secrets etc.
Confidential – Internal to the company e.g. policy and processes.
Public – Publically available, like newsletters etc.
33. In a situation where a user needs admin rights on his system to do daily tasks, what should be done –
should admin access be granted or restricted?
Users are usually not provided with admin access to reduce the risk, but in certain cases the users can be
granted admin access. Just ensure that the users understand their responsibility. In case any incident
happens, the access should be provided for only limited time post senior management approval and a
valid business justification.
Social media is acceptable, just ensure content filtering is enabled and uploading features are restricted.
Read only mode is acceptable till the time it does not interfere with work.
Back Door – A back door is a point of entry that circumvents normal security and can be used by a
cracker to access a network or computer system. Usually back doors are created by system developers
as shortcuts to speed access through security during the development stage and then are overlooked and
never properly removed during final implementation. Sometimes crackers will create their own back door
to a system by using a virus or a Trojan to set it up, thereby allowing them future access at their leisure.
Black Hat – Just like in the old westerns, these are the bad guys. A black hat is a cracker. To add insult
to injury, black hats may also share information about the “break in” with other black hat crackers so they
can exploit the same vulnerabilities before the victim becomes aware and takes appropriate measures.
Bot – A bot is a software “robot” that performs an extensive set of automated tasks on its own. Search
engines like Google use bots, also known as spiders, to crawl through websites in order to scan through
all of your pages. In these cases bots are not meant to interfere with a user, but are employed in an effort
to index sites for the purpose of ranking them accordingly for appropriate returns on search queries. But
when black hats use a bot, they can perform an extensive set of destructive tasks, as well as introduce
many forms of malware to your system or network. They can also be used by black hats to coordinate
attacks by controlling botnets.
Botnet – A botnet is a network of zombie drones under the control of a black hat. When black hats are
launching a Distributed Denial of Service attack for instance, they will use a botnet under their control to
accomplish it. Most often, the users of the systems will not even know they are involved or that their
system resources are being used to carry out DDOS attacks or for spamming. It not only helps cover the
black hat’s tracks, but increases the ferocity of the attack by using the resources of many computer
systems in a coordinated effort.
Cookies – A cookie is a small packet of information from a visited webserver stored on your system by
your computer’s browser. It is designed to store personalized information in order to customize your next
visit. For instance, if you visit a site with forms to fill out on each visit, that information can be stored on
your system as a cookie so you don’t have to go through the process of filling out the forms each time you
visit.
Cracker – When you hear the word hacker today, in reality it is normally referring to a cracker, but the
two have become synonymous. With its origin derived from “safe-cracker” as a way to differentiate from
the various uses of “hacker” in the cyber world, a cracker is someone who breaks into a computer system
or network without authorization and with the intention of doing damage. A cracker may destroy files,
steal personal information like credit card numbers or client data, infect the system with a virus, or
undertake many others things that cause harm. This glossary will give you an idea of what they can do
and some of the means they use to achieve their malicious objectives. These are the black hats.
Denial of Service Attack (DOS) – A Denial of Service attack is an attack designed to overwhelm a
targeted website to the point of crashing it or making it inaccessible. Along with sheer numbers and
frequency, sometimes the data packets that are sent are malformed to further stress the system trying to
process the server requests. A successful Denial of Service attack can cripple any entity that relies on its
online presence by rendering their website virtually useless.
Distributed Denial of Service Attack (DDOS) – A Distributed Denial of Service attack is done with the
help of zombie drones (also known as a botnet) under the control of black hats using a master program to
Dumpster Diving – The act of rummaging through the trash of an individual or business to gather
information that could be useful for a cyber-criminal to gain access to a system or attain personal
information to aid them in identity theft or system intrusion. One person’s garbage can indeed be a cyber-
criminal’s treasure.
Easter Egg – A non-malicious surprise contained in a program or on a circuit board installed by the
developer. It could be as simple as a text greeting, a signature, or an image embedded on a circuit board,
or comprise a more complex routine, like a video or a small program. The criteria that must be met to be
considered an Easter Egg are that it be undocumented, non-malicious, reproducible to anyone with the
same device or software, not be obvious, and above all – it should be entertaining!
Firewall – A firewall is a security barrier designed to keep unwanted intruders “outside” a computer
system or network while allowing safe communication between systems and users on the “inside” of the
firewall. Firewalls can be physical devices or software-based, or a combination of the two. A well
designed and implemented firewall is a must to ensure safe communications and network access and
should be regularly checked and updated to ensure continued function. Black hats learn new tricks and
exploit new techniques all the time, and what worked to keep them out yesterday may need to be
adjusted or replaced over time.
Grey Hat – A grey hat, as you would imagine, is a bit of a white hat/black hat hybrid. Thankfully, like white
hats, their mission is not to do damage to a system or network, but to expose flaws in system security.
The black hat part of the mix is that they may very well use illegal means to gain access to the targeted
system or network, but not for the purpose of damaging or destroying data: they want to expose the
security weaknesses of a particular system and then notify the “victim” of their success. Often this is done
with the intent of then selling their services to help correct the security failure so black hats cannot gain
entry and/or access for more devious and harmful purposes.
Hacker – This is the trickiest definition of the group and controversy has followed its use for decades.
Originally, the term hacker had a positive connotation and it actually had nothing to do with computer
systems. In 1946, the Tech Model Railroad Club of MIT coined the term to mean someone who applies
ingenuity to achieve a clever result. Then, when computers came along, ”hacker” took on the meaning of
someone who would “hack” away on a program through the night to make it better. But in the 80s
everything changed, and Hollywood was the catalyst. When the personal computers onslaught started
invading our daily lives, it didn’t take long for clever screen-writers to bring the black hat villains of the
cyber world to the forefront of our collective consciousness, and they haven’t looked back since. They
associated our deepest fears with the word hacker, making them the ones that unravelled our privacy, put
our safety in jeopardy, and had the power to take everything from us, from our material possessions to
our very identities. And they could do it all anonymously, by hacking away in a dark room by the dim light
of a computer monitor’s glow. Needless to say, right or wrong, it stuck! Even many professionals in the
computing field today have finally, albeit grudgingly, given in to the mainstream meaning of the word.
“Hacker” has thus become the catch-all term used when in fact it should be “cracker.”
Keylogger – A keylogger is a non-destructive program that is designed to log every keystroke made on a
computer. The information that is collected can then be saved as a file and/or sent to another machine on
the network or over the Internet, making it possible for someone else to see every keystroke that was
Logic Bomb – A logic bomb is a malicious program designed to execute when a certain criterion is met.
A time bomb could be considered a logic bomb because when the target time or date is reached, it
executes. But logic bombs can be much more complex. They can be designed to execute when a certain
file is accessed, or when a certain key combination is pressed, or through the passing of any other event
or task that is possible to be tracked on a computer. Until the trigger event the logic bomb was designed
for passes, it will simply remain dormant.
Malware – Simply put, malware is a malicious program that causes damage. It includes viruses, Trojans,
worms, time bombs, logic bombs, or anything else intended to cause damage upon the execution of the
payload.
Master Program – A master program is the program a black hat cracker uses to remotely transmit
commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.
Payload – The payload is the part of the malware program that actually executes its designed task.
Phishing – Phishing is a form of social engineering carried out by black hats in electronic form, usually by
email, with the purpose of gathering sensitive information. Often these communications will look
legitimate and sometimes they will even look like they come from a legitimate source like a social
networking site, a well-known entity like Paypal or Ebay, or even your bank. They will have a link directing
you to a site that looks very convincing and ask you to verify your account information. When you log in to
verify your information on the bogus site, you have just given the black hat exactly what they need to
make you the next victim of cyber-crime. Phishing is done in many forms – sometimes it’s easy to spot,
sometimes not.
Phreaker – Considered the original computer hackers, phreakers, or phone phreakers, hit the scene in
the 60s and made their mark by circumventing telecommunications security systems to place calls,
including long distance, for free. By using electronic recording devices, or even simply creating tones with
a whistle, phreakers tricked the systems into thinking it was a valid call. One of the first to find prominence
was “Captain Crunch,” a phreaker who realized the toy whistle that came as a prize in a box of Captain
Crunch cereal could be used to mimic the tone frequencies used by telecommunications companies to
validate and route calls.
Polymorphic Virus – A polymorphic virus is a virus that will change its digital footprint every time it
replicates. Antivirus software relies on a constantly updated and evolving database of virus signatures to
detect any virus that may have infected a system. By changing its signature upon replication, a
polymorphic virus may elude antivirus software, making it very hard to eradicate.
Rootkit – Without a doubt, the biggest fear in IT security is an undetected intrusion. A rootkit is a tool that
can give a black hat the means for just such a perfect heist. A rootkit is a malware program that is
installed on a system through various means, including the same methods that allow viruses to be
injected into a system, like email, websites designed to introduce malware, or downloading and/or
copying to the system with an unsafe program. Once a rootkit is introduced, this will create a back door
Script Kiddie – An individual who does not possess, or just doesn’t use, their own skills and know-how to
hack or crack a computer system or network, but uses a pre-written program or piece of code, a script.
While they may not possess the computing talent, they can be just as dangerous!
Social Engineering – In the realm of the black hats, social engineering means to deceive someone for
the purpose of acquiring sensitive and personal information, like credit card details or user names and
passwords. For instance, when fictitious Mr. Smith calls from IT services to inform you of new user name
and password guidelines being implemented by the company and asks you to reveal yours so he can
make sure they meet the new guidelines, you have been a target of social engineering. They can be very
clever and resourceful, and very, very convincing. The only way to make sure you are not a victim of
social engineering is never to give your personal and sensitive information to anyone you are not
absolutely sure about. There are very few occasions that anyone legitimate would ever ask you for a
password, and you should always be the one contacting them, not the other way around.
Spam – Spam is simply unsolicited email, also known as junk email. Spammers gather lists of email
addresses, which they use to bombard users with this unsolicited mail. Often, the emails sent are simply
advertising for a product or a service, but sometimes they can be used for phishing and/or directing you to
websites or products that will introduce malware to your system. When you receive spam, the best
practice is to delete it immediately. Sometimes you will see a note in a spam email that gives you
instructions on how to be removed from the list – never do it! This will only confirm to the spammer that
they have a valid email address and the spam will just keep coming. They could also then sell your email
address to another spammer as a confirmed email address and more spam will show up in your inbox.
Most mail services have spam filters and these should be employed whenever possible.
Spoofing – Spoofing is the art of misdirection. Black hat crackers will often cover their tracks by spoofing
(faking) an IP address or masking/changing the sender information on an email so as to deceive the
recipient as to its origin. For example, they could send you an email containing a link to a page that will
infect your system with malware and make it look like it came from a safe source, such as a trusted friend
or well-known organization. Most of the true sources have security measures in place to avoid tampering
with sender information on their own mail servers, but as many black hat spammers will launch attacks
from their own SMTP (Simple Mail Transfer Protocol), they will be able to tamper with that information.
When in doubt, check with the source yourself.
Spyware – Spyware is software designed to gather information about a user’s computer use without their
knowledge. Sometimes spyware is simply used to track a user’s Internet surfing habits for advertising
purposes in an effort to match your interests with relevant ads. On the other side of the coin, spyware can
also scan computer files and keystrokes, create pop-up ads, change your homepage and/or direct you to
pre-chosen websites. One common use is to generate a pop-up ad informing you that your system has
been infected with a virus or some other form of malware and then force you to a pre-selected page that
has the solution to fix the problem. Most often, spyware is bundled with free software like screen savers,
emoticons and social networking programs.
Time Bomb – A time bomb is a malicious program designed to execute at a predetermined time and/or
date. Time bombs are often set to trigger on special days like holidays, or sometimes they mark things
Trojan – A Trojan, or Trojan Horse, is a malicious program disguised to look like a valid program, making
it difficult to distinguish from programs that are supposed to be there. Once introduced, a Trojan can
destroy files, alter information, steal passwords or other information, or fulfil any other sinister purpose it
was designed to accomplish. Or it may stay dormant, waiting for a cracker to access it remotely and take
control of the system. A Trojan is a lot like a virus, but without the ability to replicate.
Virus – A virus is a malicious program or code that attaches itself to another program file and can
replicate itself and thereby infect other systems. Just like the flu virus, it can spread from one system to
another when the infected program is used by another system. The more interconnected the host is, the
better its chances to spread. The spread of a virus can easily occur on networked systems, or it could
even be passed along on other media like a CD or memory stick when a user unwittingly copies an
infected file and introduces it to a new system. A virus could even be emailed with an attachment. “Virus”
is often incorrectly used as a catch-all phrase for other malicious programs that don’t have the ability to
self-replicate, like spyware and adware.
Wardriving – Wardriving is the act of driving around in a vehicle with the purpose of finding an open,
unsecured Wi-Fi wireless network. Many times, the range of a wireless network will exceed the perimeter
of a building and create zones in public places that can be exploited to gain entry to the network. Black
hats, and even grey hats, will often use a GPS system to make maps of exploitable zones so they can be
used at a later time or passed on to others. Wardriving is not the only way this task is performed – there
are Warbikers and Warwalkers too. As you can see, it is imperative that your WiFi network is secure
because there are entities out there looking for any opening to ply their trade.
White Hat – While black hats use their skill for malicious purposes, white hats are ethical hackers. They
use their knowledge and skill to thwart the black hats and secure the integrity of computer systems or
networks. If a black hat decides to target you, it’s a great thing to have a white hat around. But if you don’t,
you can always call on one of ours at Global Digital Forensics.
Worm – A worm is very similar to a virus in that it is a destructive self-contained program that can
replicate itself. But unlike a virus, a worm does not need to be a part of another program or document. A
worm can copy and transfer itself to other systems on a network, even without user intervention. A worm
can become devastating if not isolated and removed. Even if it does not cause outright damage, a worm
replicating out of control can exponentially consume system resources like memory and bandwidth until a
system becomes unstable and unusable.
Zero Day Threat/Exploit – Every threat to your computer security has to start somewhere. Unfortunately,
the way most of us protect ourselves from cyber threats and intrusions, is to use detection programs that
are based on analysing, comparing and matching the digital footprint of a possible threat to an internal
database of threats that have been previously detected, reported and documented. That’s why we all
have to go through those seemingly never-ending updates to our antivirus programs, that’s how the
database is updated and the newest threats are added to the list of what the scanners look for. That
inherent flaw in our scanners is what makes a Zero Day threat so dangerous. A Zero Day threat is pristine
and undocumented. From the very first day a particular threat is ever deployed (zero day) until that threat
is noticed, reported, documented and added to the index, it is an unknown. As far as standard protection
goes, unknown means invisible – and when it comes to cyber threats, invisible can definitely mean
trouble.
Additional Information:
BRIEF HISTORY
The Act was subsequently and substantially amended in 2006 and again in 2008 citing the following
objectives:
The Act extends to the whole of India, save as otherwise provided in this Act. It can also apply to any
offence or contravention provided for in the Act, whether committed in India & outside India by any person,
The main provisions of the Act come in to force on the 9th of June 2000. Certain provisions were given
effect on later dates by issuing specific notifications in this regards.
The Act shall not apply to documents or transactions specified in the First Schedule. Every notification
issued to amend the first schedule shall be laid before each House of Parliament. Presently, the First
schedule contains the following entries:
1. A negotiable instrument (other than cheque) as defined in negotiable instrument Act, 1881.
2. Power of Attorney as defined in P-O-A Act, 1882.
3. A trust as defined in Indian Trusts Act, 1882.
4. A will as defined in Indian Succession Act, 1925 including any other testamentary disposition by
whatever name called.
5. Any contract for sale or conveyance of immovable property or any interest in such property.
For this purpose every notification issued by the Central Government to add, amend or delete any item
mentioned in the schedule as a pre-requisite place before both houses of the Parliament for their scrutiny
and approval.
The provisions of the Act have an overriding effect, notwithstanding anything inconsistent therewith
contained in any other law for the time being in force.
DEFINITIONS
a. "access" with its grammatical variations and cognate expressions means gaining entry into,
instructing or communicating with the logical, arithmetical, or memory function resources of a
computer, computer system or computer network;
b. "addressee" means a person who is intended by the originator to receive the electronic record but
does not include any intermediary;
c. "adjudicating officer" means an adjudicating officer appointed under subsection (1) of section 46;
d. "affixing electronic signature" with its grammatical variations and cognate expressions means
adoption of any methodology or procedure by a person for the purpose of authenticating an
electronic record by means of electronic signature;
e. "appropriate Government" means as respects any matter,—
ii. relating to any State law enacted under List III of the Seventh Schedule to the Constitution, the State
Government and in any other case, the Central Government;
f. "asymmetric crypto system" means a system of a secure key pair consisting of a private key for
creating a electronic signature and a public key to verify the electronic signature;
i. the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and
ii. terminals or a complex consisting of two or more interconnected computers or communication device
whether or not the interconnection is continuously maintained;
k. "computer resource" means computer, computer system, computer network, data, computer data
base or software;
l. "computer system" means a device or collection of devices, including input and output support
devices and excluding calculators which are not programmable and capable of being used in
conjunction with external files, which contain computer programmes, electronic instructions, input
data and output data, that performs logic, arithmetic, data storage and retrieval, communication
control and other functions;
m. "Controller" means the Controller of Certifying Authorities appointed under sub-section (l) of
section 17;
n. "Cyber Appellate Tribunal" means the Cyber Appellate Tribunal established under sub-section (1)
of section 48;
(na). “cyber café” means any facility from where access to the internet is offered by any person in the
ordinary course of his business to the members of the public;
(nb). "Cyber Security" means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure,
disruption, modification or destruction.
(ta). "electronic signature" means authentication of any electronic record by a subscriber by means of an
electronic technique specified in the Second schedule and includes a digital signature;
(tb). "Electronic Signature Certificate" means an Electronic Signature Certificate issued under section 35
and includes a Digital Signature Certificate.
u. "function", in relation to a computer, includes logic, control arithmetical process, deletion, storage
and retrieval and communication or telecommunication from or within a computer;
v. "information" includes data, message, text, images, sound, voice, codes, computer programmes,
software and databases or micro film or computer generated micro fiche:
w. "intermediary" with respect to any particular electronic record, means any person who on behalf
of another person receives, stores or transmits that record or provides any service in respect to
that record and includes telecom service providers, network service providers, internet service
providers, web-hosting service providers, search engines, online payment sites, online auction
sites, online market places and cyber cafes;
x. "key pair", in an asymmetric crypto system, means a private key and its mathematically related
public key, which are so related that the public key can verify a electronic signature created by
the private key;
y. "law" includes any Act of Parliament or of a State Legislature, Ordinances promulgated by the
President or a Governor, as the case can be. Regulations made by the President under article
240, Bills enacted as President's Act under sub-clause (a) of clause (1) of article 357 of the
Constitution and includes rules, regulations, byelaws and orders issued or made thereunder;
z. "licence" means a licence granted to a Certifying Authority under section 24;
(za). "originator" means a person who sends, generates, stores or transmits any electronic message or
causes any electronic message to be sent, generated, stored or transmitted to any other person but does
not include an intermediary;
(zc). "private key" means the key of a key pair used to create a electronic signature;
(zd). "public key" means the key of a key pair used to verify a electronic signature and listed in the
Electronic Signature Certificate;
(ze). "secure system" means computer hardware, software, and procedure that—
(zf). "security procedure" means the security procedure prescribed under section 16 by the Central
Government;
(zg). "subscriber" means a person in whose name the Electronic Signature Certificate is issued;
(zh). "verify" in relation to a electronic signature, electronic record or public key, with its grammatical
variations and cognate expressions means to determine whether—
a. the initial electronic record was affixed with the electronic signature by the use of private key
corresponding to the public key of the subscriber;
b. the initial electronic record is retained intact or has been altered since such electronic record was so
affixed with the electronic signature.
Any reference in the Act to any enactment or any provision thereof shall, in relation to an area in which
such enactment or such provision is not in force, is to be construed as a reference to the corresponding
law or the relevant provision of the corresponding law, if any, in force in that area.
The Act provides that the authentication of the electronic record can be effected by the use of asymmetric
crypto system and hash function which envelop and transform the initial electronic record into another
electronic record.
A "hash function" is an algorithm mapping or translation of one sequence of bits into another, generally
smaller, set known 'as "hash result" such that an electronic record yields the same hash result every time
the algorithm is executed with the same electronic record as its input making it computationally
infeasible—
a. to derive or reconstruct the original electronic record from the hash result produced by the
algorithm;
b. that two different electronic records can produce the same hash result using the algorithm.
The record can be accessed by the use of public key of the subscriber. The private key and the public key
are unique to the subscriber and constitute a functioning key pair.
a. The signature creation data or authentication data are, within the context they are used, linked to
the signatory, or as the case may be, the authenticator and to no other person;
b. The signature creation data or authentication data were, at the time of signing, under the control
of the signatory or, as the case may be, the authenticator and to no other person;
c. Any alteration to the electronic signature made after affixing such signature is detectable.
d. Any alteration to the information made after its authentication by electronic signature is detectable.
e. It fulfills other prescribed conditions.
The Central Government can prescribe the procedure for the purpose of ascertaining who has affixed the
signature. The Central Government can also, by notification in the Official Gazette, add or omit any
reliable electronic signature or electronic authentication technique or the procedure for affixing the same.
The notification of such method or procedure is required to be placed before both houses of the
Parliament.
Where any law provides that information or any other matter shall be in writing or in the typewritten or
printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to
have been satisfied if such information or matter is—
Where any law requires that information or any other matter shall be authenticated by affixing the
signature or any document shall be signed or bear the signature of any person then, notwithstanding
anything contained in such law, such requirement will be deemed to have been satisfied, if such
information or matter is authenticated by means of electronic signature affixed in such manner as
prescribed by the Central Government.
Where any law provides for the filing of any form, application or any other document with any authority,
agency, owned or controlled by the appropriate Government in a particular manner, Or it provides for the
issue or grant of any licence, permit, sanction or approval or the receipt or payment of money in a
particular manner, then, notwithstanding anything contained in any other law for the time being in force,
such requirement is deemed to have been satisfied if such filing, issue, grant, receipt or payment, as the
case may be, is effected by means of such electronic form as prescribed by the appropriate Government.
The appropriate Government is empowered to prescribe rules regarding the manner and the format, in
which such electronic records shall be filed, created or issued and the manner or method of payment of
any fee for creating, filing or issuing such record.
NO Person is conferred the right to insist the Government or any body funded or controlled by it upon
accepting, issuing, creating, retaining and preserving any document in the form of electronic records or
effecting any monetary transaction in the electronic form.
Where any law provides that documents, records or information be retained for a specific period, then the
requirement will be said to have been met if the documents are retained in electronic format and if the
information contained therein remains accessible so as to be usable for subsequent reference in the
format it was originally created, generated, sent or received or in a format which can be demonstrated to
represent accurately the information originally generated, sent or received, including the details of the
identification of the origin, destination, dispatch or receipt of such electronic record are available in the
electronic record. These conditions however do not apply to electronic documents which are generated
automatically, solely for the purpose of enabling an electronic record to be retention of documents,
records or information in the form of electronic records.
Where the audit of documents, records or information is required to be conducted under any law, the
same shall also be applicable for audit of documents, records or information processed and maintained in
electronic form.
Where any law provides that any rule, regulation, order, bye-law, notification or any other matter will be
published in the Official Gazette, then, such requirement is deemed to have been satisfied if such rule,
regulation, etc is published in the Official Gazette or Electronic Gazette and the date of publication in such
an Electronic Gazette is deemed to be the date of the Gazette which was first published in any form.
The Central Government is empowered to prescribe the type of electronic signature, the manner and
format in which the electronic signature will be affixed so as to facilitate the identification of the person
affixing the electronic signature. The Government will also prescribe the control processes and
procedures to ensure adequate integrity, security and confidentiality of electronic records or payments;
and any other matter which is necessary to give legal effect to electronic signatures.
In case of a contract, where the contract formation, the communication of proposals, the acceptance or
revocation of the proposals, as the case may be, are expressed in electronic form or by means of an
electronic record, the enforceability of the record will not be denied solely on the grounds that such
electronic form or means were used to contract.
An electronic record can be attributed to the originator, if it can be demonstrated that it was sent by the
originator himself or by a person authorised by the originator in respect of that electronic record; or by an
information system programmed to operate automatically in this regards.
Where the originator has stipulated that the electronic record will be binding only on receipt of an
acknowledgment of such electronic record by him, then in such a case, unless the addressee sends such
an acknowledgment and the originator receives the same, it will be assumed that the electronic record
was never sent.
Where the originator has not stipulated that the electronic record will be binding only on receipt of such
acknowledgment, and the acknowledgment has not been received by the originator within a reasonable
time or a agreed period, then the originator can give notice to the addressee stating that no
acknowledgment has been received by him and specifying a reasonable time by which the
acknowledgment must be received by him and if an acknowledgment is not received within the aforesaid
time limit he can after giving notice to the addressee, treat the electronic record as though it has never
been sent.
The Originator and the addressee can agree to the time and place of receipt of the electronic record.
Generally, unless otherwise agreed to the contrary by the originator and the addressee, when an
electronic record enters a computer resource outside the control of the originator or when it enters the
computer resource of the addressee, it is deemed to have been dispatched.
If the addressee has designated a specific computer resource and the electronic record is sent to such a
designated computer resource, then when the electronic record enters the designated computer resource
is deemed to be the time of receipt. If instead of sending to the designated computer resource of the
addressee, the originator sends to another computer resource then receipt occurs at the time when the
electronic record is retrieved by the addressee from such a computer resource. These would apply even if
the place where the computer resource is located in a different place.
An electronic record is deemed to "be dispatched at the place where the originator has his place of
business, and is deemed to be received at the place where the addressee has his place of business
inspite of the computer resources are located at any other place.
It is possible that the originator or the addressee may have more than one place of business, in such a
case the principal place of business, will be the place of business for the purpose of receipt and despatch.
If the originator or the addressee does not have a place of business, his usual place of residence will be
deemed to be the place of business, in the case the addressee or the originator is a body corporate, then
such usual place will be the place where such a body corporate is registered.
Where any security procedure is applied to an electronic record, at a specific point of time, then from such
point onwards up to the time of verification, the record is deemed to be a secure electronic record.
The Central Government is empowered to prescribe the security procedure and practices considering the
commercial circumstances, nature of transactions and such other related factors.
The Central Government is empowered to appoint a Controller of Certifying Authorities (“CCA”) and such
number of Deputy Controllers and Assistant Controllers, other officers and employees. Such an
appointment of the Controller, Deputy & Assistant Controllers is to be notified in the Official Gazette The
Controller discharges his functions under this Act subject to the general control and directions of the
Central Government. The Deputy Controllers (“Dy CA”) and Assistant Controllers (“ACA”), other officers
and employees in turn, perform the functions assigned to them by the Controller under the general
superintendence and control of the Controller. Such assigned/ delegated functions are assigned by the
CCA to the Dy CA & ACA in writing.
The Central Government can prescribe the requirements pertaining to the qualifications, experience and
terms and conditions of service of CCA, the Dy CA and the ACA, other officers and employees. Further it
can also require that the Head Office and Branch Office of the Controller will be at / established at all
such places as specified by the Central Government. The Act provides that there will be a seal of the
Office of the Controller.
The primary function of the CCA is to regulate the Certifying Authorities(“CA”). For the purpose of
regulating the CA the CCA may perform all or any of the following functions, namely:—
The CCA, with the prior approval of the Central Government and subject to the conditions and restrictions
specified in this regards by regulations, by notification in the Official Gazette, can recognize any foreign
CA as a CA for the purposes of this Act. Once a foreign CA is granted recognition by the CCA, an
Electronic Signature Certificate (“ESC”) issued by such Certifying Authority will be valid for the purposes
of this Act.
If any foreign CA who has been granted recognition by the CCA and if the CCA is satisfied that such a CA
has contravened any of the conditions or restrictions subject to which the CA was granted recognition
under by the CCA, then the CCA after recording the reasons in writing, revoke such recognition by
notification in the Official Gazette.
Any person can obtain a license to issue an ESC by making an application to the CCA. After receiving the
application the CCA verifies whether or not such an applicant has satisfied the eligibility criteria, as
specified by the Central Government in respect of qualification, expertise, manpower, financial resources
and other infrastructure facilities. Once the eligibility of the applicant is ascertained, the CCA issues a
license to the applicant. The licensee is thereafter subject such terms and conditions as are provided for
in the regulations issued in this regards. Any license granted under this section is valid for such period as
can be provided for by the Central Government. It may be noted that such a license is not transferable or
inheritable.
Every application is required to be in the prescribed form. Along with the application the applicant is also
required to file:
An application for renewal of a license is also required to be in the prescribed form accompanied by such
fees, which cannot exceed five thousand rupees and has to be made at least forty-five days before the
date of expiry of the period of validity of the existing license.
made an incorrect or false statement in his application for the issue or renewal of licence;
failed to comply with the terms and conditions subject to which the licence was granted;
has not maintained the standards required to be followed under this Act;
contravened any provisions of this Act, rule, regulation or order made there under
then after giving a reasonable opportunity to show cause against the proposed revocation, revoke the
license. In the alternative, pending such an inquiry, if the CCA is of the opinion that there exist
circumstances for the revocation of the license of the CA, then the CCA can suspend the license till the
completion of the inquiry. The period of suspension cannot however exceed a period of 10 days unless
the CA has been given a reasonable opportunity of showing cause against the proposed suspension. The
CA is barred from issuing any ESCs during his suspension period.
After making an inquiry into an allegation of default and after giving the defaulting CA a reasonable
opportunity of being heard, if the CCA is satisfied that the license of the CA need to be suspended or
revoked, he can proceed against the CA and suspend or revoke his license. The notice of such an action
of suspension or revocation, as the case may be, by the CCA is required to be published in the database
and all the repositories maintained by the CCA. The CCA is required also make available such a notice of
suspension or revocation of license, through a website which is accessible round the clock. If considered
appropriate by the CCA he may publicise the contents of database in appropriate electronic or other
media. The CCA can delegate or authorize the Dy. CA or the ACA to exercise any of its power in respect
of the regulation of Certified Authorities.
Without prejudice to the provisions of sub-section (1) of section 69, the CCA or any person authorized by
him will, if he has reasonable cause to suspect that the provisions related to regulation of CAs, rules or
regulations made there under, are being contravened, then they can search or access any computer
system, any apparatus, data or any other material connected with such system to obtain any information
or data contained in or available to such computer system. In doing so they can direct any person in
charge of, or otherwise concerned with the operation of, the computer system, data apparatus or material,
to provide such reasonable technical and other assistance as the investigating authority may consider
necessary.
The CCA or any officer authorised by him for this purpose can investigate into any contravention of the
provisions of this Act, rules or regulations made thereunder. For the purpose of investigating the
contraventions under this Act, the CCA or any authorized officer has the powers similar to the powers
which are conferred on Income-tax authorities under Chapter XIII of the Income-tax Act, 1961 and the
CCA can exercise such powers, subject to such limitations laid down under the Income-tax Act, 1961.
Every CA will, —
i. its ESC;
iv. any other fact that materially and adversely affects either the reliability of a ESC, which that CA has
issued, or the CA's ability to perform its services.
k. Where the CA is of the opinion that the situation so merits which can materially and adversely
affect the integrity of its computer system or the conditions subject to which a ESC was granted,
then, the CA will—
b. act in accordance with the procedure specified in its certification practice statement to deal with such
event or situation.
The CCA can, after consultation with the Cyber Regulations Advisory Committee and with the previous
approval of the Central Government, by notification in the Official Gazette make regulations consistent
with this Act and the rules made there under to carry out the purposes of this Act. In particular, and
without prejudice to the generality of the foregoing power, such regulations can provide for all or any of
the following matters, namely:
a. the particulars relating to maintenance of data-base containing the disclosure record of every
Certifying Authority;
b. the conditions and restrictions subject to which the Controller can recognise any foreign Certifying
Authority;
c. the terms and conditions subject to which a licence to issue a ESC can be granted;
Any person can make an application to the CA for the issue of a ESC. The application will be in the form
prescribed by the Central Government. The application shall be accompanied with the prescribed fee not
exceeding twenty five thousand rupees, to be paid to the Certifying Authority. The fee could be different
fees for different classes of applicants'. In addition to the fees the application is also required to be
accompanied with a certification practice statement or where there is no such statement, a statement
containing such particulars, as may be required by regulations.
The CA can consider such an application accompanied with the certification practice statement, and after
making the necessary inquiry, as the CA deems fit, either grant the ESC or for reasons to be recorded in
writing, reject the application. The application can be rejected only after giving the applicant a reasonable
opportunity of being heard.
a. Has complied with the provisions, rules and regulations of this Act
b. Has published or made available the ESC to any person relying on it or to a subscriber who has
accepted it.
c. The subscriber holds the private key corresponding to the public key, listed in the ESC;
d. the subscriber holds a private key which is capable of creating a digital signature;
e. the public key to be listed in the certificate can be used to verify a digital signature affixed by the
private key held by the subscriber;
f. The subscriber's public key and private key constitute a functioning key pair,
g. The information contained in the ESC is accurate; and
h. it has no knowledge of any material fact, which if it had been included in the Electronic Signature
Certificate would adversely affect the reliability of the representations made in clauses (a) to (d).
Any ESC which is issued by a CA can be suspended by the CA on the occurrence of one of the following
events:
The suspension of the ESC by the CA is required to be communicated to the subscriber. The CA cannot
suspend the ESC for a period more than 15 days, without providing the subscriber, a reasonable
opportunity of being heard.
A CA canrevoke a ESC issued by it on a specific request being made to it, by the subscriber or a person
duly authorized by him in this regards. The CA can also revoke the ESC upon the death of the subscriber,
where the subscriber is an individual, or on dissolution, where the subscriber is a firm or on the winding
up, where the subscriber is a corporate entity.
An ESC can be revoked by the CA with immediate effect, after giving the subscriber a reasonable
opportunity of being heard if, the CA is of the opinion that a material misrepresentation or concealment of
the facts in the ESC or for non fulfillment of any requirement which were pre-requisites for the issue of the
ESC or where the CAs private key or security system has been compromised in a manner materially
affecting the ESCs reliability or where the subscriber has been adjudged insolvent or on account of death,
dissolution or winding-up or any other circumstances as a result of which the subscriber to the ESC
ceases to exist. The revocation of a ESC by the CA has to be communicated to the subscriber.
Any suspension or revocation of ESCs is required to be published in the public repositories (one or more
as the case may be) maintained by the CA.
DUTIES OF SUBSCRIBERS
Where any Electronic Signature Certificate, the public key of which corresponds to the private key of that
subscriber which is to be listed in the Electronic Signature Certificate has been accepted by a subscriber,
then, the subscriber will generate the key pair by applying the security procedure. Further the subscriber
shall perform such duties as may be prescribed.
A subscriber is deemed to have accepted a ESC if he publishes or authorizes the publication of a ESC to
one or more persons in a repository, or otherwise demonstrates his approval of the ESC in any manner.
By accepting a ESC the subscriber certifies to all who reasonably rely on the information contained in the
ESC that the subscriber holds the private key corresponding to the public key listed in the ESC and is
entitled to hold the same. Furthermore all representations made by the subscriber to the CA and all
material relevant to the information contained in the ESC are true to the best of his belief.
Every subscriber is required to exercise reasonable care to retain control of his private key, which
corresponds to the public key listed in his ESC and take all steps to prevent its disclosure to a person not
authorized to affix the electronic signature of the subscriber.
If the private key is compromised, then, the subscriber will communicate the same forthwith to the CA in
specified manner. The subscriber is liable for all events occurring as a result of the compromising of the
The Information Technology Amendment Act 2008 have introduced a host of offencies and prescribed
penalties for these offences.
If any person without permission (or the knowledge) of the owner or any other person who is in-charge of
a computer, computer system or computer network, —
He can be made liable to pay damages by way of compensation not exceeding one crore rupees to the
person so affected.
i. "computer contaminant" means any set of computer instructions that are designed—
a. to modify, destroy, record, transmit data or programme residing within a computer,
computer system or computer network; or
b. by any means to usurp the normal operation of the computer, computer system, or
computer network;
When a body corporate is in possession, handling or dealing in sensitive personal data or information in a
computer resource that it owns, controls or operates, is found negligent in implementing & maintaining
reasonable security practices and procedures and thereby causes wrongful loss or gain to any person,
then in such a case the body corporate will be held liable to damages as compensation to a sum not
exceeding Rs 5 Crores to the person so effected.
For this purpose, "body corporate" means any company and includes a firm, sole proprietorship or other
association of individuals engaged in commercial or professional activities;
“Reasonable security practices and procedures” would include such practices and procedures which are
designed to protect information from unauthorized access, damage, misuse, modification, disclosure etc,
as may be agreed to between the parties or as determined by law in force and in the absence of such
agreement or any law, such reasonable security practices and procedures, as may be prescribed by the
Central Government in consultation with such professional bodies or associations as it may deem fit;
"Sensitive personal data or information" means such personal information as may be prescribed by the
Central Government in consultation with such professional bodies or associations as it may deem fit.
Note: Refer Notification G.S.R. 313(E).— dated 11th April 2011 for Information Technology
(Reasonable security practices and procedures and sensitive personal data or information) Rules,
2011. Notified by the Central Government.
If any person who under this Act or any rules or regulations made there under to—
a. Is required by the CCA or CA to furnish any document, return or report fails to do so, will be liable
to a penalty not exceeding Rs 1,50,000/-for each such failure;
b. Is required to file any return or furnish any information, books or other documents within the time
specified by the regulations, fails to do so, within the time specified, will be liable to a penalty not
exceeding Rs 5000/- per day of such continuing default;
Unless otherwise provided under this act or under any other act, any person, including an intermediary
who, while providing services under the terms of lawful contract, has secured access to any material
containing personal information about another person, with the intent to cause or knowing that he is likely
to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in
breach of a lawful contract, such material to any other person shall be punished with imprisonment for a
term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both.
A penalty imposed or compensation awarded or confiscation under the Act, will not result in avoidance of
an award of compensation or imposition of any penalty or punishment under any other law.
RESIDUARY PENALTY
Whoever contravenes any rules or regulations made under this Act, and no penalty has been separately
provided for such contravention, will be liable to pay a compensation not exceeding Rs 25,000/- to the
person affected by such contravention or a penalty of equal amount.
A penalty imposed under this Act, if it is not paid, can be recovered as an arrear of land revenue and the
license or the ESC, as the case may be, can be suspended till the penalty is paid.
COMPOUNDING OF OFFENCES
can be compounded under section 77A of the Act. However the benefit of compounding will not be
available to a person who has been previously convicted for the same or similar offence or who is liable to
enhanced punishment.
No court can take cognizance of any of the above-mentioned offences unless the person aggrieved by
the offence lodges a complaint. Only an officer of rank of a Deputy Superintendent of Police can
investigate cognizable offences under this act. When an officer in charge of a police station is given
information pertaining to a non cognizable offence, he is required to record such information in such
records as are prescribed by the State Government. The Officer who receives such information can
exercise the same power of investigation (except the power to arrest without warrant), as an Officer in
charge of police station would have under section 156 of code of criminal procedure.
Such appointment shall be made by CG. Person so appointed shall have adequate exp. in field of Info.
Technology and such legal and judicial experience as may be prescribed by CG.
The adjucating officer shall exercise jurisdiction to adjudicate matters in which the claim for injury or
damage does not exceed rupees five crores.
In respect of claim for injury or damage exceeding rupees five crores, jurisdiction shall vest with the
competent court.
For the purpose of holding an inquiry and for the purposes of adjudication the Officer will have the powers
of a civil court which are conferred oh the Cyber Appellate Tribunal under sub-section (2) of section 58.
All the proceedings held before the Adjudicating Officer will be deemed to be judicial proceedings within
the meaning of sections 193 and 228 of the Indian Penal Code and for the purposes of sections 345 and
346 of the Code of Criminal Procedure, 1973 be deemed to be a civil court.
The Officer for the purpose of holding an inquiry, as prescribed by the Central Government, is required to
give the person being accused of the contravention a reasonable opportunity for making representation in
the matter. If after giving such an opportunity the officer is of the opinion that such person has as alleged
contravened the provisions of the Act, or any Rules, regulations and direction there under, can impose
such penalty or award such compensation as he thinks fit in accordance with the provisions.
Sec 47 provides that for the purpose of imposing penalty or for awarding compensation the Officer will
take into consideration the following:
a. the amount of gain of unfair advantage, wherever quantifiable, made as a result of the default;
b. the amount of loss caused to any person as a result of the default;
c. the repetitive nature of the default
The Central Government, by notification, can establish one or more appellate tribunals to be known as
the Cyber Appellate Tribunal ( “tribunal”). Such notification will also specify the matters and places in
relation to which the Cyber Appellate Tribunal can exercise jurisdiction.
The Central Government in consultation with the Chief Justice of India selects the Chairperson and other
members. The Cyber Appellate Tribunal is made up of a Chairperson and such number of Members, as
the Central Government deems fit. The Chairperson and one or two Members shal constitute a Bench of
the Tribunal. The Tribunal exercises its jurisdiction and all the powers, authority through such a Bench.
The Central Government has mandated that the Bench of the Tribunal will sit in New Delhi and at such
places which the Central Government in consultation with the Chairperson may resolve. Once having
resolved where the Bench will be situated, the Central Government demarcates the areas where the
Bench will exercise its jurisdiction notifies such resolution in the Official Gazette. The Chairperson of the
Tribunal can transfer the Member (s) from one Bench to another.
The Information Technology Amendment Act 2006 and the Information Technology Amendment Act 2008
have introduced a slew of changes in the manner of appointment of the Chairperson and the Members
(Judicial as well as non Judicial) of the Cyber Appellate Tribunal. The changes include the basic eligibility
criteria, the manner in which the salary and other emoluments will be given/ announced, the requirement
of independence and retirement from earlier service.
Only a person who is, or has been, or is qualified to be, a Judge of a High Court. The Members of the
Tribunal, barring the Judicial Member will be appointed by the Central Government. Such a Member shall
from amongst persons who posses special knowledge and professional experience in the field of
Information Technology, Telecommunication, Industry, Management and Consumer Affairs. The
Government can only select the Members from the cadre of Central or State Government employees,
holding the position of Additional Secretary for a period not less than 2 years or a Joint Secretary to the
Government of India or an equivalent position with either the Central or the State Government for a period
not less than 7 years.
Only a person who is a member of the Indian Legal Service and has held the position of an Additional
Secretary for a period of one year or a Grade I post of the Legal Service for a period not less than 5 years,
is qualified to be selected as the Judicial Members of the Tribunal.
Before the appointment of the Chairperson and the Members of the Tribunal, the Central Government
satisfies itself that the candidate is an independent person and a person of integrity who will not be
interested either financially or in any other way, that may prejudicially influence his discharging of the
functions of a Chairperson or as a Member of the Cyber Appellate Tribunal. On his selection, either as a
Member of Chairperson of the Tribunal, the candidate (officer of the Central / State Government) is
required to retire from his service before he is allowed to join as the Member/ Chairperson of the Cyber
Appellate Tribunal
The Chairperson and the Members hold office for a term of five years from the date of entering his office
or until they attain the age of sixty five years, which ever occurs earlier During the tenure the Chairperson
and the Members will be entitled to such a salary, allowance and other benefits like gratuity, pension, etc
as may be prescribed.
The Chairperson has the power of general supervision and administration of the conduct of affairs of the
Bench. In addition to presiding over the meetings of the Tribunal the Chairperson exercises and
discharges such functions and powers as are prescribed in this regards.
The Chairperson distributes the business to a Bench of the Tribunal and directs the manner in which each
matter will be dealt with. The Chairperson can also, on receipt of an application in this regards from any of
the parties and after giving a notice to such parties and giving them a hearing as he deems proper or suo
moto without such a notice, can transfer the matter from one Bench to another for its disposal.
Once the Chairperson has been appointed neither the salary and allowances nor the other terms and
conditions of his service can be varied to his disadvantage. If, for reason other than temporary absence,
any vacancy occurs in the office of the Chairperson of a Cyber Appellate Tribunal, then the Central
Government is to appoint another person in accordance with the provisions of this Act to fill the said
vacancy and the proceedings can be continued before the Cyber Appellate Tribunal from the stage at
which the vacancy is filled.
The Chairperson of a Cyber Appellate Tribunal can, address to the Central Government his notice in
writing, under his hand to resign his office. Unless a shorter period of relinquishment is permitted by the
Central Government, the Chairperson can continue to hold office until the expiry of three months from the
date of receipt of such notice or until a person duly appointed as his successor enters upon his office or
until the expiry of his term of office, whichever is the earliest.
The Central Government can remove the Chairperson from his office only by way of an order in writing on
the grounds of proved misbehavior or incapacity after an inquiry. Such an inquiry can be made only by a
Judge of the Supreme Court in which the Chairperson concerned has been informed of the charges
against. The Chairperson has to be given a reasonable opportunity of being heard in respect of these
charges. The Central Government can, by rules, regulate the procedure for the investigation of
misbehavior or incapacity of the aforesaid Chairperson.
The order of the Central Government appointing any person as the Chairperson or Member of a Cyber
Appellate Tribunal and no act or proceeding before a Cyber Appellate Tribunal shall not be called in
question in any manner on the ground merely of any defect in the constitution of a Cyber Appellate
Tribunal.
The Central Government shall provide the Cyber Appellate Tribunal with such officers and employees as
required. The officers and employees of the Cyber Appellate Tribunal shall discharge their functions
under general superintendence of the Presiding Officer. The salaries and allowances and other conditions
of service of the officers and employees of the Cyber Appellate Tribunal shall be such as may be
prescribed by the Central Government.
The Chairperson, Members and other officers and employees of a Cyber Appellate Tribunal, the
Controller, the Deputy Controller and the Assistant Controllers shall be deemed to be Public Servants
within the meaning of section 21 of the Indian Penal Code.
Any person aggrieved by an order made by Controller or an adjudicating officer under this Act can prefer
an appeal to a Cyber Appellate Tribunal having jurisdiction in the matter. However no appeal shall lie to
the Cyber Appellate Tribunal from an order made by an adjudicating officer with the consent of the parties.
The appeal can be filed by the aggrieved person within a period of 45 days from the date of receipt of
order in the prescribed form and accompanied by prescribed fee. The Cyber Appellate Tribunal can
entertain an appeal after the expiry of the said period of 45 days if it is satisfied that there was sufficient
cause for not filing it within the prescribed period. The provisions of the Limitation Act, 1963, will, as far as
can be, apply to an appeal made to the Cyber Appellate Tribunal.
The Cyber Appellate Tribunal can, after giving the parties to the appeal, an opportunity of being heard,
pass such orders thereon as it thinks fit, confirming, modifying or setting aside the order appealed against.
The Cyber Appellate Tribunal will send a copy of every order made by it to the parties to the appeal and
to the concerned Controller or adjudicating office
The Cyber Appellate Tribunal is not be bound by the procedure laid down by the Code of civil Procedure,
1908 but is be guided by the principles of natural justice and, subject to the other provisions of this Act
and of any rules, the Cyber Appellate Tribunal has the powers to regulate its own procedure including the
place at which it shall have its sittings. For the purposes of discharging its functions under this Act, the
Cyber Appellate Tribunal has the same powers as are vested in a civil court under the Code of Civil
Procedure, 1908, while trying a suit, in respect of the following matters, namely:—
a. summoning and enforcing the attendance of any person and examining him on oath;
b. requiring the discovery and production of documents or other electronic records;
c. receiving evidence on affidavits;
d. issuing commissions for the examination of witnesses or documents;
e. reviewing its decisions;
f. dismissing an application for default or deciding it ex pane;
g. any other matter which may be prescribed.
Every proceeding before the Cyber Appellate Tribunal is deemed to be a judicial proceeding within the
meaning of sections 193 and 228, and for the purposes of section 196 of the Indian Penal Code and the
Cyber Appellate Tribunal is deemed to be a civil court for the purposes of section 195 and Chapter XXVI
of the Code of Criminal Procedure, 1973. No Civil Court has the jurisdiction to entertain any suit or
proceeding in respect of any matter which an adjudicating officer appointed under this Act or the Cyber
Appellate Tribunal constituted under this Act is empowered, by or under this Act, to determine and no
injunction will be granted by any court or other authority in respect of any action taken or to be taken in
pursuance of any power conferred by or under this Act.
Any person aggrieved by any decision or order of the Cyber Appellate Tribunal can file an appeal to the
High Court within sixty days from the date of receipt of order of the Cyber Appellate Tribunal, on any
question of fact or law arising out of such order. Any delay in filing the appeal to the High Court can be
condoned by the High Court, if it is satisfied that the appellant was prevented by sufficient cause from
filing the appeal within the said period, allow it to be filed within a further period not exceeding sixty days.
At any time, before or after the institution of adjudication proceedings, the CCA or an Officer specially
authorized in this regards or the Adjudicating Office can compound contraventions under the Act. The
compounded amount however cannot, in any case, exceed the maximum penalty imposable for the
contravention under this Act. Where any contravention has been compounded, no proceeding or further
OFFENCES
The Act has specified that Tampering with computer source documents, Hacking computer system,
Publishing of information which is obscene in electronic form or failure of a CA or its employees to follow
the directions/ Orders of the CCA, failure to comply with Directions of Controller to a subscriber to extend
facilities to decrypt information, accessing a protected system without proper authorization, material mis-
representation, Penalty for publishing Electronic Signature Certificate false particulars, Publication for
fraudulent purpose, sending of grossly offensive information, false information, etc will be offences.
The various offences and corresponding punishments are summarized and tabulated below with detailed
explanation in the following paragraphs.
*I.C.E.R.T - Indian Computer Emergency Response Team to serve as national agency for incident
response – Functions in the area of Cyber Security,-
If any person, dishonestly or fraudulently does any act which results in damage to a computer or a
computer system or secures unauthorized access to a secure computer system or down loads or copies
data etc (acts described under section43 of the Act), the he can be punished with a prison term which can
extend upto two years or with a fine which can extend up to ₹Five Lakhs or both. Here the Act refers to
the India Penal Code for interpreting the meaning of the words “dishonestly” and “fraudulently”
Any person who sends, by means of a computer resource or a communication device any information
that is grossly offensive or has menacing character; or which he knows to be false, or sends any
electronic mail or message so as to mislead the addressee about the origin of such message but for the
purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation,
enmity, hatred, or ill will, persistently makes by making use of such computer resource or a
communication device, shall be punishable with imprisonment for a term which may extend to three years
and with fine. Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail
Message" means a message or information created or transmitted or received on a computer, computer
system, computer resource or communication device including attachments in text, image, audio, video
and any other electronic record, which may be transmitted with the message.
Whoever dishonestly receives or retains any stolen computer resource or communication device knowing
or having reason to believe the same to be stolen shall be punished with imprisonment for a term which
may extend to three years or with fine which may extend to rupees one lakh or with both.
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique
identification feature of any other person, shall be punished with imprisonment for a term which may
extend to three years and shall also be liable to fine which may extend to rupees one lakh.
Whoever, by means of any communication device or computer resource cheats by personation, shall be
punished with imprisonment for a term which may extend to three years and shall also be liable to fine
which may extend to one lakh rupees.
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any
person without his or her consent, under circumstances violating the privacy of that person, shall be
punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees,
or with both.
“Transmit” means to electronically send a visual image with the intent that it be viewed by a person or
persons;
“Capture”, with respect to an image, means to videotape, photograph, film or record by any means;
“Private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;
“Publishes” means reproduction in the printed or electronic form and making it available for public;
“Under circumstances violating privacy” means circumstances in which a person can have a reasonable
expectation that he or she could disrobe in privacy, without being concerned that an image of his private
area was being captured or any part of his or her private area would not be visible to the public,
regardless of whether that person is in a public or private place.
Any person with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in
the people or any section of the people by denying or cause the denial of access to any person
authorized to access computer resource or attempting to penetrate or access a computer resource
without authorisation or exceeding authorized access or introducing or causing to introduce any
Computer Contaminant and by means of such conduct causes or is likely to cause death or injuries to
persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or
disruption of supplies or services essential to the life of the community or adversely affect the critical
information infrastructure specified under section 70, or knowingly or intentionally penetrates or accesses
a computer resource without authorisation or exceeding authorized access, and by means of such
conduct obtains access to information, data or computer database that is restricted for reasons of the
security of the State or foreign relations; or any restricted information, data or computer database, with
reasons to believe that such information, data or computer database so obtained may be used to cause
or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State,
friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court,
defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or
otherwise, commits the offence of cyber terrorism.
The person committing or conspires to commit cyber terrorism shall be punishable with imprisonment
which may extend to imprisonment for life.
Whoever publishes or transmits or causes to be published or transmitted in the electronic form any
material which contains sexually explicit act or conduct shall be punished on first conviction with
imprisonment of either description for a term which may extend to five years and with fine which may
extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of
either description for a term which may extend to seven years and also with fine which may extend to ten
lakh rupees.
Whoever, publishes or transmits or causes to be published or transmitted material in any electronic form
which depicts children engaged in sexually explicit act or conduct or creates text or digital images,
collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any
electronic form depicting children in obscene or indecent or sexually explicit manner or cultivates, entices
or induces children to online relationship with one or more children for and on sexually explicit act or in a
manner that may offend a reasonable adult on the computer resource or facilitates abusing children
online or records in any electronic form own abuse or that of others pertaining to sexually explicit act with
children, shall be punished on first conviction with imprisonment of either description for a term which may
extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or
subsequent conviction with imprisonment of either description for a term which may extend to seven
years and also with fine which may extend to ten lakh rupees:
The above three provisions shall not be applicable to any book, pamphlet, paper, writing, drawing,
painting, representation or figure in electronic form if the publication of which is proved to be justified as
being for the public good on the ground that such book, pamphlet, paper writing, drawing, painting,
representation or figure is in the interest of science, literature, art or learning or other objects of general
concern or which is kept or used for bonafide heritage or religious purposes
"Children" means a person who has not completed the age of 18 years.
An intermediary shall preserve and retain such information as may be specified for such duration and in
such manner and format as the Central Government may prescribe an any intermediary who intentionally
or knowingly abstains from doing the same shall be punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.
The CCA can direct a CA or the employees of such a CA to take such measures or cease carrying on
such activities as specified in the order if those are necessary to ensure compliance with the provisions of
this Act, rules or any regulations made there under. Any person intentionally or knowingly failing to
Where the central Government or a State Government or any of its officer specially authorized by the
Central Government or the State Government, as the case may be, in this behalf may, if is satisfied that it
is necessary or expedient to do
after recording the reasons there of in writing, can warrant or direct or order any agency of the
Government to intercept or monitor or decrypt or block any information transmitted through a computer
resource. The Government is required to specify safeguards, subject to which the interception or
monitoring or decryption is to be done. Any person, be it a subscriber or an intermediary or any other
person who is in charge of the computer resource, is bound to extend all possible cooperation, technical
assistance and facility as may be required by the authorities to access or to secure access to the
computer resource containing such information; generating, transmitting, receiving or storing such
information or intercept or monitor or decrypt or block the information, as the case may be or provide
information stored in computer resource. Failure to do so is punishable with an imprisonment for a term
which can extend to seven years and also liable to fine.
The Central Government may, to enhance Cyber Security and for identification, analysis and prevention
of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette,
authorize any agency of the Government to monitor and collect traffic data or information generated,
transmitted, received or stored in any computer resource. The Intermediary or any person in-charge of
the Computer resource shall when called upon by such agency provide technical assistance and extend
all facilities to such agency to enable online access or to secure and provide online access to the
computer resource generating , transmitting, receiving or storing such traffic data or information. The
government shll prescribe procedure and safeguards for monitoring and collecting traffic data or
information.
Any intermediary who intentionally or knowingly contravenes the provisions shall be punished with an
imprisonment for a term which may extend to three years and shall also be liable to fine.
"Traffic data" means any data identifying or purporting to identify any person, computer system or
computer network or location to or from which the communication is or may be transmitted and includes
communications origin, destination, route, time, date, size, duration or type of underlying service or any
other information.
The Government has notified certain computer resources as Critical Information Infrastructure to be a
protected system. Critical Information Infrastructure refers to computer systems or resources the
destruction or incapacitation of which would result in a debilitating impact on the national security,
economy, public health or safety. The appropriate Government can, by notification in the Official Gazette,
declare that any computer, computer system or computer network which directly or indirectly affects the
facility of a Critical Information Infrastructure, to be a protected system and authorize the persons who are
authorized to access protected systems. In this regards the Government can prescribe specific
information security practices and procedures. Any person who secures unauthorized access or attempts
to secure unauthorized access to a protected system, can be punished with imprisonment of either
description for a term which can extend to ten years and can also be liable to fine.
The Central Government has the powers through notification to designate any organization of the
Government as the national nodal agency for the protection of Critical Information Infrastructure
Protection. Such agency shall be responsible for all measures including Research and Development
relating to protection of Critical Information Infrastructure.
The Central Government has the powers through notification to appoint an agency of the government to
be called the Indian Computer Emergency Response Team. The Central Government shall provide such
agency with a Director General and such other officers and employees as may be prescribed. The Indian
Computer Emergency Response Team shall serve as the national agency for performing the following
functions in the area of Cyber Security,-
For carrying out the above functions, the agency may call for information and give direction to the service
providers, intermediaries, data centers, body corporate and any other person. Any service provider,
intermediaries, data centers, body corporate or person who fails to provide the information called for or
comply with such direction shall be punishable with imprisonment for a term which may extend to one
year or with fine which may extend to one lakh rupees or with both.
Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller or the
Certifying Authority for obtaining any licence or ESC, as the case may be, can be punished with
imprisonment for a term which can extend to two years, or with fine which can extend to one lakh rupees,
or with both.
Whoever knowingly creates, publishes or otherwise makes available a ESC for any fraudulent or unlawful
purpose can be punished with imprisonment for a term which can extend to two years, or with fine which
can extend to one lakh rupees, or with both.
The Act gives extra territorial jurisdiction in cases where the offence or contraventions are committed from
outside India, by any person irrespective of his nationality. The provisions of this Act will apply also to any
offence or contravention committed outside India by any person irrespective of his nationality if the act or
conduct constituting the offence or contravention involves a computer, computer system or computer
network located in India. No penalty imposed or confiscation made under this Act can prevent the
imposition of any other punishment to which the person affected thereby is liable under any other law for
the time being in force.
CONFISCATION
Any computer, computer system, floppies, compact disks, tape drives or any other accessories related
thereto, in respect of which any provision of this Act. rules, orders or regulations made there under has
been or is being contravened, will be liable to confiscation. Provided that where it is established to the
satisfaction of the court adjudicating the confiscation that the person in whose possession, power or
control of any such computer, computer system, floppies, compact disks, tape drives or any other
accessories relating thereto is found is not responsible for the contravention of the provisions of this Act,
rules, orders or regulations made there under, the court can, instead of making an order for confiscation
of such computer, computer system, floppies, compact disks, tape drives or any other accessories related
thereto, make such other order authorized by this Act against the person contravening of the provisions of
this Act, rules, orders or regulations made there under as it may think fit.
Unless otherwise specifically provided to the contrary, an intermediary will be not liable for, any third party
information, data or communication link made by him. This exemption is available only if:
The intermediary’s role is limited to providing access to a communication system over which third
parties transmit information or temporarily store the same.
The intermediary does not
For the purpose of providing an expert opinion on electronic form evidence, before any Court or other
statutory body, can specify by notification in official gazette any department or body or agency of central
government as an examiner of electronic evidence. Here, electronic form evidence means any
information of probative value which is stored and transmitted in electronic form. It includes computer
evidence, digital audio and digital video, cell phones, fax machines etc.
No suit, prosecution or other legal proceeding will lie against the Central Government, the State
Government, the Controller or any person acting on behalf of him, the Chairperson, Members, officers
and the staff of the Cyber Appellate Tribunal for anything which is in good faith done or intended to be
done in pursuance of this Act or any rule, regulation or order made there under.
ENCRYPTION METHODS:
The Central Government can prescribe the modes and methods for encryption for the purposes of secure
use of electronic medium and for promotion of e-governance and e-commerce.
When a person abets any offence and the act being abetted is committed in consequence of the
abetment, such a person can be made liable for the same offence and penal consequences awarded as a
result, even though abetment, by itself, can not be an offence. An act or offence is said to be committed in
consequence of abetment, when it is committed as a consequence of the instigation or a conspiracy. Any
person committing an offence punishable by this Act or causes such an offence to be committed, any act
during the course of such an attempt is also an offence, punishable as if it were an offence and
imprisonment would extend to one- half of the longest term of imprisonment imposable or a fine or both.
Any person who attempts to commit an offence punishable by this Act be punished with imprisonment for
a term which may extend to one-half of the longest term of imprisonment provided for that offence, or with
such fine as is provided for the offence or with both.
OFFENCES BY COMPANIES
Where a contravention of any of the provisions of this Act or of any rule, direction or order made under
this Act is committed by a company, every person who, at the time the contravention was committed, was
in charge of, and was responsible to, the company for the conduct of business of the company as well as
the company, will be guilty of the contravention and will be liable to be proceeded against and punished
accordingly. Any person liable to punishment if he proves that the contravention took place without his
knowledge or that he exercised all due diligence to prevent such contravention, will be absolved of the
allegation of the contravention or committing the offence.
REMOVAL OF DIFFICULTIES
If any difficulty arises in giving effect to the provisions of this Act, the Central Government can, by order
published in the Official Gazette, such order/ direction as it deems necessary or expedient, to remove
such difficulties in the provisions of this Act. However, no order for removal of difficulties can be made
after the expiry of a period of two years from the commencement of this Act. Every order made, for the
removal of difficulties, will be laid as soon as may be after it is made, before each House of Parliament.
The Central Government can, by notification in the Official Gazette and in the Electronic Gazette make
rules to carry out the provisions of this Act. In particular, and without prejudice to the generality of the
foregoing power, the rules can provide for all or any of the following matters, namely:—
a. the conditions for considering the reliability of electronic signature or authentication technique;
b. the procedure for ascertaining electronic signature or authentication;
c. the manner in which any information or matter can be authenticated by the means of an
electronic signature;
d. the electronic form in which filing, issue, grant or payment will be effected;
e. the manner and format in which electronic records will be filed, or issued and the method
of .payment;
f. the manner in which the appropriate service provider can collect, retain and appropriate service
charges;
g. the matters relating to the type of electronic signature, manner and format in which it can be
affixed;
h. the manner of storing and affixing electronic signature;
i. the qualifications, experience and terms and conditions of service of Controller, Deputy
Controllers and Assistant Controllers;
j. the security procedures and practices to be followed;
k. the form in which an application for license for issue of ESC, the eligibility criteria of the applicant
and the period of validity of such a license, the amount of fees payable and the the other
documents which will accompany an application for licence, the form and the fee for renewal of a
licence and the fee payable there of;
l. the form in which application for issue of a ESC can be made and the fee to be paid for the
purpose;
m. the manner in which the adjudicating officer will hold inquiry;
n. the qualification and experience which the adjudicating officer will possess;
Every rule made by the Central Government notifying such class of documents or transactions as can be
notified by the Central Government in the Official Gazette which are outside the purview of this Act and
every rule made by it shall be laid, as soon as can be after it is made, before each House of Parliament,
while it is in session, for a total period of thirty days which can be comprised in one session or in two or
more successive sessions, and if, before the expiry of the session immediately following the session or
the successive sessions aforesaid, both Houses agree in making any modification in the notification or
the rule or both Houses agree that the notification or the rule should not be made, the notification or the
rule shall thereafter have effect only in such modified form or be of no effect, as the case may be; so,
however, that any such modification or annulment shall be without prejudice to the validity of anything
previously done under that notification or rule.
The Controller may, after consultation with the Cyber Regulations Advisory Committee and with the
previous approval of the Central Government, by notification in the Official Gazette, make regulations
consistent with this Act and the rules in relation to the following matters:
Every regulation made under this Act shall be laid, as soon as may be after it is made, before each House
of Parliament, while it is in session, for a total period of thirty days which may be comprised in one
session or in two or more successive- sessions, and if, before the expiry of the session immediately
The State Government can, by notification in the Official Gazette, make rules to carry out
the provisions of this Act. In particular, and without prejudice to the generality of the foregoing power,
such rules can provide for all or any of the following matters, namely: —
a. the electronic form in which filing, issue, grant receipt or payment for e licences;
b. for e returns & e payments
c. any other matter which is required to be provided by rules by the State Government.
Every rule made by the State Government under this section shall be laid, as soon as may be after it is
made, before each House of the State Legislature where it consists of two Houses, or where such
Legislature consists of one House, before that House.
The Indian Penal Code, The Indian Evidence Act, 1872, The Bankers' Books Evidence Act, 1891, The
Reserve Bank of India Act, 1934, shall be amended in the manner specified in the Schedules to this Act.
back door -- a vulnerability intentionally left in the security of a computer system or its software by its
designers
biometrics -- the use of a computer user's unique physical characteristics -- such as fingerprints, voice,
and retina -- to identify that user
black hat -- a term used to describe a hacker who has the intention of causing damage or stealing
information
Computer Emergency Response Team (CERT) -- an organization that collects and distributes information
about security breaches
cracker -- a term sometimes used to refer to a hacker who breaks into a system with the intent of causing
damage or stealing data
cryptography -- protecting information or hiding its meaning by converting it into a secret code before
sending it out over a public network
decrypt -- the process of converting encrypted information back into normal, understandable text
denial of service (DoS) -- an attack that causes the targeted system to be unable to fulfill its intended
function
dumpster diving -- looking through trash for access codes or other sensitive information
email -- an application that allows the sending of messages between computer users via a network
encryption -- the process of protecting information or hiding its meaning by converting it into a code
firewall -- a device designed to enforce the boundary between two or more networks, limiting access
hacker -- a term sometimes used to describe a person who pursues knowledge of computer and security
systems for its own sake; sometimes used to describe a person who breaks into computer systems for
the purpose of stealing or destroying data
hacking -- original term referred to learning programming languages and computer systems; now
associated with the process of bypassing the security systems on a computer system or network
high risk application -- a computer application that, when opened, can cause the user to become
vulnerable to a security breach
hijacking -- the process of taking over a live connection between two users so that the attacker can
masquerade as one of the users
host -- a computer system that resides on a network and can independently communicate with other
systems on the network
Hypertext Markup Language (HTML) -- the language in which most webpages are written
Internet service provider (ISP) -- any company that provides users with access to the Internet
intranet -- a private network used within a company or organization that is not connected to the Internet
intrusion detection -- techniques designed to detect breaches into a computer system or network
IP spoofing -- an attack where the attacker disguises himself or herself as another user by means of a
false IP network address
keystroke monitoring -- the process of recording every character typed by a computer user on a keyboard
leapfrog attack -- using a password or user ID obtained in one attack to commit another attack
letterbomb -- an email containing live data intended to cause damage to the recipient's computer
malicious code -- any code that is intentionally included in software or hardware for an unauthorized
purpose
one-time password -- a password that can be used only once, usually randomly generated by special
software
packet sniffer -- a device or program that monitors the data traveling over a network by inspecting
discrete packets
password sniffing -- the process of examining data traffic for the purpose of finding passwords to use later
in masquerading attacks
pen register -- a device that records the telephone numbers of calls received by a particular telephone
phreaker -- a person who hacks telephone systems, usually for the purpose of making free phone calls
piggyback -- gaining unauthorized access to a computer system via another user's legitimate connection
piracy -- the act of illegally copying software, music, or movies that are copyright-protected
probe -- an effort to gather information about a computer or its users for the purpose of gaining
unauthorized access later
risk assessment -- the process of studying the vulnerabilities, threats to, and likelihood of attacks on a
computer system or network
social engineering -- term often used to describe the techniques virus writers and hackers utilize to trick
computer users into revealing information or activating viruses
trap and trace device -- a device used to record the telephone numbers dialed by a specific telephone
Trojan horse -- an apparently innocuous program that contains code designed to surreptitiously access
information or computer systems without the user's knowledge
virus -- a computer program designed to make copies of itself and spread itself from one machine to
another without the help of the user
**BEST OF LUCK **
Disclaimer
While every effort has been made by me to avoid errors or omissions in this publication, any error or
discrepancy noted may be brought to my notice throughr e-mail to
[email protected] which shall be taken care of in the subsequent editions. It is also suggested
that to
clarify any doubt colleagues should cross-check the facts, laws and contents of this publication with
original
Govt. / RBI / Manuals/Circulars/Notifications/Memo/Spl Comm. of our bank.