Cs Artificial Intelligence, Data Analytics
Cs Artificial Intelligence, Data Analytics
Cs Artificial Intelligence, Data Analytics
PROFESSIONAL Programme
ARTIFICIAL
INTELLIGENCE,
DATA ANALYTICS AND
CYBER SECURITY –
LAWS & PRACTICE
Group 1
Elective PAPER 4.4
(i)
© THE INSTITUTE OF COMPANY SECRETARIES OF INDIA
Timing of Headquarters :
Monday to Friday
Office Timings : 9.00 A.M. to 5.30 P.M.
Phones :
011-45341000 / 0120-4522000
Website :
www.icsi.edu
E-mail :
[email protected] / [email protected]
Disclaimer
Although due care and diligence have been taken in preparation of this Study Material, the
Institute shall not be responsible for any loss or damage, resulting from any action taken on
the basis of the contents of this Study Material. Anyone wishing to act on the basis of the
material contained herein should do so after cross checking with the original source.
Laser Typesetting by :
AArushi Graphics, Prashant Vihar, New Delhi
(ii)
PROFESSIONAL ProgramMe
AI is emerging as a new factor of production, augmenting the traditional factors of production viz. labour, capital
and innovation and technological changes captured in total factor productivity. AI has the potential to overcome
the physical limitations of capital and labour, and open up new sources of value and growth. From an economic
impact perspective, AI has the potential to drive growth through enabling: (a) intelligent automation i.e. ability
to automate complex physical world tasks that require adaptability and agility across industries, (b) labour and
capital augmentation: enabling humans to focus on parts of their role that add the most value, complementing
human capabilities and improving capital efficiency, and (c) innovation diffusion i.e. propelling innovations as
it diffuses through the economy. AI innovations in one sector will have positive consequences in another, as
industry sectors are interdependent based on value chain. Economic value is expected to be created from the
new goods, services and innovations that AI will enable.
On the other hand data is one of the primary drivers of AI solutions, and thus appropriate handling of data,
ensuring privacy and security is of prime importance. Challenges include data usage without consent, risk of
identification of individuals through data, data selection bias and the resulting discrimination of AI models, and
asymmetry in data aggregation.
To ensure that Internet in India is Open, Safe, Trusted and Accountable, the Central Government, in exercise of
powers conferred by the Information Technology Act, 2000 (“IT Act”), has notified the Information Technology
(Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (“IT Rules, 2021”). The rules cast specific
obligation on intermediaries vis-à-vis what kind of information is to be hosted, displayed, uploaded, published,
transmitted, stored or shared. Intermediaries are also required to remove any content violative of any law for
the time being in force as and when brought to their knowledge either through a court order or through a notice
by appropriate government or its authorised agency.
In the light of above developments, this study material has been prepared to provide an understanding of AI,
Data Protection and cyber security legislations which have direct bearing on the functioning of companies.
The study material has been divided into three parts consisting of twenty study lessons. Part-I dealing with
Legal & Compliance Perspective consists of Study Lessons 1 to 6, whereas Part-II dealing with Technological
perspective consists of Study Lessons 7 to 15.
(iii)
This study material has been published to aid the students in preparing for the Artificial Intelligence, Data
Analytics and Cyber Security – Laws & Practice Elective paper of the CS Professional Programme. It has been
prepared to provide basic understanding of some of the Artificial Intelligence, Data Analytics and Cyber Security
legislations thereunder, which have a bearing on the conduct of corporate affairs. It is part of the educational
kit and takes the students step by step through each phase of preparation stressing key concepts, principle,
pointers and procedures.
The legislative changes made upto May 31, 2023 have been incorporated in the study material. In addition
to Study Material students are advised to refer to the updations at the Regulator’s website, supplements
relevant for the subject issued by ICSI and ICSI Journal Chartered Secretary and other publications.
Specifically, students are advised to read “Student Company Secretary” e-Journal which covers
regulatory and other relevant developments relating to the subject, which is available at academic
portal https://www.icsi.edu/student-n/academic-portal/. In the event of any doubt, students may contact the
Directorate of Academics at [email protected].
The amendments to law made upto 31st May of the Calendar Year for December Examinations and upto
30th November of the previous Calendar Year for June Examinations shall be applicable.
Although due care has been taken in publishing this study material, the possibility of errors, missions and /or
discrepancies cannot be rules out. This publication is released with an understanding that the Institute shall not
be responsible for any errors, omissions and/or discrepancies or any action taken in that behalf.
(iv)
PROFESSIONAL ProgramMe
Group 1
Elective Paper 4.4
Syllabus
Objective
To provide skills of high order regarding digital technological developments in emerging economic
environment.
Level of Knowledge : Expert Knowledge
6. Data Analytics and Law : Introduction to Data Analytics l Introduction to Legal Analytics l Introduction
to Machine Learning for Lawyers l Quantitative Legal Prediction vis-à-vis Business of Law l Bias/
(v)
Variance, Precision/Recall & Dimensionality l Overfitting, Underfitting, & Cross-Validation l Logistic
Regression and Maximum Likelihood l Triple C Theory and Data Assessment l Network Analysis and
Law
7. Computer Hardware and Software : An Introduction – Computer System Concept, Types, Categories
and Emerging Technologies l Components of a Computer System l Primary and Secondary Storage
l Computer Storage Capacities l Computer Peripherals – Inputs, Output and Storage Devices
l Computer Software: An Introduction l Software Trends l Multi-Programming, Multi-Processing, Time
Sharing, Batch Processing l On-Line and Real Time Processing l Application Software
8. Network Basics and Security : Intranets l Extranets l Internet l Networking concepts OSI models TCP/
IP model l Ports l Secure protocols l Common Network Attacks l Network Devices Hubs l Bridges
Switch l Security Devices l Firewall
10. Database Management : Data Base Concepts l Data Structure l Data Base Management System
l Data Base Files l Data Mining and Warehousing
11. Data Analytics : Data Recovery Tools l Data Recovery Procedures and Ethics l Gathering Evidence
Precautions, Preserving and safely handling original media for its admissibility l Document a Chain of
Custody and its importance l Complete time line analysis of computer files based on file creation, file
modification and file access l Recover Internet Usage Data l Data Protection and Privacy l Recover
Swap Files/Temporary Files/Cache Files l Introduction to Encase Forensic Edition, Forensic Toolkit
l Use computer forensics software tools to cross validate findings in computer evidence-related cases
12. Information Systems : Systems : An Overview l Features and Qualities of Information l Types of
Information l Process of Generating Information l Value and Cost of Information l Information Needs a
Various Levels of Management l Factors Influencing Information Needs l Information System Activities
l Types of Information Systems l Information Systems in Business Management l Recent Trends in
Information System
13. Management Information Systems – An Overview : Concept, Evolution and Elements l Structure
l Computerized MIS l Approaches of MIS l Development l Pre-requisites of an Effective MIS l MIS and
Decision Support Systems l MIS and Information Resource Management l Artificial Intelligence and
Expert System
15. Internet and Other Technologies : Applications of Internet l Internet Protocols l E-Commerce
l Nature, Types (B2B, B2C, C2C) l Supply Chain Management l CRM, Electronic Data Interchange
(EDI) l Electronic Fund Transfers (EFT) l Digital Currency l Block Chain Technology l Payment Portal
l E-Commerce Security – Mobile Commerce l Bluetooth and Wi-Fi
(vi)
ARRANGEMENT OF STUDY LESSONS
ARTIFICIAL INTELLIGENCE, DATA ANALYTICS AND CYBER
SECURITY – LAWS & PRACTICE
Group 1 l elective PAPER 4.4
(vii)
Lesson wise summary
ARTIFICIAL INTELLIGENCE, DATA ANALYTICS AND
CYBER SECURITY – LAWS & PRACTICE
(viii)
will also be made to trace the framework of the RBI as well as SEBI for governing Artificial Intelligence, Cyber
Security and Cyber Space along with a look at its implications. This lesson will also give an overview of the
international principles governing AI, Cyber Security and Cyber Space.
(ix)
Lesson 12 – Information Systems
This lesson will look into the meaning and concept of information system, its application in different spheres of
business and the various types of information system along with key features, advantages, disadvantages and
function of such information system. This will be followed by a discussion on information systems and security
and application of information systems in daily life situations.
(x)
Contents
Lesson 1
Artificial Intelligence (“AI”) – Introduction and Basics
Introduction 2
Latest Trends 10
Lesson Round-Up 25
Test Yourself 26
(xi)
Lesson 2
Cyber Security
Cyber Security 30
Significance of Cyber Security 30
Cyber Security Fundamentals 31
Cyber Security Techniques 32
Challenges and Restrictions 35
Snap-Shot of Common Kinds of Cyber-attacks 36
Solution – Confrontation Strategy to Challenges and Limitations 37
Additional Challenges and Limitations: Recent Trends 38
Cyber Security Policies - National and International 42
Requirement of Cyber Security Policies 43
National Cyber Security Policy -2013: A Brief 43
National Cyber Security Strategy: Recent Trends 48
Draft National Cyber Security Strategy 49
Cyber Security Policy: International Standards 50
International Convention on Cyberspace 51
International Convention on Cyberspace: A Brief Timeline 51
Cyber Security: Legal and Compliance Assessment 52
Cyber Security: Legal Assessment 53
Cyber Security: Major Regulating Bodies and Compliance Requirements 55
Cyber Security: Recent Government Initiatives In India 58
Concluding Remarks: Need of the Hour 58
Cyber Resilient Organizational Study (A Caselet) 59
How organizations measured the increase in severity of incidents 61
Ransomware and how much it costs organizations 62
Why organizations infected by ransomware refused to pay a ransom 63
Supply chain attacks and disaster recovery 63
Types of attacks for which organizations have incident response plans 63
Lesson Round-Up 64
List of Further Readings 66
List of Other References 66
(xii)
Lesson 3
Cyber Threats and Cyber Laws
Introduction 68
Cyber Threats 70
Definition of Cyber Threats 70
Sources of Cyber Threats 70
Cyber Warfare 70
Cyber Crime 71
Cyber Terrorism 71
Cyber Terrorism vis-à-vis Cyber Crime 72
Legal Provisions dealing with Cyber terrorism 72
Types of Cyber Threats/ Attacks 73
Polyglot Files 79
Distributed Denial of Service Attacks 79
Social Engineering 80
Phishing 80
Malvertising 80
Zero-Day Exploits 80
Cyber Threat Hunting and Digital Forensics 81
Digital Forensics 83
Digital Intellectual Property 83
Liability of Online Platforms 85
Legal/Regulatory regime of “Intermediary/Online Platform Liability” in India 85
Laws Applicable to Ai and Cyber Laws 90
Information Technology Act, 2000 (IT Act, 2000) 90
Information Technology Rules (It Rules) 92
Companies Act, 2013 93
Indian Penal Code, 1860 93
Cyber Security Framework (Ncfs) 95
Data Protection and Ai: Laws and Regulations 95
Artificial Intelligence: Brief Description 95
Steps taken by the Government 97
Data Protection: Indian Legal Perspective 98
The Information Technology (Amendment) Act, 2008 102
(xiii)
Personal Data Protection Bill, 2019 - Key Highlights 104
Other Statutes on Data Protection 105
Lesson Round-Up 107
Test Yourself 108
List of Further Readings 108
Lesson 4
Cyber Crimes and Investigation Procedures
Introduction 110
Overview of Cyber Crimes 110
Cyber Crime vis-à-vis Indian Scenario 111
Tools and Techniques used to Commit Cyber Crimes 111
Initiatives to Regulate and Control Cyber Crimes: Governmental and Law Enforcement Agencies 113
Citizen Financial Cyber Fraud Reporting and Management System 113
Reporting of Cyber Crime 113
Process of Reporting a Cyber Crime 114
Work Flow for Reporting a Cyber Crime 115
State Nodal Officer and Grievance Officer 117
Investigation of Cyber Crimes Under Indian Laws 117
Who can investigate? 117
Process of search & arrest 117
Documentation 119
Preservation 119
Examination 120
Presentation 122
Computer Forensics and Digital Evidence 122
What are Computer Forensics? 122
Use of Computer Forensics 123
Types of Computer Forensics 123
Role of Computer Forensics 124
Computer Forensics vis-a-vis Cyber Security 124
Investigations vide Computer Forensics 124
Digital Forensics - Chain of Custody 128
Significance of maintaining Chain of Custody 128
(xiv)
Security Audit 130
Significance of Security Audit 131
Advantages of Security Audit 131
Types of Security Audit 131
Cyber Attacks in Middle East 135
Retribution by China 135
Cyber attack by Tamil Tigers 136
Yugoslavia Conflict 136
Cyber Attack on Estonia 136
Sony PlayStation Network, Microsoft’s Xbox Live network case 136
Indian Law & Cyber Terrorism 137
Lesson Round-Up 143
List of Further Readings 145
List of Other References 145
Lesson 5
Regulatory Framework on Ai, Cyber Security and Cyberspace
(xv)
International Principles Governing Ai, Cyber Security and Cyberspace: An Overview 167
OECD AI Principles: Overview 167
Other Applicable Regulatory Framework 168
Lesson Round-Up 171
List of Further Readings 173
List of Other References 173
Lesson 6
Data Analytics and Law
(xvi)
Quantitative Legal Prediction vis-à-vis Business of Law 186
Overview of Quantitative Legal Prediction (QLP) 186
Applications of Quantitative Legal Prediction 187
Limitations of Quantitative Legal Prediction 189
Using QLP to Predict Court Case Outcomes 190
Using QLP for Profiling Judges and its Rule of Law Implications 191
BIAS/ Variance, Precision/Recall & Dimensionality 191
Bias and Variance in Machine Learning 191
Errors in Machine Learning 192
What is Bias? 193
What is a Variance Error? 193
Ways to Reduce High Variance 194
Different Combinations of Bias-Variance 194
How to identify High variance or High Bias? 195
Trade Offs and Bias 195
Bias-Variance Trade-Off 196
Overfitting, Underfitting, & Cross-Validation 196
Overfitting 197
How to avoid the Overfitting in Model 198
Underfitting 198
Logistic Regression and Maximum Likelihood 199
Logistic Regression in Machine Learning 199
Maximum Likelihood Estimation (MLE) 199
What is the likelihood? 200
Working of Maximum Likelihood Estimation 200
Triple C Theory and Data Assessment 200
Direct Assessment 201
Indirect Assessment 201
Triple C Theory and Data Analysis 201
Network Analysis and Law 202
Lesson Round-Up 203
Test Yourself 204
List of Further Readings 204
List of Other References 204
(xvii)
Part II : Technological Perspective
Lesson 7
Computer Hardware and Software
Introduction 210
Computer System: Concept 210
Characteristics of a Computer 211
Categories: Types of Computer System 212
Emerging Technologies 216
Components of Computer System 220
Primary and Secondary Storage 221
Computer Storage Capacities 222
Computer Peripherals – Inputs, Output, and Storage Devices 223
Computer Software : An Introduction 224
Software Trends 226
Multi-Programming 228
Multi-Processing 228
Time Sharing 228
Batch Processing 228
On-Line and Real Time Processing 229
Application Software 230
Lesson Round-Up 231
Test Yourself 233
List of Further Readings 233
List of Other References 233
Lesson 8
Network Basics and Security
Introduction 236
Network Security 236
Objectives of Network Security 237
Intranets 237
Extranets 237
Internet 237
Networking Concepts 238
(xviii)
OSI model 238
TCP/IP model (the Internet Protocol Suite) 239
The Internet Protocol Suite 239
Ports 241
Secure Protocols 242
Common Network Attacks 243
Network Devices Hubs 244
Bridges 245
Switch 245
Security Devices 246
Firewall 247
Lesson Round-Up 248
Glossary 249
Test Yourself 250
List of Further Readings 250
Lesson 9
Softwares and Software Security
Introduction 252
Software-Overview 252
Characteristics of Good Software 253
Software Classification 253
Application Software 256
Utility Software 256
Other Types of Software on the Basis of Availability And Shareability 256
Software Security: Overview and Significance 257
Software Security: A Proactive Security 258
Software Security Goals 259
Software Security: Best Practices 259
What to Avoid in Software Security? 260
Case Study and Case Laws of Indian Law on Software Security . 261
SAAS; PAAS, IAAS and On-Premise Software: Overview and Recent Trends 266
IAAS Services 266
IAAS Platform and Architecture 266
Pricing 267
(xix)
Advantages 267
Typical use Cases 267
IAAS: Storage 268
PAAS 268
Advantages of PAAS 269
Disadvantages of PAAS 269
Use Cases for PAAS 269
Purpose-Built PAAS Types 270
SAAS Services 271
Characteristics of SAAS 271
Advantages of SAAS 272
Future of SAAS 272
On Premise Software 273
Pros and Cons of On-Premise Software 273
Legal and Compliance Requirements of Software Security 273
Lesson Round-Up 276
Glossary 276
Test Yourself 277
List of Further Readings 277
Lesson 10
Database Management
(xx)
DBMS Architecture 285
DBMS Components 285
Advantages of DBMS 286
Disadvantages of DBMS 287
Database Files 287
Types of Database Files 287
Access and Manipulation of Database Files 288
Data Mining and Warehousing 288
Data Mining 288
Some key characteristics of data mining include 289
Data Warehousing 289
Differences between Data Mining and Data Warehousing 290
Uses of Data Mining and Data Warehousing 290
Lesson Round-Up 290
Test Yourself 291
Lesson 11
Data Analytics
Introduction 294
Process of Data Analytics 294
Data Analytics Types 294
Benefits of Data Analytics 295
Data Recovery Tools 295
Data Recovery Procedures and Ethics 298
Digital Ethics 298
Role of Digital Ethics in Data Storage 299
Data Recovery Ethics 299
Types of Data Recovery 299
Business Continuity/Disaster Recovery (BCDR) 300
Gathering Evidence- Precautions, Preserving and Safely Handling Original Media for its Admissibility 300
Collection Options 301
Obstacles 301
Volatile Evidence 302
Methods of Collection 302
(xxi)
Reconstructing the Attack 303
Searching and Seizing 303
Methodology Development 304
Evidence Search and Seizure 304
Duplication and Preservation Of Digital Evidence 305
Preserving the Digital Crime Scene 305
SafeBack 305
SnapBack 305
Computer Evidence Processing Steps 305
Legal Aspects of Collecting and Preserving Computer 307
Forensic Evidence 307
Legal Requirements 307
Evidence Collection Procedure 308
The Incident Coordinator 308
The Incident Coordinator 308
The Evidence Notebook 308
Evidence Collection 309
Computer Image Verification and Authentication 310
Special Needs of Evidential Authentication 310
Digital IDS and Authentication Technology 310
Authenticode 310
Public Key Cryptography 311
Certificate Authorities (CA) 311
Digital ID 311
How Authenticode works with VeriSign Digital IDs? 312
Document a Chain of Custody and its Importance 312
Evidence Collection 312
Evidence Marking and Packaging 313
Chain of Custody 314
Transfer of Evidence to Property Room 315
Some commonly used file systems 316
EXT File Systems 317
What is a file format? 318
Steps in the file system forensics process 318
Acquisition 318
Validation and discrimination 318
(xxii)
Extraction 318
Reconstruction 319
Reporting 319
Recovery of Internet Usage Data 319
Requirements of remote recovery 320
Why is data privacy important? 321
What are some of the challenges users face when protecting their online privacy? 321
What are some of the challenges businesses face when protecting user privacy? 322
Recover Swap Files/Temporary Files/Cache Files 322
Ways to Recover Deleted Temp Files 323
Retrieving deleted files 323
Retrieving cached files 323
Retrieving files in unallocated space 323
Usage of computer forensics software tools to cross-validate findings in computer evidence-related cases 324
Why is computer forensics important? 325
Types of computer forensics 325
How does computer forensics work? 325
Lesson Round-Up 327
Glossary 327
Test Yourself 328
List of Further Readings 328
Lesson 12
Information Systems
(xxiii)
Information Systems and Security 346
Lesson Round-Up 347
Glossary 347
Test Yourself 348
Lesson 13
Management Information Systems – An Overview
Introduction 350
Evolution of the Concept of Management Information System 351
Objectives of Management Information System 351
Characteristics of Management Information System 352
Advantages of Management Information System 353
Disadvantages of Management Information System 353
Components of Management Information System 354
MIS and Its Functional Subsystems 355
Utilization of Management Information System in Indian Business Scenario 355
Role of Management Information System in Decision Making 356
Management Information System and Other Information Systems 357
Applications of Management Information System 358
Applications of Management Information System in Service Sectors 359
Management Information System and Other Academic Disciplines 360
Management Information System and Security 361
Lesson Round-Up 361
Glossary 362
Test Yourself 363
Lesson 14
Enterprise Resource Management
(xxiv)
Benefits of Enterprise Resource Planning 369
Limitations of Enterprise Resource Planning 371
Erp Related Technologies 372
Type of Erp System Modules 372
Planning Evaluation and Selection of Erp Systems 374
Stage 1 - Plan Requirement 376
Stage 2 - Request For Proposals (RFP) 376
Stage 3 - Solution Evaluation 376
Stage 4 - Contract Negotiation 376
Stage 5 - Selection and Agreement 376
Recent Trends in ERP: 2023 376
Lesson Round-Up 379
Test Yourself 380
List of Further Readings 380
List of Other References 380
Lesson 15
Internet and Other Technologies
(xxv)
Electronic Fund Transfers (Eft) 398
Electronic Funds Transfer (EFT): How it works 398
Major Features of Electronic Funds Transfer (EFT) 399
Digital Currency 399
Types of Digital Currencies 399
Advantages and Disadvantages 400
Block Chain Technology 401
Transaction Process 401
Payment Portal 402
Examples of Payment Gateways 403
e-Commerce Security – Mobile Commerce 403
Types of M-commerce 404
Working of Mobile Commerce 404
M-commerce vs. E-commerce 404
Future of Mobile Commerce 405
Bluetooth and WI-FI 406
Lesson Round-Up 407
Test Yourself 408
List of Further Readings 409
List of Other References 409
(xxvi)
PART I
Legal & Compliance
Perspective
Artificial Intelligence (“AI”) – Lesson
Introduction and Basics 1
KEY CONCEPTS
n Artificial Intelligence n ChatBots and Virtual Assistants n Use of Artificial Intelligence in Cyberspace
n Challenges in Implementing AI Technologies n Law Trends in India related to Artificial Intelligence
Learning Objectives
To understand:
The concept of Artificial Intelligence
And get an idea about basic uses of Artificial Intelligence
The AI technology with its pros and cons
The Challenges faced in implementing AI
And get an idea about recent Legal trends in AI
The ethical questions related to AI
Lesson Outline
Introduction Test Yourself
The Emergence of Artificial Intelligence in a List of Further Readings
Modern IT World
List of Other References
ChatBots and Virtual Assistance: Boon or
Bane
Need and Significance of AI in Cyberspace
Challenges and Opportunities of AI
AI and Cyber Security
AI v. Ethics & Morality
AI v. Law and Compliance
Case Studies
Lesson Round-Up
1
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
INTRODUCTION
Artificial Intelligence (“AI”) is a branch of computer science and engineering that focuses on developing devices
and programmes that are capable of carrying out operations that ordinarily call for human intellect, such as
comprehending natural language, identifying objects, and forming judgements. As per the Investopedia, Artificial
Intelligence (AI) is defined as the simulation of human intelligence by software-coded heuristics. Nowadays
this code is prevalent in everything from cloud-based, enterprise applications to consumer apps and even
embedded firmware.1
Interesting Fact1
The year 2022 brought AI into the mainstream through widespread familiarity with applications of Generative
Pre-Training Transformer. The most popular application is Open AI’s ChatGPT. The widespread fascination
with ChatGPT made it synonymous with AI in the minds of most consumers. However, it represents only a
small portion of the ways that AI technology is being used today.
Depending on the situation, several interpretations of AI’s significance can be made. The capacity of computers
to display intelligent behaviour, such as learning, thinking, and problem-solving, is at the heart of Artificial
Intelligence (AI). Yet, the technology or environment in which AI is utilised can also have an impact on what it
means.
Artificial Intelligence, for instance, pertains to a machine’s capacity to comprehend and produce human
language in the context of natural language processing. Artificial Intelligence (AI) can also refer to a machine’s
capacity to comprehend and engage with the physical environment.
Source: https://intellipaat.com
Under this background, this lesson aims to introduce the concept of AI, explore its meaning and definition.
1. Source: https://www.investopedia.com/terms/a/artificial-intelligence-ai.asp
2
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
assisted by humans. Deep learning techniques enable this automatic learning through the absorption of huge
amounts of unstructured data such as text, images, or video.
Several sectors, including healthcare, banking, transportation, and entertainment, can benefit from the use
of AI. For instance, AI-powered autonomous cars can increase transportation safety and efficiency while AI-
powered medical imaging technologies can assist doctors in providing more precise diagnoses.
Key Takeaways
l Artificial Intelligence (AI) refers to the simulation or approximation of human intelligence in machines.
l The goals of artificial intelligence include computer-enhanced learning, reasoning, and perception.
l AI is being used today across different industries from finance to healthcare.
l Weak AI tends to be simple and single-task oriented, while strong AI carries on tasks that are more
complex and human-like.
l Some critics fear that the extensive use of advanced AI can have a negative effect on society.
In conclusion, artificial intelligence is a fast-expanding topic that entails the creation of computer devices
capable of carrying out operations that normally call for human intellect. AI is a fast-developing field that aims
to alter how humans live, work and interact with the world around us. AI is intended to be independent and
intelligent.
3
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
l Can’t deal l Current state of AI l Next milestone for l Does not exist yet
with imperfect the evolution of AI
information
4
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
developments in computing power, storage systems, and algorithmic methods. With the advent of AI in the
contemporary IT world, its effects on humanity have handed numerous benefits.
The History of AI
The first attempts to create technologies that could replicate human intellect were made in the 1950s, which
is when Artificial Intelligence (AI) was first explored. Rule-based technologies, which were designed with a
set of guidelines to carry out particular tasks, were the foundation for initial AI systems. These systems had
constrained capacities and were able to carry out the tasks that were specified in their programming.
During 1980s, AI systems started to advance more toward advanced structures like neural networks, which
mimic the functioning of the human brain. As a result, innovations in speech processing, language processing,
and picture identification occurred, laying the groundwork for current artificial intelligence.
Advent of Contemporary AI
AI has just become a significant technological development in the current IT industry. With the development of
datasets, cloud technology, and cutting-edge techniques, AI systems can now analyse vast quantities of data,
learn from that, and base recommendations or conclusions on it.
The two primary kinds of AI systems are specific AI and general AI. Narrow AI is created to carry out particular
functions, such language translation or picture identification. Contrarily, general AI is intended to be intelligent
like humans and to be able to reason and learn in a variety of contexts.
4. Reproduced from De Ujjal (March, 2023) Make AI Work For India: What The Future Holds For Artificial Intelligence, ABP Live India.
5. See, https://thewire.in/society/india-china-highest-populated
5
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
l The fact that AI is still an integral part of the Union Budget 2023 shows the government’s continuous
commitment to driving the mission; the vision is clear: ‘Make AI in India and Make AI work for India,’ as
outlined by Finance Minister Nirmala Sitharaman during her Union Budget address.
l Some of the announcements provided a glimpse into the plans for India’s AI implementation:
Set up three CoEs in top educational institutions for advanced AI research and development. It
can develop next-generation AI solutions and also address the growing talent demand.
Increase AI usage and partner with industries for the R&D of scalable solutions in agriculture,
health, and sustainable cities. Projects like Digital India BHASHINI and Digi Yatra can be the
stepping-stone for large-scale AI implementation across all major sectors.
The Government will launch a National Data Governance Policy to enable widespread access to
anonymized data and boost innovation for startups and academia.
Pradhan Mantri Kaushal Vikas Yojana (PMKVY 4.0) will be upskilling lakhs of youths and aligning
courses with industry needs, such as AI, IoT, etc., in the next three years.
Earlier in 2023, Minister of State for Electronics and Information Technology mentioned at the first India Stack
Developers Conference that India Stack 1.0 version would evolve and become more sophisticated and nuanced
with the integration of the AI layer into the stack.
Increase in AI Usage in Various Sectors
l A comprehensive approach to building cloud infrastructure, 5G connectivity, data centres, and access
to quality talent can increase the AI adoption rate.
l Already a leading IT services and offshoring destination, India is making products for global markets
and steadily implementing AI solutions to harness the massive volume of domestic data.
l The coronavirus-induced pandemic catapulted the digitalization pace as the larger population
embraced digital technologies like UPI (digital payment platform), CoWIN (Covid-19 vaccination portal),
and DigiLocker (digital document repository).
l India’s manufacturing sector aims to be a trillion-dollar sector and contribute 25 percent of the national
GDP by 2025.
l With a continuous increase in technology spend, AI adoption is gaining momentum in shopfloor
automation, predictive maintenance, and reduced wastage.
l The Banking, Financial Services, and Insurance (BFSI) sector is witnessing a rapid digital transformation
with the increased demand from the tech-savvy working population.
l With a total banking asset of $2.67 trillion in 2022, India’s key focus is improving the tech infrastructure
to enhance customer experience. With an initial implementation in payments and wallets, AI solutions
are making their mark in digital lending, insurance, and investment processes.
l The retail sector in India contributes to 10 percent of the country’s GDP and 8 percent of employment.
Improved digital connectivity has aided e-commerce to trigger a surge in consumption in cities and rural
areas. The FMCG sector is growing at a CAGR of 14.9 percent to reach $220 billion by 2025, and more
and more brands are focusing on digital advertising to increase their consumer base.
l AI solutions are at the forefront of data-driven analysis and decision-making like demand forecasting
and marketing spend optimization.
l The healthcare market has grown three-fold at a CAGR of 22 percent between 2016–22 and is one
of the largest employers in India. Rising income levels and the post-pandemic shift toward preventive
healthcare have increased investment in high-end health tech products and facilities.
6
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
l Organizations are exploring viable use cases through PoCs in cutting-edge healthcare technologies
ranging from remote diagnostics, robotic surgeries and preventive analytics.
l Tech giants like Google and Microsoft heavily invest in AI research and development in India.
l Google Research India Lab is working on the ethical implementation of AI to transform healthcare,
agriculture, wildlife conservation, and education. It also implements machine learning (ML) solutions
to understand multilingual and multicultural nuances and improve Google’s apps and services like
search, assistant, and payment.
l Besides the data-intensive core sectors, AI is gaining a prominent foothold in digital-first sectors like
telecom, tourism, education, digital media, and entertainment.
l Microsoft India Development Center (MSIDC) is also working on various projects ranging from theory to
advances in large-scale AI models. Project Jigsaw deals with large pre-trained language models such
as GPT-3, and Project LITMUS discovering strategies to evaluate massive multilingual models are some
projects initiated in the last few years.
Future of AI in India
An IDC report projected India’s AI market to reach $7.8 billion by 2025, growing at a CAGR of 20.2 percent.
Organizations will invest in AI solutions across functions like customer service, HR, IT automation, security, etc.
India has already built an edge in AI talent. The latest NASSCOM report ranks India first in terms of AI skill
penetration and also in AI talent concentration globally. The rich and massive digital talent pool is rapidly
upskilling for AI and catering to the talent demand in India and overseas.
Despite the government’s ongoing skilling initiatives and development of the infrastructural framework, the
NASSCOM AI Adoption Index 2022 positions India in the middle of the maturity scale, revealing the need for
enterprises to scale up their AI initiatives significantly.
Organizations should embed their AI strategy with the broader corporate strategy and invest more in developing
data standards and building dedicated AI teams.
The emergence of platform-agnostic AI solutions delivered on-demand over the cloud is helping organizations
reduce deployment and maintenance costs, scale AI projects, and witness sustaining business outcomes.
Implementing regulatory policies that ensure data protection, continuous government support, and a high
concentration of qualified talent puts India in a unique position to expand its AI ecosystem and become the
global leader.
Concluding Remarks
AI’s future holds both promise and uncertainty. AI has the ability to change a variety of societal spheres,
including healthcare, academics, and entertainment. Yet there are additional obstacles to be addressed, such
moral dilemmas, security issues, and legal problems.
The creation of general AI, which has the potential to outperform human intellect and resolve challenging
issues across several disciplines, is one of the major fields of AI study. Yet there are also worries about the
dangers of developing highly intelligent AI, which, if not adequately controlled, may endanger human survival.
However, the growth of AI in today’s IT industry is a big one that has the potential to change a lot of facets
of mankind. The hazards must be properly managed, though, in order to guarantee that AI is created in a
competent, moral, and responsible way.
7
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
6. Source: Sinha Smita (2018) Is Chatbot a Boon or Bane? Here’s why Companies Are Using Them Despite Tech Gliches. Analyticsindiamag.
com
8
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
Chatbots as well as Virtual Assistants which were previously considered as cutting-edge innovation/
technology - are now commonplace for businesses. Over fifty thousand known chatbots are available in the
marketplace and the majority of them focus on consumers, while just a tiny subset of these serves business
purposes. According to recent patterns, the perception of chatbots and virtual assistants being backed by
artificial intelligence as viable professional solutions might improve engagements at the company level and
help the businesses to expand.
Advantages of Using ChatBots and Virtual Assistance:
l Minimizing Operational Expenses : Responding to consumer inquiries is a substantial expense for
e-commerce companies because they need to employ, train as well as pay customer service personnel.
According to a data analysis, chatbots and virtual assistance could lower a company’s operating costs
by up to thirty per cent.
l Time Saving : Customers’ questions can be answered by such technologies by using datasets. They
are capable of handling data more accurately thanks to their clever algorithms and programmes. Time
that would otherwise be wasted is greatly reduced and productivity increases. Like for example, when
selecting an applicant from a huge pool of applications, bots may be used to screen the prospects by
posing pertinent questions.
l Minimizing Error : Chatbots and Virtual Assistants do not have the same tendency to overlook
information as people do. Hence, the chance of someone committing a mistake is eliminated. Also,
the quick response time and accurate responses increase client satisfaction to a greater extent. As a
result, businesses may use such technologies to perform various human activities and accordingly, the
personnel who might typically be hired for duties involving customer support might be assigned other
crucial jobs.
l 24X7 Availability : Chatbots and Virtual Assistants may be utilized anytime to offer customer support
online and they do not take time off unlike humans. Users won’t have to wait for assistance when
they browse on the internet or visit a particular website. Visitors can ask the virtual assistant/
bots for assistance to find the solutions on their own respective devices or online. Thus, one of the
finest client engagement methods is to have a chatbot deployed on your website. According to
statistics, sixty-four per cent of web users concur that a Chabot’s’ 24X7 availability is their greatest
advantage.
l Higher Conversion Rate: According to estimates, nearly thirty-seven per cent of web users consult a
user support bot to receive answers to urgent questions. Chatbots can help any website convert more
visitors by promptly and effectively responding to their questions.
l Increases Customer Satisfaction : Customers frequently find information systems to be extensive and
complicated to effectively answer their questions. Chatbots can be used to resolve this. They can
handle heavy traffic while still offering reliable service. Moreover, they guarantee a positive customer
interaction and contentment. So, this considerably increases customer satisfaction and minimizes
discontent. According to studies, businesses that maintain their consumers’ interest in them might
increase overall revenues. Incorporating chatbots on the website and incorporating them into well-
known networking sites may communicate with the visitors and increase conversion rates.
l Finding Promising Clients : Chatbots can help any business achieve its primary objective of creating
plenty of prospects and converting them into clients. One may get the chatbots to deliver the qualified
leads by using smart qualifying criteria. This might subsequently speed up the sales process of any
business.
9
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
Latest Trends
The overwhelming majority of internet users wish to connect with brands/businesses. It is due to the fact
that a quick and simpler solution is available this way. Utilizing chatbots allows businesses to reach a wider
range of consumers while also staying up to date with current developments.
l Enhanced Client Support
There are several ways by which virtual assistants and chatbots may enhance customer service. The
best method to provide the consumers the assistance they need while purchasing something is to act
as a live marketing advisor. Nearly eighty-three per cent of potential online shoppers want answers
to their questions regarding money, shipping, etc. answered as they browse through the website.
Moreover, the virtual assistants also help the customer/user in finding the desired result without the
hassle of going through a large database of information.
l Also, as previously indicated, providing round-the-clock services without making any customers wait in
line is the basic objective. They also improve customer service by engaging with consumers whenever
they want to regarding any problem. This enhances a consumer’s perception of any business or brand.
l The benefits of such technology outweigh any technological flaws, making such tech the prevailing
trends that are also anticipated to last a long time. As a result, companies are using them more and
more for diverse reasons.
l Nowadays, extremely interactive and context-aware AI tools may be created by utilizing massive
datasets and substantial training. These technologies can even recollect consumer behavior and
associated information from prior discussions and apply those observations to appropriately handle
client inquiries.
l The knowledge may also be improved and organized to make it more bot-friendly. It will allow the AI
to analyze the information effectively and find the best answers according to the client’s demand.
Also, such technologies can be trained to speak to the clients effectively. One may even think about
instructing it to exhibit emotions if needed during a conversation.
Demerits of Using ChatBots and Virtual Assistance:
The technological resources currently available are insufficient to create a Chatbot that can manage
complicated questions. There has never been a chatbot that has achieved complete recognition. Following
are some drawbacks of chatbots:
l Information is Less Secure
Chatbot security isn’t very good. They can allow hackers entry to any company’s network, user
information, datasets, and apps through their interface. Hence, businesses utilising chatbots must think
about issues including the lifetime of the data and how it is preserved, utilized, and who has access to it.
For industries like banking and finance that handle highly confidential customer data, it is indeed crucial
that some precaution must be taken.
l Restricted Pre-Programmed Responses
Chatbots can only respond to clients with replies from a small array of databases. However, not all
clients will find their questions resolved by using these. Also, considering they don’t always grasp what
is being requested, interactions could get tedious for consumers if they go round in loops. The initial
investment would be significant if someone chooses a smart bot with a sizable dataset.
l Apparent Incapability to Determine
Chatbots are unable to make judgements the same way that people do. Your chatbot might not be
10
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
able to handle the issue raised by the consumer if your knowledge base doesn’t have the solutions
to their questions. In order to make your content chatbot-friendly, one must organize and expand it. It
will make it possible for the bot to scan the information efficiently and find the best answers to each
customer’s requirements. Also, one must prepare it so that it can interact well with the customers.
l AI/ChatBots/Virtual Assistance Lack Emotions
To communicate effectively, emotions are necessary. Bots may be exceedingly impersonal and devoid
of sentiments, in contrast to humans. These can manage client queries according to predetermined
discussions only if the interaction flow follows the path provided. Yet, if a subject suddenly changes,
they could become perplexed & find it difficult to respond. Also, because they lack sentiments and
impulses, they sometimes find it difficult to interact positively with people.
Concluding Remarks
Notwithstanding their flaws, chatbots are being used by organizations and institutions all over the world on
an increasing basis. The reason for this is because their benefits exceed their drawbacks. Indeed, bots and AI
assistants are a future trend. They are still in their development stage and have not yet reached their entire
capabilities, but due to their increasing use by organizations, they belong in this technological age. In the
upcoming years, improvements in machine learning and artificial intelligence will contribute to furthering the
innovation and technology. Businesses will use it more frequently as a result to keep their focus on the client.
For business owners to effectively manage their customer service and marketing practices, bots may be a
huge help. These technologies must be taken with caution because just like any other technology, these also
have certain drawbacks. Before selecting if a chatbot is right for the business, owners must investigate all of
the alternates available. Effective chatbot deployments can offer significant insights into what functions and
what does not while using chatbots. Chatbots may be a potent tool for entrepreneurs to keep one step ahead
of the other competitors while deploying the correct strategy. Organizations may save resource and money by
automating particular operations while providing clients with the ease of round-the-clock access.
There are a few significant downsides to adopting chatbots, like user privacy issues or the possibility
for AI algorithms to malfunction, it is crucial to balance the benefits and drawbacks when thinking about
such technologies. Chatbots may be highly advantageous to any organisation across a wide range of sectors
when used with caution and in accordance with highest ability for ethical database processing. Making sure
that chatbots and virtual assistants are utilised in a responsible and ethical way requires taking a careful
strategy to their creation and execution.
7. Source: https://www.geeksforgeeks.org/significance-of-artificial-intelligence-in-cyber-security/
11
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
Reduced Revenue
As part of containment measures, Sun said, it had “proactively” isolated its network and initiated the recovery
process. “As a result of these measures, Company’s business operations have been impacted.
Consequently, revenues are expected to be reduced in some of our businesses,” it added.
“The Company would incur expenses in connection with the incident and the remediation. The Company is
currently unable to determine other potential adverse impacts of the incident, including but not limited to
additional information security incidents, increased costs to maintain insurance coverage, the diversion of
management and employee time or the possibility of litigation,” Sun Pharma said.
In the loop
A media channel named ransomware group ALPHV as the alleged actor behind the attack, and threatening
more damage. This has not been confirmed from any other quarter. Ransomware groups hold an organization’s
data for ransom, seeking a payment, for instance, to withdraw its threat and give the organization access to its
own data.
Former Maharashtra Director General of Police (DGP) and former Commissioner of Police (Mumbai) told
businessline, that local law enforcement authorities need to be in the loop at the earliest. Companies have to
step up their defense to prevent data from being contaminated or frozen for ransom, he said, because “once
a company becomes a victim, it becomes difficult for (the) cops to identify the international criminal and later
8. Reproduced from PT Jyothi Datta (2023), Security Breach Ransomware Attack: Sun Pharma says business operations impacted, The Hindu
Business lines. Available at: https://www.thehindubusinessline.com/companies/ransomware-attack-sun-pharma-says-business-operations-
impacted/article66667349.ece
9. Sun Pharma eyes revenue hit due to ransomware attack (March 27, 2023), The Economic Times. Available at https://economictimes.indiatimes.
com/industry/healthcare/biotech/pharmaceuticals/sun-pharma-eyes-revenue-hit-due-to-ransomware-attack/articleshow/99023464.cms
12
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
follow it up with MLAT process (Mutual Legal Assistance Treaty),” which would involve the Ministry of External
Affairs having to get in touch with authorities in the country from where the attack had been launched.
According to IBM Security’s annual X-Force Threat Intelligence Index report (2023), ransomware attacks
persisted, despite better detection. Besides, it added, Asia saw more cyberattacks than any other region,
accounting for nearly one-third of all attacks that X-Force responded to in 2022. “Manufacturing accounted for
nearly half of all cases observed in Asia last year,” the report said.
13
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
l Ongoing Development
Artificial Intelligence systems have the capacity to memorise from the past and constantly acclimatize
to new dangers. They can thus effectively handle the continuously changing risks in cyberspace.
Concluding Remarks
AI is an effective tool for controlling cyberspace, which is ever more complicated and challenging to control.
AI is capable of promptly identifying dangers and taking appropriate action because of its capacity to evaluate
massive volumes of datasets in real-time and gain insight from previous experiences. AI-powered systems will
become crucial tools for enterprises as cyber threats develop further.
14
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
AI may streamline the examination of medical information, for instance, in the healthcare sector, freeing up
professionals to devote more time with patients. Artificial Intelligence (AI) may be utilised in the industrial sector
to streamline operations like quality checks, lowering the likelihood of a human inaccuracy and boosting
productivity.
Personalization: The potential to customise products and offerings is yet another advantage AI offers. In order
to offer personalised suggestions and insights, AI systems may examine data on consumer behaviour and
preferences.
For instance, AI may be utilised in the e-commerce sector to offer clients individualised product suggestions
depending on their browsing and purchasing activity. AI may be utilised in the healthcare sector to create
individualised treatment regimens for individuals based on their unique traits and medical histories.
Making better decisions : AI may be applied to numerous businesses to enhance decision-making. In order to
find patterns and forecast outcomes, AI systems can analyse vast volumes of data, allowing businesses and
organisations to make better decisions.
AI may be utilised, for instance, in the commercial sector to assess market patterns and offer investment
suggestions. AI may be used to the shipping sector to improve logistics and route optimization.
10. Reproduced from Opportunities and Challenges for Artificial Intelligence in India, IT Articles, IASTOPPERS. Available at https://www.
iastoppers.com/articles/opportunities-and-challenges-for-artificial-intelligence-in-india-mains-article
15
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
Although AI attention is considerably slighter in India than in China or the USA, the increased AI interest has
manifested itself in the following three ways:
l Industries have started working to skill their manpower to enable themselves to compete with other
global players.
l Educational institutions have started working on their curricula to include courses on machine learning
and other relevant areas.
l Individuals and professionals have started acquiring these skills and are comfortable investing in
upgrading their own skills.
Major Challenges
l Fundamental challenges: India has a relatively small body of researchers and research output in the
field of machine learning.
l The contribution of Indian researchers to top AI conferences constitutes one-fifteenth of the U.S.
contribution and one-tenth of that of China.
l India has little local expertise in the new knowledge that is being created every day by others. India do
not have people who can train a new cohort of machine-learning engineers and scientists to develop
and commercialize technology.
l Despite the opportunities for the present and future, Indian companies have been slow to adopt AI.
l India does not possess enough trained manpower to apply machine learning to our own problems and
data, in spite of the number of standard packages available.
l Despite the initial enthusiasm for AI, there were unfulfilled potential and that the country could be doing
far more to adopt and integrate AI technologies.
l The cost of failure is much higher in India than the West. This has historically meant a lack of room for
innovative experimentation.
l Lack of Collaboration between Industry and Academia: The boom in the Indian IT services sector in the
early 90s was partially born out of necessity – India just did not have a good “products ecosystem”.
l India has historically not done well with products, there also seems to be a dearth of good talent
specifically for design and user-interface functions.
l Talent will be the biggest strength for India with respect to AI. But AI is still new, so current talent in the
market is very limited.
l Some challenges that the progress of AI in India faces is limited availability of manpower and of good
quality and clean data, as there is no institutional mechanism to maintain high quality data.
l The country’s diversity and complexity present a rich set of challenging problems for artificial
intelligence.
l Current AI techniques are limited in their ability to handle complexity, and they’ll have to mature to deal
with the diversity of life in India.
Challenges are concentrated across common themes of:
l Lack of enabling data ecosystems.
l Low intensity of AI research (i) Core research in fundamental technologies; (ii) Transforming core
research into market applications.
16
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
17
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
Trade Negotiations
l Trade and Development agreement to work together to harness the power of cutting-edge technologies
such as AI and blockchain to enhance and improve trade.
l With the growing complexity of international trade agreements, the purpose of the use of AI is to reduce
such complexity and help representatives of less favored nations achieve better results.
Fraud Detection
l The idea is to develop a system to help customs officers identify suspicious customs operations, and
to develop a product and foreign exporter information system to help importers in the registration and
classification of their products and corresponding exporters.
Criminal Investigation
l The investment is geared towards data science and AI to collect, store, and analyze large volumes of
information.
l The system allows information from different sources and bodies to be collected and also allows a
series of real-time data to be collected from suspected criminals.
Way Forward
l As with any major advancement in technology, it brings with it a spectrum of opportunities as well
as challenges. On one hand, several applications have been developed or under development with
potential to improve the quality of life significantly.
l Artificial Intelligence (AI) is likely to transform the way we live and work. Due to its high potential, its
adoption is being treated as the fourth industrial revolution.
Concluding Remarks
Currently, most of the traction in India is in the form of AI pilot projects from the government in agriculture
and healthcare, and the emergence of AI startups in cities like Bangalore and Hyderabad. Though these are
indications of grassroots level AI adoption, the pace of innovation isn’t comparable to the USA or China today.
11. See, Fay Robert and Trenholm Wallace, The Cyber Secuirty Battlefield, CIGI Online. Available at https://www.cigionline.
org/articles/cyber-security-battlefield/?utm_source=google_ads&utm_medium=grant&gclid=EAIaIQobChMIwb2dyoXU_
gIVUGErCh1UrgJFEAAYAyAAEgKmmfD_BwE
18
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
Source: https://data-flair.com
19
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
l Improvements in Threat Detection : Significantly better detection systems rates could well be
obtained by combining conventional security mechanisms (i.e. utilising the database of all recorded
security concerns till date) and employing automation to identify new risks.
l Detecting Frauds: Fraudulent purchases and actions may be recognised and stopped in a timely
manner by seeing patterns and identifying breaches from the expected baseline behaviour. “Anomaly
detection” is one of the most well-known uses of machine learning since it is a commonly used technique.
l Detecting Malwares: In most cases, hackers deliberately design malwares, which once made, automates
the creation of successive version that evade detection. Machine learning techniques are used to
improve traditional signature-based malware identification algorithms in order to identify and stop the
transmission of certain possible malware copies and variations.
l Protection of Passwords : Passwords have long been one of the privacy concerns of organizations. In
fact, passwords are usually the primary connection involving our identities and the conduct of online
fraudsters. Although biometric authentication has been considered a viable answer, it’s not currently
the easiest practical answer to apply in this case. With the use of AI, it might change over a period of
time. Developers are implementing AI to strengthen authentication process and get rid of any flaws.
A good illustration of this is Apple’s face identification software. This technique, called ‘Face ID’, uses
infrared sensors that detect a user’s facial characteristics. The Apple AI algorithm then develops a
complex representation of the user’s face to aid in the identification of significant resemblance.
l Secure Network Automation : The creation of security policies and organizational network structure
are two fundamental elements of cybersecurity. Admittedly, these demand a great deal of effort and
attention from people to attain and manage.
Thankfully, AI can partially simplify these processes. By monitoring network activity trends, AI may produce and
advice rules and processes that are tailored to one’s specific environment.
20
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
Concluding Remark
It is impossible to overlook the need for advanced cyber security measures in a situation where malicious cyber
threats are growing exponentially. The significance of AI in cyber security, as well as the many problems that
occur from it and how to mitigate them has its own pros and cons. Despite the limitations, AI still plays a big part
in cyber security. Artificial intelligence over time will help to develop data protection by helping to overcome
the shortcomings.
Confidentiality
Concerns regarding confidentiality/privacy are quite substantial in regard to AI. Massive quantities of private
information, including surfing histories and shopping patterns, are collected about people by AI systems.
Predictive models and tailored marketing campaigns may be created using this data. Moreover, it may be used
to determine a person’s eligibility for jobs, insurance, and loan prospects. A serious breach of privacy may result
from the improper application of this dataset.
AI’s Prejudice
The data that AI is fed determines how objective it really is. As statistical information is the basis for training AI
models, biased statistical information will result in biased AI models. Policies may be taken as a consequence
that is unfair and arbitrary. For instance, if the learning data comprises primarily of white people, an AI
system utilised in recruiting may be prejudiced towards people of colour. Consequently, if the testing dataset
comprises disproportionate detention and acquittals of members of minority populations, an AI system utilised
in criminology may be prejudiced against them.
21
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
regarding Artificial Intelligence and ethics. Some studies contend that it is feasible to build AI systems to act
morally and ethically, whereas others counter that it is not possible to build fully moral or ethical Artificial
intelligence technology.
It may prove challenging to encode moral and ethical ideas into algorithms or principles that AI technologies
can adhere to since they might be complicated and context-dependent. For instance, the ethical precept of “do
no damage” is vital in many disciplines, yet defining meaning of damage means in a specific situation might be
complex.
Another difficulty is that ethical and moral concepts sometimes include irrational judgments that are hard to
define or assess. Considering everyone equally may well be required under the idea of justice, however fairness
can be a subjective concept that varies based on the situation.
Notwithstanding these obstacles, attempts are being made to create ethical and moral guidelines for Artificial
Intelligence. For instance, a set of standards for the moral development and design of Artificial intelligence
systems has been created by the “IEEE Global Initiative for Ethical Issues” in AI and Autonomous Systems.
Similar to this, a group of business, academics, and philanthropic group has created a set of ethical guidelines
for Artificial Intelligence.
The ethical and moral ramifications of AI continue to raise problems, despite the existence of these models. One
worry is the possibility that prejudices and inequities might be reinforced or even made worse by AI technologies.
22
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
quality datasets. Smaller legal companies may find it difficult to employ AI solutions due to the high expense.
Another important problem is privacy issues. Information protection and privacy are issues that are raised with
the introduction of AI systems that utilise personal information. When utilising AI systems that gather and handle
personal data, lawyers and legal departments must exercise caution.
The regulatory framework presents another obstacle to AI use in law and compliance in India. There isn’t a
specific legislative mechanism that covers the implementation of AI in the legal sector, and India’s data security
regulations are still in the process of development. Due to this, it is challenging for legal firms to embrace and
use AI technology.
Conclusion
In India, the legal sector is poised to undergo a transformation, especially in the areas of compliance and
legislation. Yet, there are considerable obstacles to its acceptance, including a lack of knowledge and confidence,
high adoption costs, security issues as well as the regulatory compliance. Thus, it is crucial that Indian law
companies and legal departments spend the time learning about the competence of AI and the prospective
advantages it brings to the legal field. Law businesses and legal teams may save time, cut expenses, and do
better work by investing in AI solutions.
Case StudIES
The society we are living in today is being drastically changed by artificial intelligence (AI). It has transformed
a number of sectors, including production, medical, academics, and finance, to mention some. Several
businesses have actively adopted AI-powered techniques to enhance their processes, and plenty more are
thinking about doing the same.
In the drive to deploy AI and take leverage of its benefits, India is catching up quickly. Companies all
over India are examining AI-enabled technologies to drive growth, simplify processes, and enhance client
satisfaction. To guarantee that AI is utilised ethically and appropriately, laws and regulations must be
implemented as new technology brings new challenges post its adoption.
India has encountered several cases that address the legal ramifications over this decade itself. Several of
these judgments have established significant precedents that can direct corporations and lawmakers in how
they view and perceive AI.
The Supreme Court of India achieved a huge technical advancement during March 2023 by using AI to live-
transcribe its proceedings/hearings. Despite this, courts throughout the nation have not used text-generating
bots or algorithms to make rulings or support conclusions up to this point.
The High Court of Punjab and Haryana in the last week of March 2023 has made legal history by integrating
human and artificial intelligence in its ruling in a case concerning assault and murder. HMJ Anoop Chitkara
used the ChatGPT AI tech’s response in the ruling while he was addressing the issue of jurisprudence of bail
in a case where assault and cruelty are the main ingredients. This in itself will set a good precedent for the
courts in the future.
Right to Privacy (Aadhaar Case)
One of the notable instances involving AI in our country was the Aadhaar case. In this case, the Apex Court
had to establish whether the Aadhaar database infringed on Indian residents right to privacy.
The biometric authentication Aadhaar employs artificial intelligence to collect the confidential information of
Indian people. Since its inception, the program has generated controversy, and various data protection
activists have attacked it for gathering excessive amounts of personal data.
23
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
The Aadhaar system was found to be lawful by the Constitutional Bench in the year 2018, however some
limitations were placed on its application. The judgment said that people should have the option of opting out
of the programme and that Aadhaar cannot be made compulsory for operations like banking and cellphone
communications.
Organisations who employ AI to gather and preserve customer information should take note of the Aadhar
issue. The case emphasises the need of protecting personal data and preventing the misuse of AI systems
to violate people’s right to privacy.
Shamnad Basheer vs. Union of India
In the case of Shamnad Basheer vs. Union of India, the Delhi High Court had issued an order in 2020 requiring
the authorities to be fairly transparent regarding the implementation of AI in decision making procedures.
The court determined that the application of Artificial Intelligence must be open and responsible in the
matters involving the National Law School of India University’s (NLSIU) usage of Artificial Intelligence to
evaluate candidates for admission.
The Gig Economy Case
During the last few decades, India’s gig economy has expanded substantially, with industry leaders like Uber
and Ola leading the market. In 2018, a lawsuit was brought against all these businesses before the Supreme
Court, requiring it to determine whether gig workers should be classified as autonomous contractors or
workers.
The court determined that gig workers, who already have authority over their jobs and the freedom to select
the time and place they operate, must be regarded as independent contractors rather than workers.
For companies that employ AI-powered systems to hire autonomous workers, the gig economy argument
is important. The situation emphasises how crucial it is to comprehend the legal ramifications of the gig
economy and make sure that employees have the freedoms and safeguards they need.
The Facial Recognition Case
2019 saw a facial-recognition software case heard by the Delhi High Court. A person filed the lawsuit,
claiming that the Delhi police had breached his right to privacy by using facial-recognition software.
The court decided that the implementation of face recognition software by the Delhi police was not
an invasion of confidentiality, as long as it was carried out with sufficient precautions. The Delhi police
was instructed by the HC to take steps to guarantee that the software is only used for positive purpose and
that any information gathered is not exploited.
For companies that employ technology to recognize faces driven by AI, this particular case is important. The
case underlines the necessity of verifying that such technologies are utilised responsibly and professionally,
with sufficient protections in place to protect personal data.
Other Developments
One significant breakthrough was the establishment of the “Committee on Artificial Intelligence (AI) for
Economic Transformation” by the Government of India in August, 2017. Then in June, 2018, the group, which
was entrusted with creating a framework for the usages of Artificial Intelligence in India, published its findings.
The National Plan for Artificial Intelligence, which was unveiled by the Indian Government in 2018, also
provides an extensive roadmap for the advancement of AI in our country, including investments in R&D,
educational and manpower development and regulatory guidelines.
24
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
Given the possible hazards involved with Artificial Intelligence systems that manage personal datasets, there
have also been conversations in India about the requirement for Intelligence specific laws and regulations to
safeguard information. Unfortunately, no explicit law has been approved on this subject as of now.
Nevertheless, there have been a number of significant advancements and conversations regarding the
management of AI and its possible implications for society, despite the fact that there haven’t been enough
particular AI-related precedents in our country.
Conclusion
The aforementioned Indian AI precedents demonstrate the necessity for corporations and governments
to comprehend the legal repercussions of AI. Organizations utilizing AI-powered services must make sure
the independent workers/contractors are provided the freedoms and safeguards they deserve, whereas
organizations that use AI to gather and keep individual information must ensure that they preserve personal
individual privacy. Also, businesses must make sure that face recognition software as well as other AI-
powered technologies are utilised morally, sensibly and with appropriate privacy protections.
LESSON ROUND-UP
l Artificial Intelligence (AI) describes the creation of smart computers that can carry out activities that
traditionally call for human intelligence.
l Artificial Intelligence (AI) programmes that interact with people and carry out tasks include chatbots
and virtual assistants.
l Customer service, healthcare, and education are just a few applications for chatbots and virtual
assistants. Chatbots and virtual assistants enabled by AI can have advantages including higher
productivity, increased customer happiness, and lower expenses.
l AI has important ramifications for cybersecurity and cyberspace. Data breaches and other cyberattacks
are less likely when AI is used to quickly identify and respond to cyberthreats.
l Automation of basic cybersecurity chores with AI can free up human specialists to concentrate on more
difficult problems.
l Cybercriminals may also utilise AI to develop more complex and focused assaults, so it’s critical for
businesses to have robust cybersecurity safeguards in place.
l AI offers society both advantages and disadvantages. Possibilities include boosted productivity, better
judgment, and fresh inventions.
l Difficulties include the loss of jobs, ethical issues, and prejudice in AI systems. When addressing these
issues, it’s crucial to take use of AI’s potential.
l AI development and application must take ethics into account. Algorithm bias, a lack of transparency,
and the potential for AI to be misused negatively are a few examples of ethical problems.
l During the AI development process, including data collecting, algorithm creation, and deployment,
organizations should give ethical issues top priority.
l Although the legal environment surrounding AI is still developing, rules and regulations that affect AI
development and deployment are currently in existence. Examples include legislation governing data
privacy, consumer protection, and employment.
25
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
TEST YOURSELF
(These are meant for recapitulation only. Answers to these questions are not to be submitted for evaluation)
1. What is artificial intelligence, and how does it differ from other types of computer systems?
2. What are the different uses of AI, and what are their applications?
3. What are some of the ethical concerns surrounding AI, and how are they being addressed?
4. What are some of the most significant recent advancements in AI technology?
5. What are the limitations of AI, and what are some of the challenges facing the field?
6. How can individuals and organizations prepare for the impact of AI on the job market?
7. What is the future of AI, and what are some of the potential implications for society?
8. How can we ensure that AI is developed and deployed in an ethical and responsible manner?
l Philip C. Jackson, Jr., “Introduction to Artificial Intelligence”, Third Edition, Dover Publications, Inc.
l Bart Custers, Eduard Fosch-Villronga, “Law and Artificial Intelligence: Regulating AI and Applying AI in
Legal Practice”, TMC Asser Publishing, Springer
l Adixon Robert (2019) Artificial Intelligence Opportunities and Challenges in Businesses, Towards Data
Science. Available at https://towardsdatascience.com/artificial-intelligence-opportunities-challenges-
in-businesses-ede2e96ae935
l Artificial Intelligence - Chatbots and other virtual assistants are here to stay – here’s what that means
(2021), World Economic Forum.
l AI Compliance: What it is and Why You Should Care, EXIN. Available at https://www.exin.com/article/
ai-compliance-what-it-is-and-why-you-should-care/
l Artificial Intelligence and Equality Initiative, Carnegie Council for Ethics in International Affairs.
l Hacker Philipp et al (2022) AI Compliance – Challenges of Bridging Data Science and Law, Journal of
Data and Information Quality Volume 14 Issue 3 Article No.: 21 pp 1–4
l Martin Dale Bolima (2023) The Chatbot Conundrum: Are Digital Assistants a Boom or a Bane,
Disruptivetechasia. https://disruptivetechasia.com/
26
Artificial Intelligence (“AI”) - Introduction and Basics LESSON41
l Mohaghegh Shahab (2021) The Ethics of AI evolves with the Technology, The Way Ahead. See https://
jpt.spe.org/
l S. Shanthi (April, 2023), Deeptech Experts on ChatGPT and the Future of AI in India, Entrepreneur India.
Available on https://www.entrepreneur.com/en-in/technology/deeptech-experts-on-chatgpt-and-the-
future-of-ai-in-india/449697
l Sterling Miller, Artificial intelligence and its impact on legal technology: to boldly go where no legal
department has gone before, Thomson Reuters.
l Vedapalli Pavan (2022) Top 7 Challenges in Artificial Intelligence in 2023, Upgrad.com
l Xhristoph Bartneck and et al. (2020) An Introduction to Ethics in Robotics and AI, Springer Briefs in
Ethics, Springer International Publishing
27
PP-AIDA&CS Artificial Intelligence (“AI”) - Introduction and Basics
28
Lesson
Cyber Security
2
KEY CONCEPTS
n Cyber Crime n Cyber Security n Cyberspace n Information and Communication Technology (ICT) n Information
Infrastructure n Legal Policy n Regulation n Strategy n Techniques
Learning Objectives
To understand:
Role of Information and Communication Technology in the growth of business and society
Concept of Cyber Security
Significance of Cyber Security
Challenges and Restriction in Cyber Security
Solution towards enhanced level of Cyber Security
Contemporary Techniques for ensuring effective Cyber Security
Cyber Security Policies – National and International
National and International Perspectives of Cyber Security
Legal Assessment of Cyber Security
Regulatory/Compliance Assessment of Cyber Security
Lesson Outline
Cyber Security International Convention on Cyberspace
Significance of Cyber Security Cyber Security: Legal and Compliance
Assessment
Cyber Security Fundamentals
Cyber Security: Legal Assessment
Cyber Security Techniques
Cyber Security: Major Regulating Bodies
Challenges and Restrictions
and Compliance Requirements
Cyber Security Policies - National and
Cyber Security: Recent Government
International
Initiatives in India
Requirement of Cyber Security Policies
Lesson Round-Up
National Cyber Security Policy -2013: A Brief
Test Yourself
National Cyber Security Strategy: Recent
List of Further Readings
Trends
List of Other References
Cyber Security Policy: International Standards
29
PP-AIDA&CS Cyber Security
CYBER SECURITY
The quick development of Information and Communication Technologies (ICT) has revolutionized the Information
Infrastructure (II). This facilitated swifter communications and easy interaction among people and organizations.
With the people across the globe using ICT as the major mode of communication and transaction, we are
witnessing the prevalence of information at all levels of a society, be it individual, organizational and state.
Though the information revolution (precisely to be called as “Information Era”) has created new opportunities,
improved organizational efficiency and extraordinary global connectivity. Yet it has brought about new
unconventional vulnerabilities and threats bearing social, economic, political and security implications. Among
many banes suffered in ICT era, cyber security is a serious concern of individuals and organizations, public and
private as well as national and international.
Cyber security is primarily about people, processes, and technologies working together to encompass the full
range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response,
resiliency, and recovery policies and activities, including computer network operations, information assurance,
law enforcement, etc.
30
Cyber Security LESSON 2
Information (PHI), personal data, data about intellectual property, and information systems used by the
government and businesses. Because of the above reasons, cyber security has become an important part of
the business and the focus now is on developing appropriate response plans that minimize the damage in the
event of a cyber-attack.
It has to be noted that an organization or an individual can develop a proper response plan only when he has
a good grip on all the fundamentals of cyber security. Therefore, for an all-compassing cyber security in the
interest of business growth and progression, following fundamental categories need to be ensured:
l Network security,
l Data integrity and privacy,
l Operational security.
31
PP-AIDA&CS Cyber Security
32
Cyber Security LESSON 2
key, only. Suppose sender A wants to send a secret message to receiver B through internet. A will encrypt
the message using B’s public key, as the public key is known to everyone. Once the message is encrypted,
the message can safely be sent to B over internet. As soon as the message is received by B, he will use his
private key to decrypt the message and regenerate the original message.
3. Digital Signatures
It is a technique for validation of data. Validation is a process of certifying the content of a document. The
digital signatures not only validate the data but also used for authentication.
The digital signature is created by encrypting the data with the private key of the sender. The encrypted
data is attached along with the original message and sent over the internet to the destination. The receiver
can decrypt the signature with the public key of the sender. Now the decrypted message is compared with
the original message. If both are same, it signifies that the data is not tempered and also the authenticity
of the sender is verified as someone with the private key(which is known to the owner only) can encrypt
the data which was then decrypted by his public key. If the data is tempered while transmission, it is easily
detected by the receiver as the data will not be verified. Moreover, the massage cannot be re-encrypted
after tempering as the private key, which is possess only by the original sender, is required for this purpose.
As more and more documents are transmitted over internet, digital signatures are essential part of the legal
as well as the financial transition. It not only provides the authentication of a person and the validation of
the document, it also prevents the denial or agreement at a later stage. Suppose a shareholder instructs the
broker via email to sell the share at the current price. After the completion of the transaction, by any chance,
the shareholder reclaims the shares by claiming the email to be forge or bogus. To prevent these unpleasant
situations, the digital signatures are used.
4. Antivirus
There are verities of malicious programs like virus, worms, trojan horse, etc. that are spread over internet
to compromise the security of a computer either to destroy data stored into the computer or gain financial
benefits by sniffing passwords etc. To prevent these malicious codes to enter to your system, a special
program called an anti-virus is used which is designed to protect the system against virus. It not only
prevents the malicious code to enter the system but also detects and destroys the malicious code that is
already installed into the system.
There are lots of new viruses coming every day. The antivirus program regularly updates its database and
provides immunity to the system against these new viruses, worms, etc.
5. Firewall
It is a hardware/software which acts as a shield between an organizations network and the internet and
protects it from the threats like virus, malware, hackers, etc. It can be used to limit the persons who can have
access to your network and send information to you. There are two type of traffic in an organization viz.
inbound traffic and outbound traffic. Using firewall, it is possible to configure and monitor the traffic of the
ports. Only the packets from trusted source address can enter the organizations network and the sources
which are blacklisted and unauthorized address are denied access to the network. It is important to have
firewalls to prevent the network from unauthorized access, but firewall does not guarantee this until and
unless it is configured correctly. A firewall can be implemented using hardware as well as software or the
combination of both.
l Hardware Firewalls: example of hardware firewalls are routers through which the network is connected
to the network outside the organization i.e. Internet.
l Software Firewalls: These firewalls are installed and installed on the server and client machines and it
acts as a gateway to the organizations network.
33
PP-AIDA&CS Cyber Security
In the operating system like Windows 2003, Windows 2008 etc. it comes embedded with the operating
system. The only thing a user need to do is to optimally configure the firewall according to their own
requirement. The firewalls can be configured to follow “rules” and “policies” and based on these defined
rules the firewalls can follow the following filtering mechanisms.
l Proxy- all the outbound traffic is routed through proxies for monitoring and controlling the packet that
are routed out of the organization.
l Packet Filtering- based on the rules defined in the policies each packet is filtered by their type, port
information, and source & destination information. The example of such characteristics is IP address,
Domain names, port numbers, protocols etc. Basic packet filtering can be performed by routers.
l Stateful Inspection- rather than going through all the field of a packet, key features are defined. The
outgoing/incoming packets are judged based on those defined characteristics only.
l The firewalls are an essential component of the organizations network. They not only protect the
organization against the virus and other malicious code but also prevent the hackers to use their
network infrastructure to launch DOS attacks.
6. Steganography
It is a technique of hiding secret messages in a document file, image file, and program or protocol etc. such
that the embedded message is invisible and can be retrieved using special software. Only the sender and
the receiver know about the existence of the secret message in the image. The advantage of this technique
is that these files are not easily suspected.
There are many applications of steganography which includes sending secret messages without ringing the
alarms, preventing secret files from unauthorized and accidental access and theft, digital watermarks for IPR
issues, etc.
Additionally following steps also ensures effective cyber security:
Source: https://www.conceptdraw.com/
34
Cyber Security LESSON 2
It is further claimed by ACS in the above-mentioned study that “in many cases, the idea that a device might be
used for nefarious purposes isn’t even considered. And the result is that today cybercrime almost exclusively
leverages the lack of security-focused design in everything from your smartphone and web browser through
to your credit card and even the electronic systems in your car. The nature of threats Cybercrime comes in
a variety of forms ranging from denial-of-service attacks on websites through to theft, blackmail, extortion,
manipulation, and destruction. The tools are many and varied, and can include malware, ransomware,
spyware, social engineering, and even alterations to physical devices (for example, ATM skimmers). It’s no
surprise then that the sheer scope of possible attacks is vast, a problem compounded by what’s known as the
attack surface: the size of the vulnerability presented by hardware and software. This is further compounded
by the fact that hardware and software may provide multiple vectors for attacks, such that an iPhone might
have multiple different vulnerabilities, each of them a possibility for exploitation.”
From the above, we can deduce that cybercrime has to do with wrecking of havoc on computer data or networks
through interception, interference or destruction of such data or systems.
1. https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf
35
PP-AIDA&CS Cyber Security
Cyber-crime involves committing crime against computer systems or the use of the computer in committing
crimes.2 This is a broad term that describes everything from electronic cracking to denial-of-service attacks that
cause electronic commerce sites to lose money.
Generally, cybercrimes can be basically divided into 3 major categories:
1. Cybercrimes against persons.
2. Cybercrimes against property.
3. Cybercrimes against government.
2. Aaron J. Burstein. Towards a culture of cybersecurity research. Harvard Journal of Law and Technology, 22:230_240, 2008
3. Dr. V.Kavitha et al, International Journal of Computer Science and Mobile Computing, Vol.8 Issue.11, November- 2019, pg. 1-6
36
Cyber Security LESSON 2
l Cyber Espionage: The act of using the internet to spy on others for gaining benefit.
l Cyber Terrorism: The use of cyber space for creating large scale disruption and destruction of life and
property.
l Cyber War: The act of a nation with the intention of disruption of another nations network to gain
tactical and military.
l Active Attacks: An attack with data transmission to all parties thereby acting as a liaison enabling
severe compromise.
l Passive Attacks: An attack which is primarily eaves dropping without meddling with the database.
l Malicious Attacks: An attack with a deliberate intent to cause harm resulting in large scale disruption.
l Non-Malicious Attacks: Unintentional attack due to mishandling or operational mistakes with minor
loss of data.
l Attacks in Mobile Ad Hoc Network (MANET): Attacks which aim to slow or stop the flow of information
between the nodes.
l Attacks on Wireless Sensor Network (WSN): An attack which prevents the sensors from detecting and
transmitting information through the network.
To be precise, cybercrime and its increased frequency are one of the major challenges in cyber security.
Handling cyber security is still a very huge concern of present-day Governments and private sectors throughout
the globe are taking many measures in order to secure these cybercrimes.
l In addition to financial damage suffered by the business, a data breach can also inflict untold reputational
damage.
l Cyber-attacks these days are becoming progressively destructive.
l Regulations such as GDPR are forcing organizations into taking better care of the personal data they
hold.
37
PP-AIDA&CS Cyber Security
4. Preethiga Narasimman (2022), Most Extensive Cyber Security Challenges and Solutions in 2023, Knowledgehut, upGrade.
38
Cyber Security LESSON 2
39
PP-AIDA&CS Cyber Security
10. Bring Your Own Device Policies (BYOD) Services for BYOD are among the management
alternatives, and the process begins with
BYOD are more likely to breach business networks
an enrollment app that adds a device to
since they are less secure and more likely to have
the network. It is always advisable to either
security flaws than corporate devices. Therefore,
configure company-owned devices individually
enterprises of all sizes must comprehend and
or in bulk.
address BYOD security.
14. Supply Chain Attacks One shall maintain a highly secure build
infrastructure and upkeep secure software
A supply chain assault occurs when someone
updates.
compromises your digital infrastructure by using an
external supplier or partner who has access to your
data and systems.
16. Attacks on Application Programming Interface (APIs) To protect from attacks on API, organizations
can promote the use of push notifications, apply
The malicious or attempted use of an API by
two-factor authentication, and encrypt the data.
automated threats, such as access violations, bot
assaults, or abuse, is known as an API attack. Mass
data losses, theft of personal information, and service
interruption can all be caused by an API attack.
40
Cyber Security LESSON 2
20. Security of Remote Work and Hybrid Workforces Identifying shadow IT, lowering risk via URL
and web category filtering, implementing virus
A comprehensive examination of access techniques
protection, and establishing data loss prevention
is required, especially for distant users. It is
(DLP) are just a few of the approaches to
imperative to provide secure access to programs for
securing remote workers and their applications.
both on-premises and remote workers. The same
issues with remote work also arise with hybrid work,
such as the absence of a network boundary, the
requirement to support access from a wide range
of devices, and the need to secure on-premises
infrastructure.
41
PP-AIDA&CS Cyber Security
22. Deep Fake Technology There have typically been two solutions
proposed to address the issues caused by deep
Deep fake threats can be classified into societal,
fakes – (a) either employ technology to identify
legal, personal, and traditional cybersecurity.
fake technology or (b) increase literacy and/or
skill in this regard.
5. Source: National Cyber Security Policy, Ministry of Electronics and Information Technology, Government of India
6. ISO / IEC 27032-2012
42
Cyber Security LESSON 2
43
PP-AIDA&CS Cyber Security
44
Cyber Security LESSON 2
l To prevent occurrence and recurrence of cyber incidents by way of incentives for technology
development, cyber security compliance and proactive actions.
l To establish a mechanism for sharing information and for identifying and responding to cyber security
incidents and for cooperation in restoration efforts.
l To encourage entities to adopt guidelines for procurement of trustworthy ICT products and provide for
procurement of indigenously manufactured ICT products that have security implications.
B. Creating an assurance framework
l To promote adoption of global best practices in information security and compliance and thereby
enhance cyber security posture.
l To create infrastructure for conformity assessment and certification of compliance to cyber security best
practices, standards and guidelines (e.g. ISO 27001 ISMS certification, IS system audits, Penetration
testing / Vulnerability assessment, application security testing, web security testing).
l To enable implementation of global security best practices in formal risk assessment and risk
management processes, business continuity management and cyber crisis management plan by all
entities within Government and in critical sectors, to reduce the risk of disruption and improve the
security posture.
l To identify and classify information infrastructure facilities and assets at entity level with respect to risk
perception for undertaking commensurate security protection measures.
l To encourage secure application / software development processes based on global best practices.
l To create conformity assessment framework for periodic verification of compliance to best practices,
standards and guidelines on cyber security.
l To encourage all entities to periodically test and evaluate the adequacy and effectiveness of technical
and operational security control measures implemented in IT systems and in networks.
C. Encouraging Open Standards
l To encourage use of open standards to facilitate interoperability and data exchange among different
products or services.
l To promote a consortium of Government and private sector to enhance the availability of tested and
certified IT products based on open standards.
D. Strengthening the Regulatory framework
l To develop a dynamic legal framework and its periodic review to address the cyber security challenges
arising out of technological developments in cyber space (such as cloud computing, mobile computing,
encrypted services and social media) and its harmonization with international frameworks including
those related to Internet governance.
l To mandate periodic audit and evaluation of the adequacy and effectiveness of security of information
infrastructure as may be appropriate, with respect to regulatory framework.
l To enable, educate and facilitate awareness of the regulatory framework.
E. Creating mechanisms for security threat early warning, vulnerability management and response to
security threats
l To create National level systems, processes, structures and mechanisms to generate necessary
situational scenario of existing and potential cyber security threats and enable timely information
sharing for proactive, preventive and protective actions by individual entities.
45
PP-AIDA&CS Cyber Security
l To operate a 24x7 National Level Computer Emergency Response Team (CERT-In) to function as a Nodal
Agency for coordination of all efforts for cyber security emergency response and crisis management.
CERT-In will function as an umbrella organization in enabling creation and operationalization of
sectoral CERTs as well as facilitating communication and coordination actions in dealing with cyber
crisis situations.
l To operationalize 24x7 sectoral CERTs for all coordination and communication actions within the
respective sectors for effective incidence response & resolution and cyber crisis management.
l To implement Cyber Crisis Management Plan for dealing with cyber related incidents impacting critical
national processes or endangering public safety and security of the Nation, by way of well-coordinated,
multi-disciplinary approach at the National, Sectoral as well as entity levels.
l To conduct and facilitate regular cyber security drills & exercises at National, sectoral and entity levels
to enable assessment of the security posture and level of emergency preparedness in resisting and
dealing with cyber security incidents.
F. Securing E-Governance services
l To mandate implementation of global security best practices, business continuity management and
cyber crisis management plan for all e-Governance initiatives in the country, to reduce the risk of
disruption and improve the security posture.
l To encourage wider usage of Public Key Infrastructure (PKI) within Government for trusted communication
and transactions.
l To engage information security professionals / organisations to assist e-Governance initiatives and
ensure conformance to security best practices.
l G. Protection and resilience of Critical Information Infrastructure
l To develop a plan for protection of Critical Information Infrastructure and its integration with business
plan at the entity level and implement such plan. The plans shall include establishing mechanisms
for secure information flow (while in process, handling, storage & transit), guidelines and standards,
crisis management plan, proactive security posture assessment and forensically enabled information
infrastructure.
l To Operate a 24x7 National Critical Information Infrastructure Protection Centre (NCIIPC) to function as
the nodal agency for critical information infrastructure protection in the country.
l To facilitate identification, prioritisation, assessment, remediation and protection of critical infrastructure
and key resources based on the plan for protection of critical information infrastructure.
l To mandate implementation of global security best practices, business continuity management and
cyber crisis management plan by all critical sector entities, to reduce the risk of disruption and improve
the security posture.
l To encourage and mandate as appropriate, the use of validated and certified IT products.
l To mandate security audit of critical information infrastructure on a periodic basis.
l To mandate certification for all security roles right from CISO / CSO to those involved.
l in operation of critical information infrastructure.
l To mandate secure application / software development process (from design through retirement) based
on global best practices.
46
Cyber Security LESSON 2
47
PP-AIDA&CS Cyber Security
8. Available at https://www.dsci.in/sites/default/files/documents/resource_centre/National%20Cyber%20Security%20Strategy%20
2020%20DSCI%20submission.pdf
48
Cyber Security LESSON 2
Key highlights of DSCI – National Cyber Security Strategy Report, 2020 are as follows:
l Concerted and well-thought-through effort for ensuring security right from design to entire phases of life
cycle of large-scale digitization of public services projects.
l Two-pronged approach for supply chain security, for product procured/deployed and product developed
in India.
l Empowered and resourced security function in critical information infrastructure sector, with specific
attention to SCADA/OT security.
l Index for sectoral preparedness and monitoring performance.
l Given the urgency created by rising cyber threats, Government should carve out separate budget for
cybersecurity.
l Critical infrastructure protection demands fixing the structural problem by empowering security
leadership and strengthening security in both IT and OT environment.
l Synergize role and functions of various agencies and restructure them with role and functional
responsibility aligned to the national strategy and execution blueprint.
l Orchestrate all efforts of Government in bilateral, multilateral, regional cyber cooperation, and
participation in Global forums and influence and drive the agenda aligned to India’s interests in Cyber
Space and Security.
l Bootstrap the Cyber Security Capability building program in states through central funding on lines of
e-Government.
l Capacity building, managing risks arising from technology innovation, R&D and commercialization
of insights, digitization of SMB sector, state and sector preparedness, data security governance and
securing digital payments have become fundamentals of securing a nation and hence Government
must leverage cybersecurity strategy 2020 to strengthen these fundamental components.
l Attracting bright young minds to the field of cyber security through awareness, targeted campaigns,
and providing enticing career opportunities.
l Incentivization contributions to for developing cybersecurity technology, development of training
infrastructure, investing in the testing labs, active participation in technology standards making,
demonstration of India’s capabilities in the global market, and for improving preparedness of SMB
sector.
l Calling for development of an index of preparedness of states in cybercrime investigations that would
factor investment made, reach and scale of the effort, undertaken experimentations, timeliness in the
resolution of the cases, and improvement in the conviction rate.
9. The Hindu (December 14, 2022) Draft cybersecurity strategy has been formulated: Centre However, the timeline for its implementation
and other details were not mentioned.
49
PP-AIDA&CS Cyber Security
10. The technical architecture that allows the global internet to function.
11. How states, industry, and users may use this technology.
50
Cyber Security LESSON 2
A cybersecurity policy, however, can vary organization to organization or state to state. It can take different
shapes or forms, depending on the type of organization, nature of business, operational model, scale,
regulatory requirement of a state and alike. Yet, there are certain factors which helps in the effective use of
cybersecurity policies:
Acceptable Use Policy (AUP)
Access control policy
Business continuity plan
Data breach response policy
Disaster recovery plan, and
Remote access policy
Asoke Mukerji15 in his paper on “The Need for an International Convention on Cyberspace” has also highlighted
the signification of global regulation on cyberspace and need of global standards of cyber security. He
further stated that Emerging concepts related to the application of cyber technologies alike Internet of Things
(IoT), Artificial Intelligence (AI), and robotics - are propelling the world into the Fourth Industrial Revolution.
Though these phenomena are currently being tested and applied within a few countries, yet their impact will
be felt globally due to the complex interlinkages of cyberspace. These interlinkages revolve around cyber
technologies and infrastructure. Hence, he highlighted that all four stakeholders—governments, businesses,
academia, and civil society—play a critical role in identifying the strengths and vulnerabilities of cyberspace. In
varying degrees around the world, all four have expressed interest in creating the building blocks for a multi-
stakeholder international framework for cyberspace.
12. Students to Note: As the global context of cyber security is quite wide, therefore the brief of international convention and latest
development is discussed in this chapter. This is only indicative and not descriptive. Students may also refer – Duncun B. Hollis (2021) A
Brief Primer on International law and Cyberspace, Carnegie Endowment for International Peace.
13. Published with Carnegie Endowment for International Peace.
14 Source: How to Create An Effective Cybersecurity Policy (2022) Cyber Management Alliance
15. India’s former Permanent Representative to the United Nations in New York and supervised India’s participation in negotiations that
resulted in the adoption of the UN 2030 Agenda for Sustainable Development.
51
PP-AIDA&CS Cyber Security
16. Source: Lok Sabha Questions (December 14, 2022), Government of India. Available on http://164.100.24.220/loksabhaquestions/
annex/1710/AU1374.pdf
52
Cyber Security LESSON 2
In the recently notified cyber security direction CERT-In has now made it mandatory for all incidents to be
mandatorily reported to CERT-In. As per the information reported to and tracked by CERT-In, year-wise number
of cyber security incidents areas below :
2. 2018 2,08,456
3. 2019 3,94,499
4. 2020 11,58,208
5. 2021 14,02,809
The above information clearly states that on one hand where cybercrimes are on rise, on the other hand, Indian
government is actively regulating the cyberspace to ensure high level of cyber security.
Under the above backdrop, let’s discuss the legal and regulatory regime of cyber security in India
1. Source: Lok Sabha Questions (December 14, 2022), Government of India. Available on http://164.100.24.220/loksabhaquestions/annex/1710/
AU1374.pdf
17. Source: Chin Kyle (2022), Top Cyber Security Regulations in India, UpGuard.
53
PP-AIDA&CS Cyber Security
The IT Act of 2008 applies to any individual, company, or organization (intermediaries) that uses computer
resources, computer networks, or other information technology in India. With regard to cyber security in
specific, the IT Act of 2008 includes the following responsibilities:
l Improving cybersecurity measures and forensics.
l Requiring intermediaries and body corporates to report cybersecurity incidents to CERT-In.
l Preventing unauthorized/unlawful use of a computer system.
l Protecting private data and information from cyber terrorism, DDoS attacks, phishing, malware, and
identity theft.
l Legal recognition for cybersecurity of organizations.
l Safeguarding e-payments and electronic transactions and monitoring and decryption of electronic
records.
l Establishing a legal framework for digital signatures.
l Recognizing and regulating intermediaries.
C. Information Technology Rules, 2011
Under the IT Act, another important segment of the cybersecurity legislation is the Information Technology
(Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011
(Privacy Rules).
The most significant amendments include provisions for the regulation of intermediaries, updated penalties
and violation fees for cybercrime, cheating, slander, and nonconsensual publishing of private images, as
well as censoring/restriction of certain speech.
Both the Information Technology Act (ITA) and the IT Rules aim to govern how Indian entities and organizations
process sensitive info, data protection, data retention, and collection of personal data and other sensitive
information.
Other Indian sectors, like banking, insurance, telecom, and healthcare, also include data privacy provisions
as part of their separate statutes.
D. Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011 and Cyber Security
The IS/ISO/IEC 27001 regulations are identified by the Indian Sensitive Personal Data and Information Rules
as international standards. As such, Indian companies are not obligated but highly advised to implement
these standards, which can help meet the “reasonable security practices” under Indian jurisdiction.
E. National Cyber Security Policy, 201318
Ministry of Electronics and Information Technology (Meity) released the National Cyber Security Policy,
2013 as a security framework for public and private organizations to better protect themselves from cyber-
attacks. The goal behind the National Cyber Security Policy is to create and develop more dynamic policies
to improve the protection of India’s cyber ecosystem. The policy aims to create a workforce of over 500,000
expert IT professionals over the following five years through skill development and training.
F. Information Technology Rules, 2021
On February 25, 2021, the Ministry of Electronics and Information Technology introduced the Information
18. Students to note that National Cyber Policy 2013 has been discussed in detail in the previous parts of this chapter, hence a brief of this
policy is provided herein.
54
Cyber Security LESSON 2
Technology (Guidelines for Intermediaries and Digital Media Ethics Code) Rules, 2021 as a replacement
for IT Rules, 2011. A little over a year later, on June 6, 2022, the newly updated draft amendments were
published by the Indian MeitY (Ministry of Electronics and IT) to improve the IT Act to keep up with the
challenges of the ever-changing digital landscape.
The new amendments aim to allow ordinary users of digital platforms to seek compensation for their
grievances and demand accountability when their rights are infringed upon, as well as institute additional
due diligence on organizations.
Additionally, there are changes to the privacy and transparency requirements of intermediaries, such as:
l Requiring intermediaries to inform users about rules and regulations, privacy policy, and terms and
conditions for usage of its services.
l Requiring intermediaries to designate a grievance officer that can address and resolve user complaints
about violations of IT Rules, 2021.
G. National Cyber Security Strategy 2020
The National Cyber Security Strategy of 2020 was the long-awaited follow-up plan by the Indian government
to further improve cybersecurity efforts. This strategy is under review by the National Security Council
Secretariat. The strategy aims to improve cybersecurity audit quality so organizations can conduct better
reviews of their cybersecurity architecture and knowledge. Its main goal is to serve as the official guidance
for stakeholders, policymakers, and corporate leaders to prevent cyber incidents, cyber terrorism, and
espionage in cyberspace.
H. Reserve Bank of India (RBI) Regulations on KYC (Know Your Customer) vide electronic means
KYC (Know Your Customer) processes are standards and practices used worldwide and mandated by the
RBI (Reserve Bank of India). KYC is the tracking and monitoring of customer data security for improved
safeguarding against fraud and payment credential theft. It requires banks, insurance companies, and
any other digital payment companies that carry out financial transactions to verify and identify all of their
customers.
For proper e-KYC compliance and to meet financial regulatory requirements, businesses need to include the
following cybersecurity steps:
l Having a knowledge-based questionnaire test for verifying customer identities.
l Implementing pre-screening KYC verification methods like email verification, phone verification, Device
ID intelligence, and reputational data, among others.
l Using AI-based technology and machine learning for verifying documents and government-issued IDs.
l Using biometrics like fingerprinting and facial recognition to verify a user’s identity.
l Maintaining a database of customers for verification purposes.
l Businesses with KYC policies assure customers they have the relevant compliance management and
anti-fraud solutions to protect their digital identities and payment transaction data.
55
PP-AIDA&CS Cyber Security
56
Cyber Security LESSON 2
main goal of this regulation is to improve the operations of DISCOMs (distribution companies) by enhancing
the cyber infrastructure with AI-based solutions. This will ultimately aid organizations and companies in
meeting the framework’s goals.
C. Cyber Regulations Appellate Tribunal (CRAT)
Under the IT Act, 2000, Government of India created the Cyber Regulations Appellate Tribunal (CRAT) as a
chief governing body and authority for fact-finding, receiving cyber evidence, and examining witnesses. As
per IT Act, CRAT has powers of civil court as defined under Code of Civil Procedure, 1908.
D. Securities and Exchange Board of India (SEBI)
Established in 1988, the SEBI (Securities and Exchange Board of India) is the regulatory body for securities
and commodity markets in India. In addition to ensuring the needs of market intermediaries, investors,
and issuers of securities in compliance with applicable laws, SEBI also focus on safeguarding their data,
customer data, and transactions.
As of April 2022, SEBI has six committee members that are required to oversee guidance for cybersecurity
initiatives for the Indian market and advise SEBI to develop and maintain cybersecurity requirements
following global industry standards.
E. Insurance Regulatory and Development Authority (IRDAI)
The insurance sector of India is regulated by IRDAI, which issues information security guidelines for insurers
and addresses the importance of maintaining data integrity and confidentiality.
With this new Information and Cyber Security for Insurers Guidelines, the IRDAI:
l Mandates insurance companies to have a CISO (chief information security officer)
l Puts together an information security committee
l Creates plans for managing cyber crises
l Creates and implements cybersecurity assurance programs
l Implements proper methods for protecting data
l Maintains risk identification and risk mitigation processes.
On October 9, 2022, IRDAI introduced an improved cybersecurity framework focused on the insurers’ main
security concerns. It aims to encourage insurance firms to establish and maintain a robust risk assessment
plan, improve mitigation methods of internal and external threats, prevent ransomware attacks and other
types of fraud, and implement a strong and robust business continuity.
F. Telecom Regulatory Authority of India (TRAI) & Department of Telecommunications (DoT)
The Telecom Regulatory Authority of India, along with the DoT (Department of Telecommunication)19, have
tightened regulations for protection of data privacy and also mandates guidelines under which users’ date
has to be used.
Although TRAI has been granted more regulatory powers, both work together to govern and regulate
telephone operators and service providers.
On June 16, 2018, TRAI released recommendations for telecom providers on “Privacy, Security and Ownership
of the Data in the Telecom Sector.” In the newest guidelines, TRAI addresses newer responsibilities governing
consumer data because most digital transactions in India are done via cell phones.
19. TRAI is a regulatory body, and DoT is a separate executive department of the Ministry of Communications in India.
57
PP-AIDA&CS Cyber Security
58
Cyber Security LESSON 2
B. Security approach
l Strengthening the trust framework, including information security and network security, authentication,
privacy and consumer protection, is a prerequisite for the development of the information society and
for building confidence among users of ICTs;
l A global culture of Cyber security needs to be actively promoted, developed and implemented in
cooperation with all stakeholders and international expert bodies;
l Streamlining and improving the co-ordination on the implementation of information security measures
at the national and international level;
l Establishment of a framework for implementation of information assurance in critical sectors of the
economy such as public utilities, telecommunications, transport, tourism, financial services, public
sector, manufacturing and agriculture and developing a framework for managing information security
risks at the national level;
l Establishment of an institutional framework that will be responsible for the monitoring of the information
security situation at the national level, dissemination of advisories on latest information security alerts
and management of information security risks at the national level including the reporting of information
security breaches and incidents;
l Promote secure e-commerce and e-government services;
l Safeguarding the privacy rights of individuals when using electronic communications;
l Develop a national cyber security technology framework that specifies cyber security requirement
controls and baseline for individual network user;
l Firms should secure their network information. When organization provides security for their networks,
it becomes possible to enforce property rights laws and punishment for whoever interferes with their
property.
C. Education/Research
l Improving awareness and competence in information security and sharing of best practices at the
national and international level through the development of a culture of cybersecurity;
l Formalize the coordination and prioritization of cyber security research and development activities;
disseminate vulnerability advisories and threat warnings in a timely manner;
l Implement an evaluation/certification programme for cyber security product and systems;
l Develop, foster and maintain a national culture of security standardize and coordinate cybersecurity
awareness and education programmes.
59
PP-AIDA&CS Cyber Security
60
Cyber Security LESSON 2
Several factors led to findings that indicate significant changes in and challenges for surveyed organizations in
2021. Let’s go more in-depth to cover these issues.
61
PP-AIDA&CS Cyber Security
Figure 4. How much the most expensive ransom demanded by threat actors cost organizations.
62
Cyber Security LESSON 2
Among those 61% of respondents for organizations that paid the ransom, 60% said they did so because of the
threat of data leakage. Figure 5 shows the reasons given as to why the remaining 40% of organizations didn’t
pay the ransom demanded.
Figure 6. Type of attacks for which organizations have response plans compared to the previous report.
63
PP-AIDA&CS Cyber Security
Only 46% of respondents said their organizations had specific incident response plans for at least one of the
eight types of cyberattacks listed in Figure 6. Among those organizations:
l Only 32% of those surveyed said their organizations have a plan for supply chain attacks
l Only 35% said their organizations have a plan for disaster recovery
l Only 40% of organizations’ leaders regularly assess third-party risk.
One reason for these figures could be that many organizations have a low level of cybersecurity maturity. The
following section indicates the extent of this issue.
LESSON ROUND-UP
l Though the information revolution (precisely to be called as “Information Era”) has created new
opportunities, improved organizational efficiency and extraordinary global connectivity. Yet it has
brought about new unconventional vulnerabilities and threats bearing social, economic, political and
security implications.
l Among many banes suffered in ICT era, cyber security is a serious concern of individuals and
organizations, public and private as well as national and international.
l Cyber security is the body of technologies, processes, and practices designed to protect networks,
computers, programs and data from attack, damage or unauthorized access.
l Cybersecurity is the process of defending against malicious intrusions on networks, computers, servers,
mobile devices, electronic systems, and data. It is also referred to as information technology security
or electronic information security.
l For an all-compassing cyber security in the interest of business growth and progression, following
fundamental categories need to be ensured:
Network security,
Data integrity and privacy,
Operational security.
l There are many cyber security techniques to combat the cyber security attacks including Authentication,
Encryption, Digital Signatures, Firewall and alike.
l On one hand, technology has transformed the society towards inclusive development, on the other
hand, this technology only has become vulnerable to cybercrime. It is worth to mention that with day
to day innovated technology, newer kind of cybercrimes are taking place. Hence, technology and its
innovation itself has become a major challenge and restriction to cyber security.
l To be precise, cybercrime and its increased frequency are one of the major challenges in cyber security.
l Handling cyber security is still a very huge concern of present-day Governments and private sectors
throughout the globe are taking many measures in order to secure these cybercrimes.
l In addition to the cybercrimes as discussed in this chapter, recently new forms of challenges and
limitations are identified in cyber world.
l There are various ongoing activities and programs of the Government to address the cyber security
challenges which have significantly contributed to the creation of a platform that is now capable of
supporting and sustaining the efforts in securing the cyber space.
64
Cyber Security LESSON 2
l Due to the dynamic nature of cyberspace, and for the required unified action, the Government of
India has enacted a National Cyber Security Policy, with an integrated vision and a set of sustained &
coordinated strategies for implementation.
l Cyber Security Policy also outlines some pointers to enable collaborative working of all key players
in public & private to safeguard country’s information and information systems. This policy, therefore,
aims to create a cyber security framework, which leads to specific actions and programmes to enhance
the security posture of country’s cyber space.
l In 2020, the National Cyber Security Strategy was conceptualized by the Data Security Council of
India (DSCI).
l In the wake of recent cyber-attacks as well as of urgent necessity of cyber security, the National
Security Council Secretariat (NSCS) has formulated a draft National Cyber Security Strategy, which
holistically looks at addressing the issue of security of national cyberspace.
l Considering the global flow of the information and communication technology, states now a days are
giving increased attention to the governance of cyberspace.
l Accordingly, in order to ensure effective governance in cyberspace the role of international law in the
cyber context has gained increased prominence.
l There are certain standards which effectively ensure cyber security and open for international adoption.
l In the recently notified cyber security direction CERT-In has now made it mandatory for all incidents to
be mandatorily reported to CERT-In.
l On one hand where cybercrimes are on rise, on the other hand, Indian government is actively regulating
the cyberspace to ensure high level of cyber security.
l In addition to Information Technology Act, 2000 and its relevant IT Rules, 2011, there are many
regulatory bodies which ensure the effective enforcement of cyber security in India.
Test Yourself
(These are meant for recapitulation only. Answers to this questions are not to be submitted for evaluation)
1. What is Cyber Security and Why Cyber Security is significant in the current cyberspace. Explain with
suitable examples.
2. Briefly discuss Cyber Security Techniques.
3. How would you define Cybercrime? Discuss at least 5 cybercrimes, which threatens cyber security.
4. Write a brief on recent government initiatives for ensuring cyber security.
5. Highlight the role of CERT-In in cyber security.
6. Write Short Notes on ANY TWO topics as mentioned below:
a. National Cyber Security Policy, 2013
b. National Cyber Security Strategy, 2020
c. Cloud Attacks
7. Define Cybersecurity. Elucidate the difference between IDS and IPS?
65
PP-AIDA&CS Cyber Security
l Aditi Subramaniam and Sanuj Das (2022) The Privacy, Data Protection and Cybersecurity Law Review:
India, The Law Reviews
l DSCI Report – National Cyber Security Strategy, 2020
l Gautam Sen (2022) Cyber Security and Cyberspace in International Relations: A Roadmap for India’s
Cyber Security Policy, A USI of India Publications
l Mayank Bhushan et al (2020) Fundamentals of Cyber Security (Principles, Theory and Practices), BPB
Publications, India
l Sandeep Shukla and Manindra Agrawal (2020) Cyber Security in India – Education, Research and
Training, SpringerLink.
l Charles Brookson (2016) Tackling the Challenges of Cyber Security First edition – December 2016 ETSI
White Paper No. 18, ISBN No. 979-10-92620-12-2
l Cyber Security Division, Ministry of Electronics and Information Technology, Government of India.
l Cyber Security: Threats, Challenges and Opportunities (2016), Australian Computer Society, Sydney,
Australia
l Dr. Rajasekharaiah K.M et al, Cyber Security Challenges and its Emerging Trends on Latest Technologies,
IOP Conf. Series: Materials Science and Engineering 981 (2020) 022062, ICRAEM 2020
l Dr. V.Kavitha et al, Cyber Security Issues and Challenges - A Review International Journal of Computer
Science and Mobile Computing, Vol. 8 Issue 11, November- 2019, pg. 1-6
l K. M Rajasekharaiah et al (2020) Cyber Security Challenges and its Emerging Trends on Latest
Technologies , IOP Conference Series.: Material Science and Engineering 981 022062.
66
Lesson
Cyber Threats and Cyber Laws
3
KEY CONCEPTS
n Cyber Threats n Cyber Warfare n Cyber Crime n Cyber Terrorism n Cyber Threat Hunting n Digital Forensics
n Digital Intellectual Property n Data Protection
Learning Objectives
To understand:
Meaning and Types of Cyber Threats
What is Cyber Warfare
Meaning and Kinds of Cyber Crimes
What constitute Cyber Terrorism
Significance of Cyber Security and its Mechanism
Types of Cyber Threats
Meaning and Process Cyber Threat Hunting
What is Digital Forensics?
Concept of Digital Intellectual Property
Legal purview of the Liability of online platform/intermediaries
Artificial Intelligence vis-à-vis Data Protection
Other inter-related concepts
Lesson Outline
Introduction Laws applicable to AI and Cyber Laws
Cyber Threats Cyber Warfare Cyber Security Framework (NCFS)
Cyber Crime Data Protection and AI: Laws and Regulations
Cyber Terrorism Case Studies
Types of Cyber Threats/ Attacks Lesson Round-Up
Cyber Threat Hunting and Digital Forensics Test Yourself
Digital Intellectual Property List of Further Readings
Liability of online platforms
67
PP-AIDA&CS Cyber Threats and Cyber Laws
Regulatory Framework
l Information Technology Act, 2000
l Overview of IT Act, 2000
l The important provisions of IT Act, 2000
l Positive and negative aspects of IT Act, 2000
l Information Technology Rules (IT Rules), 2011
l Companies Act, 2013
l Indian Penal Code, 1860
INTRODUCTION
It was around 900 BC, when for the first time, postal service was introduced in China for governmental use
and in 14 BC, the Romans established their ‘Postal Services’ as means of communication.1 Since that time,
information has continued to be transferred and conveyed through traditional means of communication like
postal communication, telephone and fax etc. The development of electronic computers with the support of
internet in 1950 has elevated the process of transfer of information from one end to the other. The beginning of
point-to-point communication2; development of Telnet in 1960s and 1970s; the release of governmental control
over internet by America in 1994 and the birth of ‘www’ i.e. the World Wide Web in 1994 has globally changed
the entire process of transferring, sharing and relocating the information.3 The shift from traditional modes
of information to information technology, i.e. a term used to denote the use of technology to communicate,
transfer data and process information, has been swift owing to digitalization, which has led to emergence of
unprecedented growth of data.
Such developments in the field of information technology have gone a long way towards enhancing the ability
of individuals to transfer information liberally and without bottlenecks such as time consumption, congestion
of roots, non-connectivity etc., from which postal communication, telecommunication, fax and other modes of
communication often suffered. Additionally, information technology has ensured instant access and relocation
of information while avoiding the limits and fetters encountered in the traditional means of communication.
Advent of information technology has not only provided us the assorted means of communicating our information
at an inclusive platform but it has also ensured quick communication of information. Information technology can
be described as any technology that helps us to produce, manipulate, store, communicate, and/or disseminate
information. Usually ‘Information’ refers to data that has been organized and then communicated.4 In general
terms, information technology is a broad term used to refer to any form of technology used to create, transfer,
or store information in all of its various forms, be it text, images, sound, multimedia files.5
In the system of information and communication technology, it is the use of internet6 that serves the major
function of conveying information at global level. Internet is said to be one of the greatest developments in the
province of information and communication advancement. Internet7 as a backbone of information technology has
68
Cyber Threats and Cyber Laws LESSON 3
touched almost every aspect of life including telecommunication, finance, governance, health care, education
etc.8 at a global platform. India is not an exception to the revolutionary effects of internet and information
technology; as per Internet World Statistics, India alone has an internet user base of over 100 million.9 Internet
has not only facilitated the easy exchange and management of information but also proved a far easier medium
of transferring data on a global platform just in blink of an eye. In this way, information technology has brought
revolutionary changes in the approach of social interactions among people, business world, government
agencies, regulatory perspective and control mechanism to an entirely new synchronization.
Information technology has served various advantages to human kind10 in the form of (i.) speedy social interaction;11
(ii.) growth of business; (iii.) enhancing the educational capacity of youth12 etc. Additionally, advantages of
information and communication technology can also be seen in terms of email (an essential communication
tool for individuals as well as for businesses), availability of information and resources (availability of huge
amount of information about every subject like law, government services etc.), services (like banking, insurance
etc.), e-commerce (sale and purchase over internet), software downloads etc., which provide ease to the human
community in almost all spheres of life.
Pros: Cons:
However, it has been righty said that ‘with boon goes the bane’, and this phrase is also true for information
technology. At one side, this easy medium of transferring data and facilitating quicker flow of communication
has given birth to numerous modes of communication and transaction; on the other side, various dark sides are
being observed under IT enabled and electronic transactions. The major threats among them are Cyber Crimes
and Cyber Attacks. Hence, in order to control the mechanism of cyber-crimes and cyber-attacks, cyber law has
evolved gradually which ensures cyber security in cyber sphere. Hence this chapter inter-alia aims to provide
understanding on the following:
8. Shyam, R. and Bhoria, A., Information Technology (Internet): Effects on Social Participation and Well-Being of Users, Journal of Indian
Academy of Applied Psychology, Vol. 37, No.1, 157-162 (2011).
9. Internet Usage Stats and Telecommunications Market Report. (Mar. 27, 2012), http://www.internetworldstats.com/asia/in.htm.
10. Scott et al., Internet Benefits: Consumer Surplus and Net Neutrality, Institute of Policy Integrity, New York University School of Law, (2011).
(Jan.7, 2013), http://policyintegrity.org/files/publications/Internet_Benefits.pdf; See also, Gary James on Advantages and Disadvantages of
Online Learning. (Jan. 7, 2013), http://www.leerbeleving.nl/wbts/nieuw_basics/addis.pdf.
11. Through internet, communication is faster and easier in comparison to the traditional means of communication, so people on opposite
sides of the world can speak to each other over the internet as if they were speaking in person. Apart from this the internet boosts the spread
of culture, since all type of communications are made possible through internet.
12. Latchman et al., Information Technology Enhanced Learning in Distance and Conventional Education, IEEE Transactions on Education,
Vol. 42, No. 4 (1999).
69
PP-AIDA&CS Cyber Threats and Cyber Laws
l Cyber Threats;
l Cyber Warfare;
l Cyber Crimes;
l Cyber Terrorism;
l Cyber Security;
l Cyber Laws;
l AI vis-à-vis Data Protection; and
l Other inter-related concepts.
Source: Remya Ravindran
CYBER THREATS
Cyber security is a serious concern of present times as cyber threats and attacks are overgrowing. Attackers
are now using more sophisticated techniques to target the network and security systems. Individuals, small-
scale businesses or large organizations, are all being impacted. Therefore, all of these firms, whether IT or
non-IT firms, have understood the importance of Cyber Security and focus on adopting all possible measures
to deal with cyber threats.
CYBER WARFARE
As per Britannica Dictionary, Cyberwar (also called cyberwarfare or cyber warfare) is defined as a war conducted
in and from computers and the networks connecting them, waged by states or their proxies against other states.
Cyberwar is usually a war waged against government and military networks in order to disrupt, destroy, or deny
their use of systems to disrupt operations, particularly for tactical, military and cyberespionage reasons.
70
Cyber Threats and Cyber Laws LESSON 3
CYBER CRIME13
With the help of Information and Communication Technology (ICT), people are more interconnected than ever
before. Though the dependability on ICT is full of advantages, yet connectivity leaves us vulnerable to the
risks of fraud, theft, abuse including cyber-attack. Cyber-crime is any criminal activity that involves a computer,
networked device or a network. In general, most cybercrimes are carried out in order to generate profit for the
cybercriminals, yet some of cybercrimes are carried out against computers or devices directly to damage or
disable them. It can be briefly state that the spectrum of cyber threats is limitless and cyberattacks can come in
the form of viruses, malware, email phishing, social media fraud and alike. Cybercrime can have wide-ranging
impacts, at the individual, local, state, and national levels. A brief description of the impact of cyber-crime is as
below:
l Organized cybercrime, state-sponsored hackers, and cyber espionage (a type of cyber-attack in which
an unauthorized user attempts to access sensitive data or intellectual property for economic gains,
competitive advantage or political reasons) can pose national security risks to our country and our
critical infrastructure.
l Transportation, power, and other services may be disrupted by large scale cyber incidents. The extent
of the disruption is highly uncertain as it will be determined by many unknown factors such as the target
and size of the incident.
l Vulnerability to data breach and loss increases if an organization’s network is compromised. Information
about a company, its employees, and its customers can be at risk.
l Individually-owned devices such as computers, tablets, mobile phones, and gaming systems that
connect to the Internet are vulnerable to intrusion. Personal information may be at risk without proper
security.
CYBER TERRORISM
Cyber terrorism is the convergence of terrorism and cyberspace. The term ‘cyber terrorism’ was first coined
by Banny C. Collin of the Institute for Security and Intelligence (ISI) in the late 1980s. But its usage was better
understood during the 9/11 attacks that took place in the United States of America. In general, it is difficult to
define cyber terrorism. Yet, U.S. Federal Bureau of Investigation has defined cyber terrorism as a premeditated
attack against a computer system, computer data, programs and other information with the sole aim of violence
13. Students to note that Cyber Crime is descriptively discussed in Chapter 4 of this Study Material. Hence under this sub-section, we are
only providing brief views on Cyber Crime.
71
PP-AIDA&CS Cyber Threats and Cyber Laws
against clandestine agents and subnational groups. The main aim behind cyberterrorism is to cause harm and
destruction. Hence, in brief cyber terrorism signifies use of the internet to carry out violent activities that result
in or threaten the loss of life or substantial physical injury to accomplish political or ideological advantages
through threat or intimidation.
14. Raman and Sharma (2019) Cyber Terrorism in India: A Physical Reality Orvirtual Myth, Indian Journal of Law and Human Behavior Volume
5 Number 2 (Special Issue), May - August 2019
15. Shiv Raman, Nidhi Sharma, “Cyber terrorism in India: A physical reality or virtual myth” 5 Indian Journal of Law and Human Behaviour
(2019), available at: https://journals.indexcopernicus.com/api/file/viewByFileld/783266.pdf .
72
Cyber Threats and Cyber Laws LESSON 3
73
PP-AIDA&CS Cyber Threats and Cyber Laws
Source: Medium.com
A cyber-attack is an exploitation of computer systems and networks. It uses malicious code to alter computer
code, logic or data and lead to cybercrimes, such as information and identity theft. Cyber-attacks can be
classified into the following categories:
1) Web-based attacks
2) System-based attacks.
Web-Based Attacks
These are the attacks which occur on a website or web applications. Some of the important web-based attacks
are as follows
1. Injection attacks: It is the attack in which some data will be injected into a web application to manipulate
the application and fetch the required information. Example- SQL Injection, code Injection, log Injection,
XML Injection etc.
2. DNS Spoofing: DNS spoofing is a type of computer security hacking. Whereby data is introduced into a
DNS resolver’s cache causing the name server to return an incorrect IP address, diverting traffic to the
attackers’ computer or any other computer. The DNS spoofing attacks can go on for a long period of
time without being detected and can cause serious security issues.
3. Session Hijacking: It is a security attack on a user session over a protected network. Web applications
create cookies to store the state and user sessions. By stealing the cookies, an attacker can have
access to all of the user data.
4. Phishing: Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy
entity in electronic communication. For example: an email-borne attack that involves tricking the email
74
Cyber Threats and Cyber Laws LESSON 3
75
PP-AIDA&CS Cyber Threats and Cyber Laws
17. Ransomware: Ransomware is a type of malware that denies access to a computer system or data
until a ransom is paid. Ransomware is one of the most dangerous types of cyber security threats.
Some ransomware attack techniques involve stealing sensitive information before the target system is
encrypted. Such added processes could classify some ransomware attacks as data breaches.
Source: https://www.upguard.com/blog/cyber-threat
18. Attacks on IoT Devices: IoT devices like industrial sensors are vulnerable to multiple types of
cyber threats. These include hackers taking over the device to make it part of a DDoS attack and
unauthorized access to data being collected by the device. Given their numbers, geographic
distribution, and frequently out-of-date operating systems, IoT devices are a prime target for malicious
attacks.
Note:
IoT is an umbrella term that refers to the billions of physical objects or things connected to the
Internet, all of which collect and exchange data with other devices and systems over the internet.
IoT Devices are hardware devices such as sensors, gadgets, appliances and other devices/machines
that collect and exchange data over the internet.
19. Data Breaches: A data breach is a theft of data by a malicious attacker. Motives for data breaches
include crime (i.e., identity theft), a desire to embarrass an institution (e.g., Edward Snowden or the DNC
hack), and espionage.
20. Data Manipulation: Data manipulation is a form of cyber-attack that doesn’t steal data but aims to
change the data to make it harder for an organization to operate.
76
Cyber Threats and Cyber Laws LESSON 3
21. Data Destruction: Data destruction is when a cyber attacker attempts to delete data.
23. Rogue Software: Rogue software is malware that is disguised as real software.
24. Unpatched Software: Unpatched software is software that has a known security weakness that has
been fixed in a later release but not yet updated.
System-Based Attacks
These are the attacks which are intended to compromise a computer or a computer network.
1. Virus: It is a type of malicious software program that spreads throughout the computer files without
the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting
copies of itself into other computer programs when executed. It can also execute instructions that cause
harm to the system.
2. Worm: It is a type of malware whose primary function is to replicate itself to spread to uninfected
computers. It works in the same manner as a computer virus. Worms often originate from email
attachments that appear to be from trusted senders.
3. Trojan horse: It is a malicious program that makes unexpected changes to computer settings and
unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears
to be a normal application but when opened/executed some malicious code will run in the background.
4. Backdoors: It is a method that bypasses the normal authentication process. A developer may create
a backdoor so that an application or operating system can be accessed for troubleshooting or other
purposes.
5. Bots: A bot (short for “robot”) is an automated process that interacts with other network services. Some
bots program run automatically, while others only execute commands when they receive specific input.
Common examples of bots program are the crawler, chatroom bots, and malicious bots.
6. Zero-Day Exploits: A zero-day exploit is a flaw in software, hardware or firmware that is unknown to the
party or parties responsible for patching the flaw.
7. Advanced Persistent Threats: advanced persistent threat is when an unauthorized user gains access
to a system or network and remains there without being detected for an extended period of time.
8. Data Centre Disrupted by Natural Disaster: The data center your software is housed in could be
disrupted by a natural disaster like flooding.
9. Drive-by Downloads: A drive-by download attack is a download that happens without a person’s
knowledge often installing a computer virus, spyware, or malware into the system.
10. Intellectual Property Theft: Intellectual property theft is stealing or using someone else’s intellectual
property without permission.
11. Supply Chain Attacks: A supply chain attack is when a cybercriminal hacks an organization by
compromising a third-party vendor in its supply chain.
77
PP-AIDA&CS Cyber Threats and Cyber Laws
Source: ncsc.org
Ransomware Attacks
Ransomware attacks are one of the most frightening cyber threats. During these attacks, a victim’s sensitive
data is encrypted and only decrypted if a ransom price is paid. Victims only become aware that they’ve
been compromised when they are presented with a formidable message announcing the successful attack.
Sometimes these messages are falsely attributed to law enforcement agencies.
16. For more details, kindly read Tunggal Abi Tyas (2022) Cybersecurity: What is a Cyber Threat, UpGuard.
78
Cyber Threats and Cyber Laws LESSON 3
Source: nytimes.com.
Insider Threats
Insider threats includes the security threats and attacks made by the insiders like employers, outsourcing
vendors and alike. Unlike phishing attacks, this type of security-bypassing cyber threat cannot be mitigated
with a control strategy.
Polyglot Files
Polyglot are files that can have multiple file type identities. Polyglot files as such are not hostile by nature.
Cybercriminals package malicious code into polyglot files to bypass file-type security controls.
79
PP-AIDA&CS Cyber Threats and Cyber Laws
Social Engineering
Social engineering, in the context of cyber threats, is an effort to obtain login credentials through manipulation
and trickery. Phishing campaigns are the usual attack vectors of social engineering, but these cyber threats can
also be presented in person. For example, threat actors posing as IT professionals asking for your password.
Phishing
Phishing attacks are a subcategory of social engineering, the differentiator is that they most commonly deployed
via email, whereas a social engineering attack could occur through a telephone conversation.
According to the 2022 cost of a data breach report by IBM18 and the Ponemon Institute, in 2022, Phishing was
the second most expensive data breach attack vector, averaging US$ 4.91 million per breach, increasing from
US$ 4.65 million in 2021.
Malvertising
The year 2022 has seen an increase in the instances of Malvertising. An example of a malvertising attack is the
Latin American banking trojan known as MIspadu. The trojan was embedded in a Facebook ad campaign for
McDonald’s coupons. When users interacted with the ad, a zip file containing the bank credential-stealing trojan
was downloaded and installed on their system.
Zero-Day Exploits
A zero-day exploit is a software vulnerability or flaw that is discovered and exploited by hackers before it is
known to software creators or sellers. The term “zero-day” refers to the fact that programmers have no time to
address or patch the issue given that they too only recently noticed it.
Zero-day exploits are security vulnerabilities that are exploited by cybercriminals before a patch is released for
them. These exposures are usually associated with ubiquitous software providers. A recent example is a zero-
day exploit impacting Microsoft Exchange servers.
80
Cyber Threats and Cyber Laws LESSON 3
Note: Machine Learning is a growing technology which enables computers to learn automatically
from past data.
l Tactics, Techniques, and Procedures (TTP) Investigation: Hunting for attack mannerisms typically use
the same operational techniques. This is helpful to source or attribute the threat and to leverage
existing remediation methods that worked with these behaviors. Tactics, Techniques, and Procedure
(TTP) investigation is an organised method of evaluating and comprehending the techniques and
procedures employed attackers or adversaries in executing cyber attacks or harmful actions. It entails
examining their approaches (overall strategy or plan), techniques (particular methods or instruments
employed), and procedures (step-by-step processes or activities conducted) in order to acquire
knowledge about their motivations, abilities, and potential effect.
81
PP-AIDA&CS Cyber Threats and Cyber Laws
Hunting Steps
A cyber threat hunt is composed of steps or processes designed for an efficient, successful hunt. These steps
include:
Step 1: Hypothesis
Threat hunts begin with a hypothesis or a statement about the hunter’s ideas of what threats might be in
the environment and how to go about finding them. A hypothesis can include a suspected attacker’s tactics,
techniques, and procedures (TTPs). Threat hunters use threat intelligence, environmental knowledge, and their
own experience and creativity to build a logical path to detection.
Step 2: Collect and Process Intelligence and Data
Hunting for threats requires quality intelligence and data. A plan for collecting, centralizing, and processing
data is required.
Step 3: Trigger
A hypothesis can act as a trigger when advanced detection tools point threat hunters to initiate an investigation
of a particular system or specific area of a network.
82
Cyber Threats and Cyber Laws LESSON 3
Step 4: Investigation
Investigative technology aids in the detection of anomalies in a system or network. It digs deep to find any
unexpected activity that might be hazardous. It determines if these discoveries are harmless or actually
malicious. So, it’s like a tool that examines and distinguishes the harmless stuff from the harmful one.
Step 5: Response/Resolution
Data gathered from confirmed malicious activity can be entered into automated security technology to respond,
resolve, and mitigate threats. Actions taken can include getting rid of harmful files, bringing back changed or
deleted files to their original condition, updating rules for firewalls or intrusion prevention systems, installing
security updates, and adjusting system settings. Throughout this process, there is also a focus on learning from
the incident to enhance security and be better prepared against similar attacks in the future.
DIGITAL FORENSICS20
Digital forensic science is a branch of forensic science that focuses on the recovery and investigation of material
found in digital devices related to cybercrime. The term digital forensics was first used as a synonym for
computer forensics. From legal perspective, digital forensics is the process of identifying, preserving, analysing,
and documenting digital evidence. This is done in order to present evidence in a court of law when required.21
As per Techopedia - “Digital forensics is the process of uncovering and interpreting electronic data. The goal of
the process is to preserve any evidence in its most original form while performing a structured investigation by
collecting, identifying, and validating the digital information to reconstruct past events. The context is most often
for the usage of data in a court of law, though digital forensics can be used in other instances.”
Steps of Digital Forensics
In order for digital evidence to be accepted in a court of law, it must be handled in a very specific way so that
there is no opportunity for cyber criminals to tamper with the evidence.
Preservation - Next, isolate, secure, and preserve the data. This includes
preventing people from possibly tampering with the evidence.
Steps of Digital Analysis - Next, reconstruct fragments of data and draw conclusions based
Forensics on the evidence found.
83
PP-AIDA&CS Cyber Threats and Cyber Laws
patent any technology or design; (iv) all registrations of and applications to register copyrights; and (v) computer
software, including systems, applications, program listings, manuals and documentation (whether owned by
Digital Electronics or licensed by Digital Electronics from third parties).
In simple words, Digital Intellectual Property (Digital IP) is intellectual property in digital format. Throughout the
globe, the businesses and the individual stores, create, or otherwise handle some sort of digitalized information.
Though protecting digital intellectual property encourages increased levels of innovation and creativity,
resulting in the acceleration of progress, yet reality of digital information poses problems surrounding the use
and re-use of information, and the rights and responsibilities of rights holders and consumers under existing
laws.
While Digital IP encourages innovation, creativity, and economic growth, protecting it poses a challenging task,
and is difficult for a number of reasons. Digital products are not tangible, and can be reproduced at a very low
cost with the potential for immediate delivery via the Internet across virtually unlimited geographic markets.
There are many stakeholders that can represent a broad range of legitimate concerns. Hence, it is important to
understand what are different concerns for protecting Digital IP and the strategies to protect digital IP.
Ways for Protection of Digital / Intellectual Property:22
Digital Rights Management (DRM) technologies (also known as Electronic Rights Management Systems) ensure
copyright through identifying and protecting the content, controlling access of the work, protecting the integrity
of the work and ensuring payment for the access. DRM technologies prevent illegal users from accessing the
content. User ID and password are used to protect access, along with licensing agreements. Another way to
protect digital content is through Technical Protection Measures (TPM). These technologies allow publishing
companies in securing and protecting content such as music, text and video from unauthorized use. If an author
wishes to collect fee for use of his or her work, then DRM technology can be used.
The TPM and DRM technologies are increasingly employed to sell and distribute content over the Internet.
1. Cryptography: Cryptography is the oldest mechanism employed to ensure security and privacy of
information over networks.. This process involves encrypting or scrambling the information to make it
unreadable or in a language that is difficult to understand. Only the authorized user has the ability to
decrypt or unscramble it. However, cryptography protects the work during transmission or distribution
only. After the work is decrypted, it loses its protective measures.
2. Digital Watermark Technology: A digital watermark is a digital signal or pattern inserted into a digital
document. It is similar to the electronic on-screen logo used by TV channels. A unique identifier is used
to identify the work. The message might contain information regarding ownership, sender, recipient etc.
or information about copyright permission. The system consists of a watermark generator, embedder
and a watermark detector decoder. The legal user can remove these watermarks with a predetermined
algorithm. The watermarking technology is extensively used in protecting multimedia works.
3. Digital Signature Technology: Digital signature includes identity of the sender and/or receiver date,
time, any unique code etc. This information can be added to digital products. This digitally marks and
binds a software product for transferring to a specified customer. Digitally signed fingerprints guarantee
document authenticity and prevent illegal copying.
4. Electronic Marking: In this technique, the system automatically generates a unique mark that is tagged
to each of the document copies. This technique is used to protect copyright as well as in electronic
publishing where documents are printed, copied or faxed.
84
Cyber Threats and Cyber Laws LESSON 3
5. Security Features of Operating System: For protection of files, data etc. the operating system of
computer such as Windows 2000 Professional, Windows 2000 Server, MS-SQL Server has some unique
special security and integrity features.
“Intermediary liability, which is based on the legal principle of vicarious liability, means that the service
providers shall be held accountable for any illegal act of the user on their platform. As Rebecca MacKinnon
has said, “Intermediary liability means that the intermediary, a service that acts as ‘intermediate’ conduit for
the transmission or publication of information, is held liable or legally responsible for everything its users
do.”
But in the recent times, considering the abuse of online platforms, it is demanded time and again to create an
efficient regulatory regime for all the intermediaries including online platforms.23
23. Sur Aihik (August 12, 2022): India needs legislation to hold platform liable for online harms: IT for change. Available at https://www.
moneycontrol.com/news/business/india-needs-legislation-to-hold-platforms-liable-for-online-harms-it-for-change-9018861.html
24. Available at https://s3.amazonaws.com/documents.lexology.com/8db09138-482a-4951-b255-6513ca1eaad3.
pdf?AWSAccessKeyId=AKIAVYILUYJ754JTDY6T&Expires=1675854906&Signature=tF9cQSg9FZoCzslcQj%2Ft%2BvoDPtA%3D
85
PP-AIDA&CS Cyber Threats and Cyber Laws
Avnish Bajaj vs. State25 and the Amendment to the IT Act 2008
In this case, the Managing Director (and not the company Baazee.com) was charged with criminal provisions
under the Indian Penal Code, 1860 (Hereinafter referred to as ‘IPC’) as well as the Information Technology Act,
2000 (Hereinafter referred to as ‘IT Act’), for content circulated by a third party on its ecommerce platform.
However, the Managing Director escaped liability since the company was not added as an accused either
before the High Court or before the Supreme Court. Further, the Delhi High Court also observed that companies
bear the risk of acquiring knowledge if the content uploaded escapes the filters which are meant for blocking
pornographic content.
In this case, it was also observed that there was a requirement for widening the scope of protection given to
intermediaries, and thus, the IT Act was amended in 2008 to include a safe harbour regime under Section 79
of the IT Act and to amend the definition of intermediaries (as it reads presently). Section 79 of the Information
Technology Act 200026 introduced the ‘safe harbour’ immunity clause that protected an intermediary from
being held liable for third-party content on its platform and affords broad-ranging legal immunity – provided
the intermediary observed ‘due diligence’ and followed certain ‘guidelines’ as prescribed by the Central
Government. Only if due diligence laid down by the government is not followed by the intermediary, it
86
Cyber Threats and Cyber Laws LESSON 3
would be made liable for a third party’s actions, even if the same were done without the knowledge of the
intermediary.
The Information Technology (Intermediaries Guidelines) Rules, 2011 (“Intermediary Guidelines”) (2011)27
After the amendment to the IT Act in 2008, the Government of India introduced the Intermediary Guidelines,
which were mandatory for all intermediaries to follow for claiming safe harbour protection. These are to be read
in consonance with the IT Act and the due diligence requirements that must be observed by intermediaries,
provided under Rule 3, are:
l Intermediaries to publish rules and regulations, privacy policy and user agreement;
l Rules and regulations, terms and conditions or user agreement shall specify all prohibited acts,
i.e. belonging to other persons, grossly harmful, harassing or unlawful, harms minors, infringes any
intellectual property rights, violates any law, is deceiving or misleading, impersonates any person,
contains virus, threatens India etc. and the intermediary should inform users that violation of same shall
lead to termination of access,
l Intermediaries to not knowingly host or publish information as specified in sub-rule (2),
l Intermediaries to disable such information within 36 hours and storage of same for 90 days for
investigation purposes,
l Intermediaries to provide assistance to authorised government agencies,
l Intermediaries to take all reasonable measures to secure its computer resource,
l Intermediaries to report cyber security incidents to the Indian Computer Emergency Response Team
and
l Intermediaries to appointment and publish the details of a Grievance Officer on its website.
However, the IT Act and the Intermediary Guidelines were inundated by various issues such as ambiguity in
prohibited content and forced decision by intermediaries. Further, any person could request the intermediaries to
take down the unlawful content. However, these issues were mostly resolved in the Shreya Singhal judgement.
Shreya Singhal vs. Union of India (2015)28
In 2015, in the landmark Shreya Singhal judgement, the Supreme Court for the first time recognized the Indian
citizen’s free speech rights over the Internet by striking down and declaring unconstitutional the draconian
Section 66A of the IT Act, which provided for punishment for sending offensive messages through communication
services.
Further, regarding intermediary liability, the Court held that “Section 79 is valid subject to Section 79(3)(b)
being read down to mean that an intermediary upon receiving actual knowledge from a court order or on being
notified by the appropriate government or its agency that unlawful acts relatable to Article 19(2) are going to
be committed then fails to expeditiously remove or disable access to such material…. Similarly, the Information
Technology Intermediary Guidelines Rules, 2011 are valid subject to Rule 3 sub-rule (4) being read down in the
same manner as indicated in the judgment.”
The Court also observed that “it would be very difficult for intermediaries like Google, Facebook etc. to act when
millions of requests are made and the intermediary is then to judge as to which of such requests are legitimate
and which are not.” Subsequently, in the case of Kamlesh Vaswani v Union of India (Writ Petition (Civil) No.
177 of 2013), the Supreme Court issued directions to intermediaries to disable specific content where website
operating child pornography was sought to be restricted.
87
PP-AIDA&CS Cyber Threats and Cyber Laws
29. My Space Inc. vs Super Cassettes Industries Ltd., [236 (2017) DLT 478]
30. Kent Ro Systems Ltd & Anr vs Amit Kotak & Ors, [2017 (69) PTC 551 (Del)].
31. Lifestyle Equities C.V. and Ors v Amazon Sellers Service Private Limited & Anr., [CS (COMM) 1015/2018].
32. Christian Louboutin SAS vs. Nakul Bajaj & Ors, [2018(76) PTC 508(Del)]
33. https://www.meity.gov.in/writereaddata/files/Draft_Intermediary_%20Amendment_24122018.pdf
88
Cyber Threats and Cyber Laws LESSON 3
the originator of the information for assistance to law enforcement, proactive monitoring of content uploaded
on its platform by deploying automated tools, takedown of illegal content within 24 hours, and mandatory
incorporation of companies having more than 5 million users in India.
M/S Luxottica Group S.P.A & Another vs. M/S Mify Solutions Pvt Ltd & Ors (2019)34
The Plaintiff filed a trademark infringement suit alleging that the Defendant sells counterfeit products of the
Plaintiff’s brand ‘OAKLEY’. The Court held that the due diligence and care required under the IT Act had not
been met and the Defendant was guilty of trademark and copyright infringement. The Court herein applied
the tests laid down in the Christian Louboutin case to determine whether the ecommerce platforms claiming to
be exempted under Section 79 of the IT Act actually qualify as intermediaries or not. The Court observed that
presence of any element which shows active participation could deprive intermediaries of the immunities and
factors such as allowing storing of counterfeit goods, using the mark in an invoice, advertising the mark etc.,
would determine whether the entity in question is an intermediary or not.
Amway India Enterprises Pvt Ltd vs. 1Mg Technologies Pvt Ltd & Another (2019)35
One of the main issues in this case was the conflict between Direct Selling Business and ecommerce platforms
and whether the intermediary had stepped into the shoes of the seller by setting its own retail prices, discounts,
return/refunds policies etc. Thus, the issue was whether the intermediary had violated the Direct Selling
Guidelines issued by the Government, which were binding on the Plaintiff. In this regard, the Single Judge held
that the Direct Selling Guidelines were binding on ecommerce platforms and the sellers on such platforms.
However, the Division Bench held that such guidelines are advisory in nature and are not law and thus, not
enforceable.
Further, the Court also gave a detailed reasoning as to why major ecommerce giants are actively involved
and thus, do not qualify as intermediaries entitled to protection under the ‘safe harbour’ provided in Section 79
of the IT Act. It was held that any non-compliance of the due diligence requirements as per the Intermediary
Guidelines and failure to adhere to their own policies would make the ecommerce platforms liable. The Division
Bench also observed that the value-added services provided by the Defendant as online market places, do not
dilute the safe harbour granted to them under Section 79 of the IT Act.
Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 202136
The Intermediary Guidelines Rules, 2011 were replaced by the Information Technology (IT) Rules, 2021, which
were formulated by the Union Government in accordance with Section 87(2) of the IT Act, 2000. As per the said
rules, large digital platforms with more than 5 million users would be required to publish periodic compliance
reports each month. The Rules prescribe a framework for the regulation of online content in terms of current
affairs, news, and audio-visual content. In India, all intermediaries, including OTT platforms and digital portals,
must offer a grievance redressal process to address user complaints. These rules aim to empower netizens
for the timely resolution of their grievances with a mechanism for redressal and assistance of a Grievance
Redressal Officer (GRO) residing in India.
The IT (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021, Rule 4(1)(d), mandate that social
media outlets post monthly compliance reports that include the following information:
l Information about complaints filed and measures undertaken in response, and
l The number of particular communication links or informational components that the social media
platform has blocked or erased as part of proactive monitoring.
34. Luxottica Group SPA and Ors v Mify Solutions Pvt Ltd and Ors, [2019(77) PTC 139(Del)]
35. Amway India Enterprises Pvt Ltd v 1Mg Technologies Pvt Ltd & Anr., [CS (OS) 410/2018, CS (OS) 453/2018, CS (OS) 480/2018, CS (OS)
531/2018, CS(OS) 550/2018, CS (OS) 75/2019 and CS (OS) 91/2019]
36. Source: Liability of online marketplaces in India (2021) iPleders.
89
PP-AIDA&CS Cyber Threats and Cyber Laws
90
Cyber Threats and Cyber Laws LESSON 3
Chief Metropolitan Magistrate. The magistrate ordered him to undergo a rigorous year of imprisonment with a
fine of Rs. 5,000 under Sections 420 of IPC and 66 of the IT Act.
l Section 66B: This section describes the penalties for fraudulently receiving stolen communication
devices or computers, and prescribes a possible three-year prison sentence. Depending on the severity,
a fine of up to Rs. 1 lakh may also be imposed upon the accused.
l Section 66C: The focus of this section is to prohibit identity theft, by penalising the act of fraudulently
and dishonestly using the electronic signature, password or any other unique identification feature of
any person. This section imposes imprisonment up to 3 years along with fine upto one lakh rupees.
l Section 66D: This section penalises cheating by personation using computer resources. Punishment if
found guilty can be imprisonment of up to three years and/or up-to Rs. 1 lakh fine.
l Section 66E: Taking pictures of private area of any person, publishing or transmitting them without a
person’s consent is punishable under this section. Penalties, if found guilty, can be imprisonment of up
to three years and/or up-to Rs. 2 lakh fine.
l Section 66F: This section prescribes punishment for the offence of cyber terrorism. An individual
convicted of a crime can face imprisonment of up to life. An example: When a threat email was sent to
the Bombay Stock Exchange and the National Stock Exchange, which challenged the security forces
to prevent a terror attack planned on these institutions. The criminal was apprehended and charged
under Section 66F of the IT Act.
l Section 67: This section punishes the act of publishing or transmitting obscene material in electronic
form. If convicted, the prison term is up to five years and the fine is up to Rs. 10 lakh.
Positive and negative aspects of IT Act, 2000
This legislation confers the following benefits:
l Until recently, the development of electronic commerce in our country was hindered primarily due to
a lack of legal infrastructure to govern commercial transactions online. Due to the enactment of this
legislation, several companies are now able to conduct e-commerce activities without any fear.
l Digital signatures are officially recognized and sanctioned by the Act. Therefore, corporations and
organizations are now able to use digital signatures to conduct online transactions.
l Additionally, the Act also paves the way for corporate entities to also act as Certification Authorities
for the issuance of Digital Signature Certificates under the Act. There are no distinctions in the Act as
to what legal entity may be designated as a Certifying Authority, provided the government’s standards
are followed.
l Furthermore, the Act permits the companies to electronically file any of their documents with any office,
authority, body or agency owned or controlled by the appropriate government by using the electronic
form prescribed by the concerned government.
l The use of electronic records and digital signatures in government and its agencies has been approved
as a policy matter within the meaning of the IT Act. A digital signature is a mechanical scheme for
demonstrating the authenticity of a digital message or document. A valid digital signature enables
the recipient to believe that the message was created by a known sender and has not been altered
in transit, i.e., the message is tamper-proof. The Government has thus started using digital signatures
across all platforms such as granting of licenses, permits, filing of applications, payment of charges and
other financial transactions through electronic means.
91
PP-AIDA&CS Cyber Threats and Cyber Laws
l Hacking is a common threat faced by most companies nowadays. However, the IT Act changed the
landscape completely. A statutory remedy is now provided to corporate entities in case anyone
attempts to breaches their computer systems or network and damages or copies data. Damages can
be claimed from anyone who uses a computer, computer system or computer network without the
permission of the owner or other person in charge of the computer/system or network.
However, the said Act has a few drawbacks:
l Section 66A is considered to be in accordance with Article 19(2) of the Constitution of India since it does
not define the terms ‘offensive’ and ‘menacing’. It did not specify whether or not these terms involved
defamation, public order, incitement or morality. As such, these terms are open to interpretation.
Note: Article 19(2) of the Constitution curtails the freedom of speech and expression to some extent
by enabling the State to impose restrictions in the interests of security and sovereignty of India,
friendly relations with foreign states, public order, decency or morality, among other things.
l Considering how vulnerable the internet is, the Act has not addressed adequately issues such as
privacy and content regulation, which are essential.
l A domain name is not included in the scope of the Act. The law does not include any definition of
domain names, nor does it state what the rights and liabilities of domain name owners are.
l The Act doesn’t make any provision for the intellectual property rights of domain name proprietors. In
the said law, important issues pertaining to copyright, trademark, and patent have not been addressed,
therefore creating many loopholes.
92
Cyber Threats and Cyber Laws LESSON 3
l Another requirement under Rule 12 is that service providers, intermediaries, data centres, and corporate
bodies inform CERT-In within a reasonable timeframe of cybersecurity incidents. As a result of the Cert-In
website, Cybersecurity Incidents can be reported in various formats and methods, as well as information
on vulnerability reporting, and incident response procedures. In addition to reporting cybersecurity
incidents to CERT-In in accordance with its rules, Rule 3(1)(I) of the Information Technology (Guidelines
for Intermediaries and Digital Media Ethics Code) Rules, 2021 also requires that all intermediaries shall
disclose information about cybersecurity incidents to CERT-In.
93
PP-AIDA&CS Cyber Threats and Cyber Laws
In the case of Kalandi Charan Lenka vs. the State of Odisha (2017) before the Orissa High Court, the victim
received a series of obscene messages from an unknown number. The accused also sent emails to the victim
and created a fake account on Facebook containing morphed and offensive images of her. The Orissa High
Court, therefore, found the accused prima facie guilty of cyberstalking on various charges under the IT Act and
Section 354D of IPC.
l Section 379: Under this section, the offence of theft entails punishment, i.e. imprisonment for up to
three years in addition to the fine. This section may come into play in part because many cyber-crimes
involve stolen electronic devices like computers, laptops and mobile phones.
l Section 420: This section talks about cheating and dishonestly inducing delivery of property. Seven-
year imprisonment in addition to a fine is imposed under this section which may come into play when
cybercriminals commit illegal acts like creating fake websites and cyber frauds.
l Section 463: This section involves falsifying documents or records electronically. Spoofing emails is
punishable by up to 7 years in prison and/or a fine under this section.
l Section 465: This provision typically deals with the punishment for forgery. Under this section, offences
such as the spoofing of email and the preparation of false documents in cyberspace maybe indirectly
covered and punished with imprisonment ranging up to two years, or fine or both. In Anil Kumar Srivastava
vs. Addl Director, MHFW (2005), the accused had forged the signature of the AD and then filed a case
that made false allegations against the AD. Since the accused attempted to pass the forged document
off as a genuine document, the Court held that the accused was liable under Sections 465 and 471 of
the IPC.
l Section 468: Fraud committed with the intention of cheating may result in a seven-year imprisonment
and a fine. Email spoofing may be covered within this section.
Furthermore, there are many more sections of the IT Act and the Indian Penal Code, which pertain to cyber-
crimes, in addition to the provisions listed above.
Even though there are laws against cyber-crime in place, the rate of cyber-crime is still rising drastically. It has
been reported that cyber-crime in India increased by 11.8% in the year 2020, which accounted for reporting
around only 50,000 cases. Cyber-crime is one of the toughest crimes for the Police to solve due to many
challenges they face including underreporting, the jurisdiction of crime, public unawareness and the increasing
costs of investigation due to technology.
Certain offences may end up being bailable under the IPC but not under the IT Act and vice versa or maybe
compoundable under the IPC but not under the IT Act and vice versa due to the overlap between the provisions
of the IPC and the IT Act. For example, if the conduct involves hacking or data theft, offences under sections 43
and 66 of the IT Act are bailable and compoundable, whereas offences under Section 378 of the IPC are not
bailable and offences under Section 425 of the IPC are not compoundable. Additionally, if the offence is the
receipt of stolen property, the offence under section 66B of the IT Act is bailable while the offence under Section
411 of the IPC is not. In the same manner, in respect of the offence of identity theft and cheating by personation,
the offences are compoundable and bailable under sections 66C and 66D of the IT Act, whereas the offences
under Sections 463, 465, and 468 of the IPC are not compoundable and the offences under sections 468 and
420 of the IPC are not bailable.
In Gagan Harsh Sharma vs. State of Maharashtra (2018), the Bombay High Court addressed the issue of non-
bailable and non-compoundable offences under sections 408 and 420 of the IPC in conflict with those under
Sections 43, 65, and 66 of the IT Act that are bailable and compoundable.
94
Cyber Threats and Cyber Laws LESSON 3
95
PP-AIDA&CS Cyber Threats and Cyber Laws
l AI is often misunderstood for machine learning. AI is a broader concept with a bunch of technologies
that include machine learning and other technologies like natural language processing, inference
algorithms, neutron networks etc.
Evolution
l In the year 1956, American computer scientist John McCarthy organised the Dartmouth Conference, at
which the term ‘Artificial Intelligence’ was first adopted. From then on, the world discovered the ideas of
the ability of machines to look at social problems using knowledge data and competition.
l There used to be several dedicated projects on the same and the government was funding the research.
l Every aspect of science and especially when one starts looking at empowering machines to behave
and act like human beings, the questions of ethics arise. About 70’s and late 80’s, there was a time
when the governments stopped funding research into AI.
l AI experienced a resurgence following concurrent advances in computer power and large amounts of
data and theoretical understanding in the 21st century.
l AI techniques now have become an essential part of the technology industry helping to solve many
challenging problems in computer-science. From Apple SIRI to self-driving cars, AI is progressing rapidly.
AI Methods
Source: https://www.drishtiias.com/
India and AI
l According to the Global AI Report 2019 (i.e. a Canada based company’s report), India stood at the ninth
position in terms of the number of the AI specialists working in the field, while the US, China and the UK
topped the list.
96
Cyber Threats and Cyber Laws LESSON 3
l The top ranked countries in this Report have many academic institutes with programs on AI. They have
therefore a much greater number of people skilled to do research in the field.
l India, on the contrary, lacks the opportunities in formal education in data science but is slowly trying to
encourage the adoption of AI in educational institutes.
l Starting this year, the CBSE has AI as an elective subject for its ninth grade classes.
l The International Institute of Information Technology, Hyderabad (for brevity, ‘IIT Hyderabad’) has
launched a full-fledged Bachelor of Technology (B Tech) program in AI becoming the first Indian
educational institution to do so. It is also most likely the third educational institute in the world after
Carnegie Mellon University and the Massachusetts Institute of Technology to have a full-fledged B Tech
program on AI.
l IIIT Hyderabad is another educational institute that introduced popular executive programs on AI and
machine learning and blockchain and distributed ledger technologies.
l Defence forces of India are now venturing into the products and technologies which will aid defence
measures using the AI and technologies.
l In India, corporates have started collaborating with academia on AI. IBM’s Blue project is an example.
l There are many startups in the country which are doing great work in image analytics, data analytics,
predictive intelligence etc.
l It is estimated that AI will add 957 billion dollars to India’s GDP by the year 2035 boosting India’s
annual growth by 1.3% points.
Benefits
l In Policing: India still has a conventional policing. AI based products open a new window of opportunity
to do predictive policing in India. With the help of AI, one can predict the pattern of crime, analyze lot of
CCTV footage which are available across the country to identify suspects.
Note: Policing refers to maintenance of law and order by the police force in a country.
l Government is digitizing all the records, especially the crime records putting it into one single place
called CCTNS, i.e. Crime and Criminal Tracking Network & Systems, where all the data including the
image, biometrics, or the criminal history of a convict or suspect is available.
l In Agriculture: It has many uses, for example, it can help sense one how much water the crop needs.
l For solving complex issues like efficient utilization of available resources.
l Analyzing the Data: The AI technology helps in analyzing data and thus can improve the efficiency of
the systems like power management in cars, mobile devices, weather predictions, video and image
analysis.
97
PP-AIDA&CS Cyber Threats and Cyber Laws
l On 20th March, 2019, NITI Aayog circulated the cabinet note to establish a cloud computing platform
called AIRAWAT (Artificial Intelligence Research, Analytics and Knowledge Assimilation Platform).
l The note circulated by NITI Aayog proposes that the government should pump in Rs. 7,500 crore rupees
over 3 years as well as set up a high-level task force that will oversee the roll out and implementation
of AI.
l The move to create cloud computing platform is part of the government’s goal of making India a
pioneer amongst emerging economies with regards to AI and transform sectors like education, health,
agriculture, urbanization and mobility.
l In Budget 2018, the government announced funds to support the country’s AI, machine learning, robotics
and IoT sector.
l As part of the initiative, NITI Aayog in the year 2018, published a draft National Strategy for AI, planning
its scope for research, adoption and commercialization.
l It envisioned AI use case clearly in the sectors like healthcare, agriculture, education, smart cities and
infrastructure, smart mobility and transportation.
l The Ministry of Commerce and Industry has also set up task forces to explore the use of AI and Big Data
technologies in the country.
l In the Budget 2019-20, the government has announced setting up of a National Sports Education Board
under Khelo India to prepare youth for new age skills, Artificial Intelligence, IoT, Big Data, 3D Printing,
Virtual Reality etc.
98
Cyber Threats and Cyber Laws LESSON 3
B. A survey conducted by American Society of Newspaper Editors on privacy concerns (2000)39 showed
that 51% of respondents strongly felt that online companies might violate their personal privacy and
same study showed that 52% of the respondents were having ‘no confidence at all’ in the online
company that they use the personal information of their consumers exactly in the same way which they
had said they would.
C. Number of surveys conducted by Georgia Institute of Technology’s Graphic, Visualization, and Usability
(GVU) Center40 has discovered that a majority of individuals strongly insist upon and support anonymity
in electronic transactions.
D. Business Week/Harris Poll (2000)41 survey found that 89% of their respondents were not comfortable
with the online tracking system of online websites and prefer a restriction to be imposed on the web
tracking especially in the tracking of their personal information.
E. Pew Internet and American Life Project42 (2000) found in their studies that 54% of internet users were
objecting to online tracking and they were afraid of the creation of their profile in online transactions.
USA Weekend Poll (2000) also showed that 65% of respondents thought that tracking computer usage
and creation of users’ profile in internet was an invasion of privacy.
F. Pew Internet and American Life Project study showed that 56% of internet users are unaware and
unknown about installation and use of cookies and more sophisticated tracking tools, such as ‘web
bugs’ or ‘spyware’ by online business to access and collect consumers’ personal information and
thereafter tracking their online behaviour.
G. Pew and American Life Report43 (2000 and 2008) showed that 94% of internet users believe that privacy
violations should be regulated by the State and they want ability to avail remedies against privacy
invasions by online companies.
It can be assumed that adequate legal protection over privacy concern and information privacy will ensure
individuals’ about the protection of their privacy rights in e-commerce transactions.
Indian Laws for Data Protection
Individual’s data like name, telephone numbers, profession, family, choices, pan card number, credit card
details, social security number etc. are disclosed in the electronic transactions and then are available on various
websites.44 Though the authorized collection and the storage of data may only create probability of the loss of
information privacy45 but the unauthorized access, collection, use, misuse, relocation and transmission of the
information to the third party essentially result in the intrusion of information privacy of the individuals. Hence,
improper control on transmission of information can be the root cause for privacy challenges in electronic
transactions. Law will not only determine, what privacy entails, how it is to be valued, and to what extent it
should be endowed with legal protection, but also ensures authorized protection to the circumstances under
which individuals can value their privacy and protect it from the violation of unauthorized intrusion by others.46
99
PP-AIDA&CS Cyber Threats and Cyber Laws
Knight Bruce in Prince Albert v Strange47 upheld that a third party intrusion into one’s privacy results in grave
violation of right to privacy and hence, implies need of legal protection to right to privacy.
To counter the challenges of information and communication technology, the Indian Legislature has enacted
Information Technology Act, 2000, Information Technology (Amendment) Act, 2008 and other legislations too,
but challenges of information privacy and data privacy are not addressed in an exclusive and specific manner.
India is not having a comprehensive legislative framework to deal specifically with privacy issues in electronic
transactions.48 The Information Technology Act, 2000 was enacted chiefly to facilitate e-commerce; hence
privacy is not the primary concern of the Act.49
Information Technology Act, 2000 and Data Protection
Indian legislature has enacted Information Technology Act, 2000 for the purpose of complying with the
requirements of UNCLTRAL (United Nations Commission on International Trade Law) model law50 on electronic
commerce51 on one hand, and for providing legal recognition to the transactions carried out by the means of
electronic data interchange and other means of electronic communication, commonly referred to as electronic
commerce.
The Act was brought into existence for the following reasons:52
i. To facilitate the development of e-commerce transactions;
ii. To ensure the regulatory environment for the security of e-commerce transactions;
iii. To provide legal structure for governing electronic contracts, security and integrity of electronic
transactions;
iv. To facilitate and validate the use of digital signatures for authenticating the electronic records;
v. To facilitate the growth of Indian IT sector across the globe;
vi. To ensure the safety and security of electronic transactions; and
vii. To attract Foreign Direct Investment (FDI) in Information Technology sector.
Note: E-commerce or electronic commerce is the trading of goods and services over the internet.
Under the regime of privacy rights, every individual wants to keep his or her personal affairs to himself, but
in the electronic transactions, variety of individual’s information are collected and stored, which can easily
enable others to identify that individual. Databases collected in the online transactions, when cross-matched
can easily create profile of the individuals and can predict their behaviour. This involves the sheer violation of
data privacy in electronic transactions. The provisions of the Act for the purpose of data privacy in electronic
transactions can be examined as follows:
org/stable/795891?origin=JSTOR-pdfand.
47. Prince Albert v Strange (1848) 2 De G and SM 652, 698; 64 ER 293, 314.
48. Shrikant Ardhapurkar et al., Privacy and Data Protection in Cyberspace in Indian Environment, International Journal of Engineering
Science and Technology, Vol. 2, No. 5, 942-951 (2010).
49. Mathur, S. K., Indian Information Technology Industry: Past, Present and Future A Tool for National Development, Journal of Theoretical
and Applied Information Technology. (2006) (Online). (May 28, 2012), http://perso.univ-rennes1.fr/eric.darmon/floss/papers/MATHUR.pdf.
50. UNCITRAL Model Law on Electronic Commerce, Guide to Enactment with 1996 (May 27, 2013), http://www.uncitral.org/pdf/english/texts/
electcom/05-89450_Ebook.pdf.
51. The UNCITRAL Model Law on E-commerce is a resolution of the U.N. General Assembly which recommends that all States give favorable
consideration to the Model Law on Electronic Commerce when they enact or revise their laws, in view of the need for uniformity of the law
applicable to alternatives to paper-based methods of communication and storage of information.
52. Nasir, M. Ali, Legal Issues involved in E-commerce, Ubiquity (Mazgine), New York, NY, USA (2004). (May 28, 2012), http://ubiquity.acm.
org/article.cfm?id=985607.
100
Cyber Threats and Cyber Laws LESSON 3
53. Data means information which (a) is being processed by means of equipment operating automatically in response to instructions given
for that purpose, (b) is recorded with the intention that it should be processed by means of such equipment, (c) is recorded as part of a
relevant filing system or with the intention that it should form part of a relevant filing system, (d) does not fall within paragraph (a), (b) or (c)
but forms part of an accessible record as defined by Section 68, or(e) is recorded information held by a public authority and does not fall
within any of paragraphs (a) to (d). Source: Information Commission Office, Government of United Kingdom. (May 29, 2012), http://www.ico.
gov.uk/for_organisations/data_protection/the_guide/key_definitions.aspx.
54. Personal data means data which relate to a living individual who can be identified (a) from those data, or (b) from those data and other
information which is in the possession of, or is likely to come into the possession of, the data controller, and (c) includes any expression of
opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual.
Source: Information Commission Office, Government of United Kingdom. (May 29, 2012), http://www.ico.gov.uk/for_organisations/data_
protection/the_guide/key_definitions.aspx.
55. Section 2 (o) of IT Act, 2000 ‘data’ means a representation of information, knowledge, facts, concepts or instructions which are being
prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a
computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched
cards, punched tapes) or stored internally in the memory of the computer. (May 29, 2012), http://eprocure.gov.in/cppp/sites/default/files/
eproc/itact2000.pdf.
56. The Final Report: The First Analysis of the Personal Data Protection Law in India, Prepared by CRID-University of Namur, Report delivered
in the framework of contract, JLS/C4/2005/15 between CRID and the Directorate General, Justice, Freedom and Security. (May 29, 2012),
http://ec.europa.eu/justice/data-protection/index_en.htm.
57. Sharma, Vakul, Information Technology-Law and Practice, Delhi: Universal Law Publishing Co. Pvt. Ltd (2004).
58. Section 43 of Information Technology Act, 2000: Penalty for damage to computer, computer system, etc. (May 29, 2012), http://eprocure.
gov.in/cppp/sites/default/files/eproc/itact2000.pdf.
59. Sharma, Vakul, Supra note 334.
101
PP-AIDA&CS Cyber Threats and Cyber Laws
with the computer source’ which was not limited to the protection of computer source code but was
extending safeguards for computer data base from unauthorized access. Section 66 (Hacking with
computer system), was also indirectly protecting data from unauthorized access and misuse. According
to Dr. Unni, unauthorized access to any information diminishes its value/utility and hence injures the
confidentiality of a document.60 For example, if any sensitive personal information is transmitted over
e-mail or saved in an e-mail, or in computer and if any person accesses the said document without any
authority, then the value of the information is completely lost and it will result in loss of personal data
and will make the accessing party liable under Section 66.
D. It is noteworthy that to make a person liable under Section 66, his guilty intention to cause such access
has to be proved. Further, out of various provisions dealing with cyber offences, it is only Section 7261
of the Act, which is specifically directed at the protection of confidentiality and privacy. Section 72
aimed at the protection of privacy and confidentiality from public (and private) authorities,62 which have
been granted power under the provisions of Information Technology Act, 2000 to secure access to any
electronic record, book, register, correspondence, information, document or other material information.
The purpose of incorporating this section was to ensure that the person who is legally entitled to secure
an access to any information63 shall not take unfair and unmerited advantage of such information
by disclosing it to any unauthorized third party without seeking due consent. This section creates an
obligation of confidence between the ‘data collectors’ and ‘data subject’. Section 72 has a limited
application, as it is applicable only to the persons who have gained access to the information under
some authorized channel and not to the unauthorized access of personal information by available
means.64
From the above discussion, it can be submitted that Information Technology Act, 2000 is not a data
protection legislation per se. The Act does not lay down any specific provisions for data protection
and privacy protection. The IT Act, 2000 is a general legislation, which articulates on various subject
matters that involves digital signatures, public key infrastructure, e-governance, cyber contraventions,
cyber offences and confidentiality and privacy. Therefore, the sphere of data protection and privacy in
electronic transactions was largely unregulated, which led to amendments in information technology
laws in the year 2008.
60. V.K. Unni, Internet Service Provider’s Liability for Copyright Infringement-How to clear the Misty Indian Perspective, Richmond Journal of
Law and Technology. Vol. 13 (2001). (May 29, 2012), http://jolt.richmond.edu/v8i2/article1.html.
61. Section 72 of Information Technology Act, 2000: Penalty for breach of confidentiality and privacy: Save as otherwise provided in this Act
or any other law for the time being in force, any person who, in pursuance of any of the powers conferred under this Act, rules or regulations
made there under, has secured access to any electronic record, book, register, correspondence, information, document or other material
without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or
other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may
extend to one lakh rupees, or with both. (May 29, 2012), http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdf.
62. These public and private authorities may be referred as ‘data collectors’ or ‘data users’.
63. Persons conferred under the Act : The Act has conferred powers to : a)The Controller of Certifying Authorities (Ss. 17-18) b) The Deputy
and Assistant Controllers of Certifying Authorities (Ss. 17 and 27) c)Licensed Certifying Authorities (S. 31) and Auditors (Rule 312) d) The
Adjudicating Officer (S 46) e) The Presiding Officer of the Cyber Appellate Tribunal (Ss. 48-49) f) The Registrar of the cyber Appellate tribunal
(S. 56 and rule 263) g)Network Service provider (S. 79) h) Police Officer (Deputy Superintendent of Police) (S. 80). (May 29, 2012), http://www.
legalserviceindia.com/article/l288-Breach-of-privacy-and-Confidentiality-.html.
64. Salim Nimitha, Breach of Privacy and Confidentiality under the Information Technology Act, 2000, Legal Service India, (2009). (May 29,
2012), http://www.legalserviceindia.com/article/l288-Breach-of-privacy-and-Confidentiality-.html.
102
Cyber Threats and Cyber Laws LESSON 3
public health and safety on the other.65 Section 43A of this Act directs that all body corporates,66 which are in
possession of data and information of their consumers in their computer source, will implement ‘reasonable
security practices67’ to prevent the unauthorized access to the personal data of their consumers. This section
further entails that failure to protect the sensitive personal data of the individuals during the processing period
by the company will make company liable to compensate the aggrieved person, whose personal data is so
compromised. While explaining Section 43A of IT (Amendment Act), 2008, Kamlesh Bajaj68 has detailed that
the company will be liable for the loss of data during its processing at company’s end and the company cannot
seek exemption from their responsibility on the ground that there was no negligence on the part of the company
in implementing or maintaining reasonable security practices. He further explained that reasonable security
practices and procedure will constitute practices and procedures to protect information from unauthorized
access, damage, use, modification, disclosure or impairment as may be specified in an agreement between the
parties or as may be specified in any law in force.
The penalty under Section 72 of IT Act, 2000 for the disclosure of information was restricted only to those
who are legally authorized to secure access to an electronic record and document under the Act, and hence
Section 72-A69 has been incorporated in IT (Amendment) Act, 2008, which provides liabilities of intermediaries
and other persons for breach of privacy and confidentiality under lawful contract. Section 72-A70 reads as,
‘save as otherwise provided in this Act or any other law for the time being in force, any person including
an intermediary who, while providing services under the terms of lawful contract; has secured access to any
material containing personal information about another person; with the intent to cause or knowing that he is
likely to cause wrongful loss or wrongful gain; discloses; without the consent of the person concerned, or in
breach of a lawful contract; such material to any other person, shall be punished with imprisonment for a term
which may extend to three years, or with a fine which may extend to five lakh rupees, or with both. Apart from
Sections 43A and 72A, there are some other provisions as well which though not specifically but in one way or
other tackle the challenges of data protection and data privacy.
The provisions are:
A. Section 66 – Computer Related Offences.
B. Section 66A – Punishment for sending offensive messages through communication service, etc.
C. Section 66B – Punishment for dishonestly receiving stolen computer resource or communication device.
D. Section 66C – Punishment for identity theft.
E. Section 66D – Punishment for cheating by personation by using computer resource.
F. Section 66E – Punishment for violation of privacy.
G. Section 66F – Punishment for cyber terrorism.
H. Section 67 – Punishment for publishing or transmitting obscene material in electronic form.
65. Workshop Report, National Seminar on Enforcement of Cyber law, New Delhi, (May 8, 2010). (May 27, 2012) http://catindia.gov.in/pdfFiles/
IT_Act_2000_vs_2008.pdf.
66. Section 43 A, Explanation (i) ‘body corporate’ means any company and includes a firm, sole proprietorship or other association of
individuals engaged in commercial or professional activities.
67. Section 43 A, Explanation (ii) ‘reasonable security practices and procedures’ means security practices and procedures designed to protect
such information from unauthorized access, damage, use, modification, disclosure or impairment, as may be specified in an agreement
between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such
reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional
bodies or associations as it may deem fit.
68. CEO of Data Security Council of India, 2009.
69. Penalty for breach of confidentiality and privacy.
70. Section 72A: Punishment for disclosure of information in breach of lawful contract.
103
PP-AIDA&CS Cyber Threats and Cyber Laws
I. Section 67A – Punishment for publishing or transmitting of material containing sexually explicit act, etc.
in electronic form.
J. Section 67B – Punishment for publishing or transmitting of material depicting children in sexually
explicit act, etc. in electronic form.
K. Section 67C – Preservation and Retention of information by intermediaries.
L. Section 69 – Power to issue directions for interception or monitoring or decryption of any information
through any computer resource.
M. Section 69A – Power to issue directions for blocking for public access of any information through any
computer resource.
N. Section 69B – Power to authorize to monitor and collect traffic data or information through any computer
resource for cyber security.
O. Section 79 – Exemption from liability of intermediary in certain cases.
P. Section 84A –Modes or methods for encryption.
Q. Section 84B –Punishment for abetment of offences.
R. Section 84C –Punishment for attempt to commit offences.
104
Cyber Threats and Cyber Laws LESSON 3
domestic territory and in cross-border exchange too. The provisions provide for special conditions to process
biometric data.
The consent of the user with respect to collecting, and usage of his/her “data” is the underlying feature of the
framework. A framework for consent mechanism is proposed. The Bill also has provisions relating to ground for
processing of data without consent.
The Bill provides for the rights of the Data Principal including right of data portability. There are special
requirements in the Bill for processing of personal and sensitive data related to children.
The framework would regulate ‘data localisation’ particularly ‘sensitive personal data’ and ‘critical sensitive
data’. Consent of the user and approval of the Regulator would be essential for crossborder transfer of Personal
Data.
Any breach of sensitive personal data and critical sensitive data will attract heavy fine and compensation to the
Data Principal (the owner of such data).
The Data Protection framework proposes to set up an elaborate regulatory mechanism consisting of a
Regulatory Authority namely Data Protection Authority (DPA) Adjudication and Appellate Tribunal to regulate
process storage and flow of data in the country. AII entities would be obligated to appoint a Data Protection
Officer who will have responsibility of enforcement and supervision of privacy policy and reporting of data
breach to the concerned authorities.
71. The IPC, 1860 does not directly address the breach of data privacy but has been used to bring prosecutions for data theft under Section
405 (criminal breach of trust), 406 (Punishment for criminal breach of trust), 420 (cheating and dishonesty including delivery of property).
72. This Act protects the personal information and privacy of individuals in the telecommunication area.
73. The Indian Contract Act renders data protection and privacy protection in the form of breach of contract and specific performance of
contract. The law of contract says that the parties involved in a contract must adhere with the rules and regulations as specified in the
agreement. If terms and conditions calling for the protection of information are violated by the disclosure of the information shared between
the parties, causing intentional damages to other amounts to breach of contract.
74. This Act provides security to literary, artistic, dramatic and musical work. The copyright act provide right to the original author of above
mentioned fields so that no one can misuse their work and maintain the privacy if it is related with some sensitive information and maintain
the originality of work. Specifically mention Section 16 and 63B of Indian Copyright Act, 1957.
75. This Act provides for the specific relief to the people, who can claim temporary and permanent injunctions against unauthorized
disclosure of confidential information.
76. Kottabomman Transport Corporation Limited vs. State Bank of Travancore and Others, AIR 1992 Ker. 351: Banks are under a duty to
secrecy and not to disclose information to third party.
77. This Act provides the provisions through which the consumer can claim protection from exploitation and can save them from deficiency
of services by disclosing proprietary information, personal information etc. without adequate authorization.
78. See, Section 19: Information should be accurate and protected against unauthorized use and disclosure.
105
PP-AIDA&CS Cyber Threats and Cyber Laws
Case Study
1. On Cyber Threat:
User accounts accessed by attackers due to flaw in “view as” feature: In September 2018, the social
media company admitted to a serious vulnerability (which was described as a flaw in Facebook’s
“view as” feature) that allowed hackers to gain access to accounts and even third-party apps that used
Facebook for login to gain unauthorized access to millions of accounts, initially it was stated that 50
million accounts were affected. Access tokens for 30 million accounts were stolen by hackers, who
accessed contact information (name and email id/ phone number) for 14 million accounts and additional
information was accessed for another 15 million accounts including gender, religion, location and
device information. Within a month, the company had disclosed that another 40 million user accounts
were deemed at risk from the security flaw before steps were taken to protect them. The company said
it reset the access tokens of the 50 million accounts affected by the attack and took a “precautionary
step” of resetting tokens for the other 40 million accounts. This raises an alarm of cyber threat on the
PIIs of the users.
2. On Cyber Crime
l Zee News in their publication on April 29, 2022 reported that the first two months of 2022
reported more cyber-crimes than the entire 2018, according to data by CERT-In (Indian Computer
Emergency Response Team). CERT-In is the nodal agency to deal with cyber security threats
and operates under the Ministry of Electronic & Information Technology.
l Cyber-crime cases have witnessed a steady spike since 2018. India reported 2,08,456 incidents
in 2018; 3,94,499 incidents in 2019; 11,58,208 cases in 2020; 14,02,809 cases in 2021; and
2,12,485 incidents in the first two months of 2022. The above figures show that cyber-crimes
increased almost seven times in three years between 2018 and 2021, and more sharply during
the pandemic.
l A total of 17,560; 24,768 and 26,121 Indian websites were hacked in 2018, 2019 and 2020
respectively, CERT-In data further says.
l The National Crime Records Bureau (NCRB), however, presents a different set of data. According
to NCRB, India reported 50,035 cyber-crimes in 2020; 44,546 cases in 2019 and 27,248 cases
in 2018.
l The year 2020 saw 4,047 cases of online banking fraud; 2,160 cases of ATM fraud; 1,194 credit/
debit card fraud and 1,093 OTP frauds. As per NCRB data, there were 972 cases of cyber
stalking/bullying of women and children and 578 cases of fake news on social media.
l Committing fraud was found to be the biggest motive and accounted for 30,142 out of the total
50,035 cases (60.02 per cent). This was followed by sexual exploitation (6.6 per cent) and
extortion 4.9 per cent.
l Cyber-crime rate was highest in Karnataka (16.2 per cent), followed by Telangana (13.4 per
cent) and Assam (10.1 per cent).
106
Cyber Threats and Cyber Laws LESSON 3
LESSON ROUND-UP
l Advent of information technology has not only provided us the assorted means of communicating our
information at an inclusive platform but it has also ensured quick communication of information.
l However, it has been righty said that ‘with boon goes the bane’, so is the sphere of information
technology. At one side, this easy medium of transferring data and quicker communication has given
birth to numerous recompenses of communication and transaction; on the other side, various dark
sides are being observed under IT enables and electronic transactions. The major among them are
Cyber Crimes and Cyber Attacks.
l Hence in order to control the mechanism of cyber-crimes and cyber-attacks, cyber law has been
evolved gradually which ensures cyber security in cyber sphere.
l Cyber security is the most concerned matter as cyber threats and attacks are overgrowing. Attackers
are now using more sophisticated techniques to target the systems.
l A cyber threat (also known as cybersecurity threat) is defined as a malicious act that seeks to steal or
damage data or disrupt the digital wellbeing and stability in general.
l Cyber threats may come from a variety of places, people, and contexts.
l Cyberwar (also called cyberwarfare or cyber warfare) is defined as a war conducted in and from
computers and the networks connecting them, waged by states or their proxies against other states.
l Cyber-crime is any criminal activity that involves a computer, networked device or a network. In
general, most cybercrimes are carried out in order to generate profit for the cybercriminals, yet some
of cybercrimes are carried out against computers or devices directly to damage or disable them.
l Cybercrime can have wide-ranging impacts, at the individual, local, state, and national levels.
l The term cyberterrorism was first coined by Banny C. Collin of the Institute for Security and Intelligence
(ISI) in the late 1980s. But its usage was better understood during the 9/11 attack.
l A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt
digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS)
attacks, and other attack vectors.
l Cyber threat hunting is a proactive security search through networks, endpoints, and datasets to hunt
malicious, suspicious, or risky activities that have evaded detection by existing tools.
l A cyber threat hunt is composed of steps or processes designed for an efficient, successful hunt.
l Digital forensic science is a branch of forensic science that focuses on the recovery and investigation
of material found in digital devices related to cybercrime.
l The term digital forensics was first used as a synonym for computer forensics.
l Indeed internet has revolutionized the way we interact; however, it has also bought with it a host of
problems such as hate speech, fake news, illegal lobbying and personal data theft. The number of
these issues not only make the criminal/offender liable, yet many a times, online platforms are also
made liable for the cyber security threat.
l To encounter the challenges of information privacy and to promote legal control over privacy protection
in electronic transactions, some legal policies and regulations have already been established at
international and national level.
l At international level, some fair information principles like Notice, Choice, Access, Consent, Enforcement
etc. are directed to be followed by the e-commerce companies to ensure the information privacy in the
conduct of online transactions.
107
PP-AIDA&CS Cyber Threats and Cyber Laws
l Though at the industry level, even the e-commerce companies are also taking some steps to protect
the information privacy of the individuals by adopting and declaring privacy policy, yet much is left to
be governed by the nationally and internationally commended regulations.
l At national level, countries around the world have enacted different laws to protect privacy of
individuals.
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. What do you mean by Cyber Threats? Discuss four recent types of Cyber Threats encountered in covid
times.
2. What is Cyber Threat Hunting? Describe few techniques of Cyber Hunting.
3. Write a brief note on Digital Intellectual Property along with ways to protect the same.
4. Discuss Artificial Intelligence (AI). Briefly describe the development of AI in India.
5. Write Short Note on any Four of the following:
a. Cyber Warfare
b. Cyber Terrorism
c. Digital Forensics
d. Safe Harbour Protection
e. Cyber Security Framework (NCFS)
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
l Chattopaddhyay Sougata (2020) Intellectual Property Rights in Digital Environment, ePrints in Library
and Information Science
l Erdal Ozkaya (2022) Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor
Motives, Targets, and Attacks with Cyber Intelligence Practices Paperback – Import, 27 June 2022,
BPB Publications
l European Union on Liability of online platform (2021), Study Published by Scientific Foresight Unit
(STOA) European Parliamentary Research Service, EU. Available on https://www.europarl.europa.eu/
RegData/etudes/STUD/2021/656318/EPRS_STU(2021)656318_EN.pdf
l Malik Surendra and Malik Sudeep (2019) Supreme Court on Information Technology Act, Internet and
Cyber Laws and Aadhar, Eastern Book Company
l Pokhariyal Purvi, Kashyap Amit and Arun Prasad (2022) Artificial Intelligence: Law and Policy
Implications, Eastern Book Company, ISBN: 9789389656954, 9789394364806
l Raman and Sharma (2019) Cyber Terrorism in India: A Physical Reality Or Virtual Myth, Indian Journal
of Law and Human Behavior Volume 5 Number 2 (Special Issue), May - August 2019
l Singh and Mara (2021) Intermediary Liability in India – Moving Goalposts, Mondaq
108
Cyber Crimes and Investigation Lesson
Procedures 4
KEY CONCEPTS
n Investigation n Cyber Crime n Cyber Forensics n Digital Evidence n Security Audit
Learning Objectives
To understand:
Status of Cyber Crimes in Indian Scenario
Government Initiatives to Regulate and Control Cyber Crimes
Tools and Techniques Used to Commit Cyber Crimes
Reporting of Cyber Crimes
Investigation of Cyber Crimes and Process under Indian Laws
Steps of Conducing Investigation of Cyber Crimes
Prosecution of Cyber-Crimes
Computer Forensics
Digital Evidences
Security Audit
Lesson Outline
Introduction Types of Computer Forensics
Overview of Cyber Crimes and Indian Role of Computer Forensics
Scenario
Investigation vide Computer Forensics
Initiatives to Regulate and Control Cyber
Steps in Digital Forensics
Crimes: Governmental and Law Enforcement
Agencies Branches of Digital Forensics
Tools and Techniques Used to Commit Cyber Digital Forensics – Chain of Custody
Crimes
Security Audit
Reporting of Cyber Crimes
Lesson Round-Up
Investigation of Cyber Crimes and Process
Test Yourself
under Indian Laws
List of Further Readings
Computer Forensics and Digital Evidences
List of Other References
What is Computer Forensics?
109
PP-AIDA&CS Cyber Crimes and Investigation Procedures
INTRODUCTION
As discussed in the previous chapters that use of Internet and rapid deployment of information and
communication technologies in recent years have bought various changes in the world both at individual level
as well as organization level. Right from the way we communicate to the way we buy our groceries, each
and every activity of human life is revolutionized with the help of information and communication technology.
Crime is not an exception to this revolution brought by information and communication technologies. On one
hand wherein the pattern of crime has been altered by misusing the tools and techniques of information and
communication technology, on the similar hand, historic trends and practices in criminal investigation has also
been revolutionized. This has created a tremendous challenge for law enforcement to develop the capacity
to confront transnational crimes and follow evidence trails. Among the obstacles were legal, technical and
operational challenges, but these are not the total extent of the difficulties faced; rather, they have been
recognized as the main issues to be addressed in order that law enforcement agencies are able to meet the
emerging challenges of cybercrime. Traditional law enforcement government agencies are now called upon to
investigate not only real-world crimes, but also crimes on the Internet. For conducting cyber-crime investigation,
certain special skills and scientific tools are required without which the investigation is not possible. Due to
the Information Technology Act, 2000 (“IT Act”), certain provisions of Criminal Procedure Code, 1973 and the
Evidence Act, 1872 have been amended. Along with this, certain new regulations had been enforced by the
Indian legal system to meet with the need of cyber-crime investigation. Hence, this chapter aims to provide the
understanding on the following:
l Overview of Cyber Crimes and Indian Scenario
l Initiatives to Regulate and Control Cyber Crimes: Governmental and Law Enforcement Agencies
l Tools and Techniques Used to Commit Cyber Crimes
l Reporting of Cyber Crimes
l Investigation of Cyber Crimes and Process under Indian Laws
l Case Study: Steps of Conducing Investigation of Cyber Crimes
l Cyber Forensics
l Digital Evidences
l Security Audit.
In any statute, the term cybercrime is not defined. Any unauthorized/ unlawful act, commissioned with the
use of a computer or computer network or communication device, to commit or facilitate the crime is called
cyber-crime.
1 Students to Note: Cyber Crime and Types of Cyber Crime are discussed in detail in chapter 2 and 3 of this study material.
2 Kaspersky (2021) What is Cybercrime? How to protect yourself from cybercrime.
110
Cyber Crimes and Investigation Procedures LESSON44
3 Data Security Council of India (2011) Cyber Crime Investigation Manual with Knowledge Partner Deloitte
4 https://www.moneycontrol.com/news/india/cyber-crimes-in-india-rise-6-a-year-in-2021-telangana-tops-list-ncrb-data-9115161.html
5 Basuroy Tanushree (October 13, 2022) Number of Cyber Crimes reported in India 2012-2021
6 https://economictimes.indiatimes.com/wealth/personal-finance-news/cyber-criminals-stole-rs-1-2-trillion-from-indians-in-2019survey/articles
how/75093578.cms#:~:text=Rs%20131.2%20million%20is%20the,the%20global%20average%20being%2067%25
7 http://www.cbi.gov.in/speech/nasscom_20101122_dcbi.php
8 Source: Data Security Council of India (2011) Cyber Crime Investigation Manual with Knowledge Partner Deloitte
111
PP-AIDA&CS Cyber Crimes and Investigation Procedures
make use of various tools and techniques yet the following are the most common tools and techniques used
recently to conduct cybercrimes.
It is to be noted that many of these tools (used for the commission of the cyber-crimes) are installed on the
victim’s systems through exploitation of the vulnerabilities in the systems / networks or by surreptitiously
gaining access to the victim’s systems which may include physical access or by making use of the
intermediary systems or by deceiving the victim to allow access to his system or by gathering the victim
information.
l Buffer overflow: The condition when a program or process tries to store more data in a buffer (temporary
data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of
data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting
or overwriting the valid data held in them.
l Cracking: Cracking is breaking into someone else’s computer system, often on a network; bypassing
passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
A cracker can be doing this either for profit, or maliciously, or for some altruistic purpose or cause.
l Data Didling: Involves altering the raw data just before a computer processes it and then changing it
back after processing is completed.
l Malware: A program that is inserted into a system, usually covertly, with the intent of compromising
the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or of
otherwise annoying or disrupting the victim.
l Phishing: Using spoof E-mails or directing the people to fake web sites to deceive them into divulging
personal financial details so that criminals can access their accounts.
l Rootkit: A set of tools that enables continued privileged access to a computer, while actively hiding its
presence from the administrator. Typically, a cracker installs a rootkit on a computer after first obtaining
user-level access, either by exploiting a known vulnerability or cracking a password. Once the rootkit
is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer
and, possibly, other machines on the network.
l Salami Attack: A programmed attack which is implemented in small (meant to be unnoticeable)
increments. This attack involves making alteration so insignificant that it is easily concealed and would
go completely unnoticed. Attacks are used for commission of financial crimes.
l Sniffer: A program and/or device that monitors data traveling over a network. Sniffers can be used both
for legitimate net-work management functions and for stealing information off a network. Unauthorized
sniffers can be extremely dangerous to a network’s security because they are virtually impossible to
detect and can be inserted almost anywhere.
l Social Engineering: A hacker term which involves non-technical intrusion for deceiving or manipulating
unwitting people into giving out information about a network or how to access it.
l Spoofing: Refers to a situation in which the incoming information from an attacker is masqueraded
as one that appears to come from a trusted source to the recipient or to the recipient network. Often
the messages from the fraudster appearing to be from a genuine source (like bank), seeks personally
identifiable information to perpetrate fraud on the victim.
l Spyware: It is a type of malware that is secretly or surreptitiously installed into an information system
to gather information on individuals or organisations without their knowledge; a type of malicious
code.
112
Cyber Crimes and Investigation Procedures LESSON44
l Steganography: The art and science of writing hidden messages in such a way that no one, apart from
the sender and in-tended recipient, suspects the existence of the message An image file may contain
hidden messages between terror groups, which will be known only to the intended recipient and the
sender.
l Trojan: A malicious program that masquerades as a benign application and can take complete control
of the victim’s computer system.
l virus: A self-replicating program that runs and spreads by modifying other programs or files.
l Worm: A self-replicating, self-propagating, self-contained program that uses networking mechanisms
to spread itself.
l Zombie: A program that is installed on a system to cause it to attack other systems.
113
PP-AIDA&CS Cyber Crimes and Investigation Procedures
12 This portion of the chapter is reproduced from article titled - How is cyber-crime investigation conducted (2020) iPleaders.
114
Cyber Crimes and Investigation Procedures LESSON44
13 Source: https://www.cybercrime.gov.in/UploadMedia/MHA-CitizenManualReportOtherCyberCrime-v10.pdf
115
PP-AIDA&CS Cyber Crimes and Investigation Procedures
Source: http://www.dynotech.com/articles/images/crimescene.jpg14
Case Study
Case Study on Cyber Crime Reporting: SONY.SAMBANDH.COM CASE14
India saw its first cybercrime conviction in 2013. It all began after a complaint was filed by Sony India Private
Ltd, which runs a website called www.sony-sambandh.com, targeting Non-Resident Indians. The website
enables NRIs to send Sony products to their friends and relatives in India after they pay for it online.
The company undertakes to deliver the products to the concerned recipients. In May 2002, according to the
cybercrime case study, someone logged onto the website under the identity of Barbara Campa and ordered
a Sony Colour Television set and a cordless headphone. She gave her credit card number for payment and
requested the products to be delivered to Arif Azim in Noida. The payment was duly cleared by the credit
card agency, and the transaction was processed. After following the relevant procedures of due diligence
and checking, the company delivered the items to Arif Azim.
14. Reproduced from “Important Cyber Law case studies by Cyber Laws and Information Security Advisors”.
116
Cyber Crimes and Investigation Procedures LESSON44
At the time of delivery, the company took digital photographs showing the delivery being accepted by Arif
Azim. The transaction closed at that, but after one and a half months the credit card agency informed the
company that this was an unauthorized transaction as the real owner had denied having made the purchase.
The company lodged a complaint about online cheating at the Central Bureau of Investigation which
registered a case under Section 418, 419 and 420 of the Indian Penal Code. The matter was investigated,
and Arif Azim was arrested. Investigations revealed that Arif Azim while working at a call centre in Noida
gained access to the credit card number of an American national which he misused on the company’s site.
The CBI recovered the colour television and the cordless headphone, in this one of its own kind of cyber
fraud case. In this matter, the CBI had evidence to prove their case, and so the accused admitted his guilt.
The court convicted Arif Azim under Section 418, 419 and 420 of the Indian Penal Code - this being the first
time that cybercrime has been convicted.
The court, however, felt that as the accused was a young boy of 24 years and a first-time convict, a lenient
view needed to be taken. The court, therefore, released the accused on probation for one year. The judgment
is of immense significance for the entire nation. Besides being the first conviction in a cybercrime matter, it
has shown that the Indian Penal Code can be effectively applied to certain categories of cybercrimes which
are not covered under the Information Technology Act 2000. Secondly, a judgment of this sort sends out a
clear message to all that the law cannot be taken for a ride.
117
PP-AIDA&CS Cyber Crimes and Investigation Procedures
Pursuant to Section 80 (2) of the IT Act, any person who is arrested under sub-section (1) by an officer other than
a police officer then such officer shall, without any unreasonable delay, take or send the person arrested before
a magistrate having jurisdiction in the case or before the officer-in-charge of a police station.
Case Study15: Steps in Investigation of Cyber-Crime (Example Data Breach)
Following are the major steps in conducting the investigation in a cybercrime. Let us understand the same in a
cyber-crime of data breach.
Identification: Identify the incident that happened and determine the type of incident, in this case, the incident
was a data breach that stolen 500 million identities and got sold in the dark web. The type of the incident
could be data breach and data theft. The breach includes personal information like email address, contact
information, name etc. The Investigation and/or the forensic examiner should identify the size of the attack (data
breach), how the attack happened, method used in stealing the data etc.
The investigation should look for the answers the following questions,
l Check who is involved.
l Find what happened.
l When this happened.
l Where did this incident happen?
l How this incident happens?
By finding the answers to these questions, the investigator can get idea how to proceed with the case. Also, the
investigator cannot miss the essential device that might be affected to this investigation. Costs can be estimated
15 See Jayasekara CM (2022) Cyber Crime and Forensic Investigation: Case Study Analysis, Researchgate.
118
Cyber Crimes and Investigation Procedures LESSON44
in advance and be prepared for the actual needs. Identify the related evidence such as desktop, smartphones,
printers, digital cameras, etc. And try to identify the suspect’s characteristics.
There are many factors that may be noticed when identifying,
l Whether there is an administrator that can identify these devices.
l Number of devices that can be involved with this and types of devices.
l if there are any devices that have any remote login capabilities.
l Operating systems that may involve with.
l Power of sources of the suspected devices to operate.
Documentation
Last stage in this identification phase would be documenting every critical thing and revise them if it’s necessary.
In documentation, we can include, where these devices are found or removed, the information regarding the
interview like name ad titles, and the number of devices that are found, where they founded or removed etc.
With this investigator may also continue the investigation process, which may help the business to identify the
vulnerabilities and accordingly to adopt modalities to improve their network and security.
Preservation
In this stage, investigator should work in isolation, securing and preserving the physical and digital evidence.
This helps to maintain the integrity of the digital evidence and protect the digital evidence from the modifications.
Investigator should be responsible and must demonstrate that the evidence should be preserved through all
steps in the process like in collection phase, examine phase, analyze phase, etc.
Preservation of the digital and physical evidence should be done by trained and skilled staff members that
possess the required techniques and the knowledge of using appropriate tools.
Methods to preserve the Digital Evidence
Following methods need to be considered for preserving the digital evidence by forensic investigator:
l Drive Imaging: Imaging the drives can help to keep the evidence side and use the images for the
analysis. To perform this imagining, professional make a duplicate of the drive with completing the
evidence sector by sector.
l Making copies of the Evidence: Copies of the evidence could also help to retain the evidence. Copies
should be encrypted with hash values in the label of the copies so can distinguish from Original. Along
with that, critical information like name of the personnel, the date and time and place would be added
with. This helps to verify the authenticity and helps to protect the integrity. These hash values could be
useful in the court case.
l Chain of custody16: When investigator extracts the media from the business and transfer the media
if required, then the investigator should document all the transfer on a form called Chain of Custody
(CoC).
This stage is crucial because once if the evidence not being preserved properly, this might be invalid in court
case. From global perspective, it is to be noted that non-preservation of data and evidences may attract fines
under GDPR.
16 Students to Note: Chain of Custody is an important pillar of Digital Evidence and the same is discussed in detail in the later pages of this
chapter. See title – Digital Forensics
119
PP-AIDA&CS Cyber Crimes and Investigation Procedures
Collection:
In a cybercrime, there are high probabilities of having certain physical evidences also. Hence along with
imaging, duplicating, or copying of the digital evidence, the investigator shall focus on collecting physical
evidence also that relates to the crime scene. The investigator shall also collect documents which contain
information of the evidence like, name, model, made year etc. Also, the audio recording, photographs, and
other visual forms of the crime scenes should be collected and documented. Digital evidence such as desktop,
smartphones, printers, digital cameras, etc. should be collected, in addition to the physical evidence. Other
relevant evidence may include notes like passwords, suspect’s documents, suspect’s dairy etc. If the breach
initiated within the perimeter, it’s required to containment the crime scene, preform the specialized procedures
like if the device was ON or OFF when found. If the computer is found OFF, investigator can take the photos of
the computer, labelling cables, etc.
For an organized investigation, the investigator should follow some procedures during the collection process
such as:
l Separate the electronic evidence from magnetic evidence.
l Keep the evidence in the required temperature.
l Should prepare proper packaging forms like bubble wrap depending on the type of evidence to avoid
damages like shock etc.
l Do not store the evidence more than given amount that it should be stored (lifespan of batteries, lifespan
of hard disk, etc.).
l Store all acquired evidence in secure manner (e.g.: proper storage)
l Avoid the loss of the dynamic data such as a lists of network connections, personal digital assistants
(PDA’s), data collected in cell phones, etc.
l During the collection and duplicating the digital evidence, hash values can be used to verify that it is an
exact duplicate.
When investigators collecting the digital evidence, they need to care about the volatility and ensure to collect
the evidences in, parts in sequence or order of volatility. It’s a best exercise to collect the parts from highly
volatile to the least volatile.
Examination
This phase would be important for investigator to answer the legal questions and prove the case in court. This
involves with in-depth systematic search of evidence that related to the crime scene. The goal of this phase is
120
Cyber Crimes and Investigation Procedures LESSON44
to locate, analyze, and extract the digital evidence to refurbish the crime scene, analyze and extract refers, to
interpret the data that extracted from the media and placing into the different logical format. Investigation uses
lots of techniques while examining and interpret those crucial data into useful formats so that it helps to preserve
the integrity and the chain of custody that are required to present in the court. The ways of examination can
vary according to the types of devices and the personnel who doing examination must be skilled and trained.
Examination process can be done with two steps:
l Prepare to work on media where evidence files are stored that can be take out and used to prepare
documentation for recording all the details of the examination process.
l Preparing a registry can helps to proceed the examination process and track everything by making
double check.
Extraction of Data and/or Digital Evidences
Extracting can be done in two different ways such as physical and logical. Physical refers the extraction of
the data from the physical level evidence and logical extraction refers the extracting from the file system that
present in the drive like active files, etc. After the extraction, they can used to construct the crime scene to get
a bigger picture of the incident. Things that might be worth to extract:
l File systems and Applications - using forensic tools, examiner can extract the important metadata like
timestamp, directories, authors, etc.
l Registry files – example: in a Windows OS, Windows registry is where contains information like device
information, configuration settings, etc.
l Temporary files like cookies, temporary worker/.tamp files, batch files (.bat) etc.
l Unallocated spaces and unused partitions that may expose some important information of deleted
files.
l Scanning for the backdoors using tools like THOR and other free open-source forensic tools and monitor
the network for data packets seizures.
Analysis:
It is significant to note that all the collected evidences are arranged and analyzed properly, so that specific
conclusions can be drawn in solving the cyber-crime. This helps to understand the incident very well by
reconstructing the crime scene.
Fundamentally, there are three kinds of ways to reconstruct:
l Temporal Analysis,
l Relational Analysis, and
l Functional Analysis.
Temporal analysis helps to find the factors that are likely to cause this incident and who shall be held responsible
for. Relative analysis refers finding the baseline of the crime scene by corresponding the actions of the victim
and functional analysis is about finding the actions that caused this.
During this phase, analyst gathering all evidence and present the cruciality of the evidence by using different
analysis mechanisms depending on the nature of case.
l Data hiding analysis: Recovering the data can be hidden in these digital items could give the examiner
a chance to know the significant information that may give the idea about the ownership, etc.
121
PP-AIDA&CS Cyber Crimes and Investigation Procedures
l Log files analysis: This analysis uses logs to get the idea of the behavior of system pre crime and find
out the possibilities that lead to this crime. Analyzing some important log files like Intrusion Detection
system logs and scan the security events are one of examples of log files analysis.
l Time frame analysis: The goal of this analysis is to get the idea of when this crime happened with
analyzing the events on the digital systems by reviewing the time and data that has embedded into the
files as metadata.
l File analysis: Analyzing the metadata that embedded in the files and the applications and other
information may contain some hints leading to the crime scene like getting idea of the behavior of the user.
Presentation
This is final stage of any investigation which presents the results containing conclusions and summary of the
investigation process. The information that provides with this presentation must be clear and precise so the business
and victims can understand very well and get better knowledge how to avoid such another destruction in future.
In the presentation, any documents that had taken in each step in the process should be engaged with the
audience. Reporting is the significant part of the presentation. A professionally written and clear report can
increase the chances to prove the case very well in the court and win the case. In a good report should include
the case logs, videos and other media, technical report, non-technical report, Chain of Custody (CoC), etc.
Also more importantly, the report should provide the aims and objectives, detailed steps of every log and
technical and non-technical qualifications of the personnel who conducts the process would add more
information to presentation.
Last but not the least, investigator and its team should work with the business/victim closely to understand the
crime very well and provide the business/victims with all information on how crime committed, their probable
loss and how the security system shall be implanted to protect the victim from cyber-crimes. For example, in this
case, investigators shall inform the business/victim with the risks involved in the loss/beach of data. With such
information the business can take suitable legal step for saving themselves the huge financial loss. However,
the business should be aware of the steps that needs to avoid another data breach in the future and protect
the customers from further destructions. Also, it is important that business should have tools to briefly address
the destructions like data breach to get the depth and scope of the attack. One of the best steps to avoid is to
implement more advanced security frameworks involving with the policies and regulations so business can be
prepared to avoid attacks in future.
122
Cyber Crimes and Investigation Procedures LESSON44
Often, computer forensics is used to uncover evidence that could be used in a court of law. Computer forensics
also encompasses areas outside of investigations. Sometimes professionals in this field might be called upon to
recover lost data from drives that have failed, servers that have crashed or operating systems that have been
reformatted.
Disk Forensics: It deals with extracting raw data from the primary or secondary storage of the device by
searching active, modified, or deleted files.
l Network Forensics: It is a sub-branch of Computer Forensics that involves monitoring and analyzing
the computer network traffic.
l Database Forensics: It deals with the study and examination of databases and their related metadata.
l Malware Forensics: It deals with the identification of suspicious code and studying viruses, worms, etc.
l Email Forensics: It deals with emails and their recovery and analysis, including deleted emails,
calendars, and contacts.
l Memory Forensics: Deals with collecting data from system memory (system registers, cache, RAM) in
raw form and then analysing it for further investigation.
l Mobile Phone Forensics: It mainly deals with the examination and analysis of phones and smartphones
and helps to retrieve contacts, call logs, incoming, and outgoing SMS, etc., and other data present in it.
123
PP-AIDA&CS Cyber Crimes and Investigation Procedures
124
Cyber Crimes and Investigation Procedures LESSON44
The analysis is then done on the copied evidence for suspicious activities and accordingly, the findings
are documented in a nontechnical tone. The documented findings are then presented in a court of law
for further investigations.
l Data Recovery
Aside from working to collect evidence, computer forensics professionals can also work in data recovery.
When it comes to data recovery, forensics professionals can take broken hard drives, crashed servers
and other compromised devices and retrieve the data that was previously lost. This is valuable for
anyone who has lost important data outside of uncovering criminal evidence, such as businesses who
have experienced a system crash.
DIGITAL FORENSICS/DIGITAL EVIDENCES18
Digital forensics is a branch of forensic science which includes the identification, collection, analysis and
reporting any valuable digital information in the digital devices related to the computer crimes, as a part of the
investigation.
In simple words, Digital Forensics is the process of identifying, preserving, analyzing and presenting digital
evidences. It includes the area of analysis like storage media, hardware, operating system, network and
applications.
Steps in Digital Forensics
It consists of following five (s) steps:
18 Reproduced from Geeks for Geeks on Digital Forensics in Information Security, June 16, 2022.
125
PP-AIDA&CS Cyber Crimes and Investigation Procedures
Identification of Evidence: It includes of identifying evidences related to the digital crime in storage media,
hardware, operating system, network and/or applications. It is the most important and basic step.
Collection: It includes preserving the digital evidences identified in the first step so that they don’t degrade to
vanish with time. Preserving the digital evidences is very important and crucial.
Analysis: It includes analysing the collected digital evidences of the committed computer crime in order to trace
the criminal and possible path used to breach into the system.
Documentation: It includes the proper documentation of the whole digital investigation, digital evidences, loop
holes of the attacked system etc. so that the case can be studied and analysed in future also and can be
presented in the court in a proper format.
Presentation: It includes the presentation of all the digital evidences and documentation in the court in order to
prove the digital crime committed and identify the criminal.
For the purpose of acceptance of Digital Evidence in the court of law, the EC Council has identified following
steps of Digital Forensics/Evidence.
Source: https://www.eccouncil.org/what-is-digital-forensics/
Branches of Digital Forensics:
Following are the main branches of digital forensics:
126
Cyber Crimes and Investigation Procedures LESSON44
Media forensics: It is the branch of digital forensics which includes identification, collection, analysis and
presentation of audio, video and image evidences during the investigation process.
Cyber forensics: It is the branch of digital forensics which includes identification, collection, analysis and
presentation of digital evidences during the investigation of a cybercrime.
Mobile forensics: It is the branch of digital forensics which includes identification, collection, analysis and
presentation of digital evidences during the investigation of a crime committed through a mobile device like
mobile phones, GPS device, tablet, laptop.
Software forensics: It is the branch of digital forensics which includes identification, collection, analysis and
presentation of digital evidences during the investigation of a crime related to software only.
127
PP-AIDA&CS Cyber Crimes and Investigation Procedures
Source: geeksforgeeks
128
Cyber Crimes and Investigation Procedures LESSON44
l Data Collection: This is where chain of custody process is initiated. It involves identification, labeling,
recording, and the acquisition of data from all the possible relevant sources that preserve the integrity
of the data and evidence collected.
l Examination: During this process, the chain of custody information is documented outlining the forensic
process undertaken. It is important to capture screenshots throughout the process to show the tasks
that are completed and the evidence uncovered.
l Analysis: This stage is the result of the examination stage. In the analysis stage, legally justifiable
methods and techniques are used to derive useful information to address questions posed in the
particular case.
l Reporting: This is the documentation phase of the Examination and Analysis stage. Reporting includes
the following:
Statement regarding Chain of Custody.
Explanation of the various tools used.
A description of the analysis of various data sources.
Issues identified.
Vulnerabilities identified.
Recommendation for additional forensics measures that can be taken.
The CoC form must be kept up-to-date. This means every time the best evidence is handled off, the chain of
custody form needs to be updated.
129
PP-AIDA&CS Cyber Crimes and Investigation Procedures
l Descriptive list of items submitted for examination: This includes the serial number, make, and model.
l Identity and signature of the examiner.
l Brief description of steps taken during the examination: For example- string searches, graphics image
searches, and recovering erased files.
l Results.
SECURITY AUDIT20
In general, security audit is a systematic evaluation of the security of a company’s information system by measuring
how well it adheres to an established set of criteria. A thorough audit typically assesses the security of the system’s
physical configuration and environment, software, information handling processes and user practices.
Security audits are often used to determine compliance with regulations such as Information Technology Act,
2000 and other rules and regulations applicable on the IT environment of a particular organization. It majorly
specifies how organizations have dealt with the information and data available in the organization.
Meaning of Audit
In order to catch the glimpse of security audit in totality, it also become significant to know and understand the
meaning of Audit.
Audit in general refers to the examination or inspection of various books of accounts by an auditor followed by
physical checking of inventory to make sure that all departments are following documented system of recording
transactions. It is done to ascertain the accuracy of financial statements provided by the organization.21
Audit can be done internally by employees or heads of a particular department and externally by an outside
firm or an independent auditor. The idea is to check and verify the accounts by an independent authority to
ensure that all books of accounts are done in a fair manner and there is no misrepresentation or fraud that is
being conducted.
All the public listed firms have to get their accounts audited by an independent auditor before they declare their
results for any quarter.
As per English Oxford Dictionary, Audit means an official inspection of an organization’s accounts, typically by
an independent body. It also states a word of cautions that many a times, audits are not expected to detect
every fraud.
Cambridge Dictionary refers that Audit is a systematic process to make an official examination of the accounts
of a business and produce a report.
20 Students to note: As one of the major purposes of this paper is to understand law and practice related to Cyber Security, hence the
Security Audit herein refers to cyber security audit in specific.
21 Definition of Audit, The Economic Times.
130
Cyber Crimes and Investigation Procedures LESSON44
131
PP-AIDA&CS Cyber Crimes and Investigation Procedures
Approach Based
l Black Box Audit: In this type of security audit, the auditor only knows about the info that is publicly
available regarding the organization that is to be audited.
l White Box Audit: In this type of security audit, the auditor is provided with detailed info (i.e. source code,
employee access, etc.) regarding the organization that is to be audited.
l Grey Box Audit: In grey box audit, the auditor is provided with some info, to begin with, the auditing
process. This info can also be gathered by the auditors themselves but is provided to save time.
Methodology Based
l Penetration Tests: The auditor tries to break into the organization’s infrastructure.
l Compliance Audits: Only certain parameters are checked to see if the organization is complying with
security standards.
l Risk Assessments: An analysis of critical resources that may be threatened in case of a security breach.
l Vulnerability Tests: Necessary scans are performed to find possible security risks. Many false positives
may be present.
l Due Diligence Questionnaires: Used for an analysis of existing security standards in the organization.
Structure Based Audit
Security audits come in two forms, internal and external audits that involve the following procedures:
l Internal audits: In these audits, a business uses its own resources and internal audit department.
Internal audits are used when an organization wants to validate business systems for policy and
procedure compliance.
l External audits: With these audits, an outside organization is brought in to conduct an audit. External
audits are also conducted when an organization needs to confirm it is conforming to industry standards
or government regulations.
There are two subcategories of external audits: Second and Third Party Audits. Second Party audits are
conducted by a supplier of the organization being audited. Third Party audits are done by an independent,
unbiased group, and the auditors involved have no association with the organization under audit.
Steps – On Conducting Security Audit:
Step 1: Preliminary Audit Assessment
This stage is used to assess the current technological maturity level/status of the company and helps to identify
the required time, cost and scope of an audit. Firstly, one need to identify the minimum-security requirements,
which are as below:
l Security policy and standards
l Organizational and Personal security
l Communication, Operation and Asset management
l Physical and environmental security
l Access control and Compliance
l IT systems development and maintenance
132
Cyber Crimes and Investigation Procedures LESSON44
l IT security incident management
l Disaster recovery and business continuity management
l Risk management.
Step 2: Planning & Preparation
The auditor should plan a company’s audit based on the information found in previous step. Planning an audit
helps the auditor obtain sufficient and appropriate evidence for each company’s specific circumstances. It helps
predict audit costs at a reasonable level, assign the proper manpower and time line and avoid misunderstandings
with clients.
An auditor should be adequately informed about the company and its critical business activities before
conducting a data center review. The objective of the data center is to align data center activities with the
goals of the business while maintaining the security and integrity of critical information and processes. To
adequately determine whether the client’s goal is being achieved, the auditor should perform the following
before conducting the review:
l Meet with IT management to determine possible areas of concern
l Review the current IT organization chart
l Review job descriptions of data center employees
l Research all operating systems, software applications, and data center equipment operating within the
data center
l Review the company’s IT policies and procedures
l Evaluate the company’s IT budget and systems planning documentation
l Review the data center’s disaster recovery plan.
Step 3: Establishing Audit Objectives
In the next step, the auditor outlines the objectives of the audit after that conducting a review of a corporate
data center takes place. Auditors consider multiple factors that relate to data center procedures and activities
that potentially identify audit risks in the operating environment and assess the controls in place that mitigate
those risks. After thorough testing and analysis, the auditor is able to adequately determine if the data center
maintains proper controls and is operating efficiently and effectively.
Following is a list of objectives the auditor should review:
l Personnel procedures and responsibilities, including systems and cross-functional training.
l Change management processes are in place and followed by IT and management personnel.
l Appropriate backup procedures are in place to minimize downtime and prevent loss of important data.
l The data center has adequate physical security controls to prevent unauthorized access to the data
center.
l Adequate environmental controls are in place to ensure equipment is protected from fire and flooding.
Step 4: Performing the Review
The next step is collecting evidence to satisfy data center audit objectives. This involves traveling to the data
center location and observing processes and within the data center. The following review procedures should be
conducted to satisfy the pre-determined audit objectives:
133
PP-AIDA&CS Cyber Crimes and Investigation Procedures
l Data Center Personnel – All data center personnel should be authorized to access the data center (key
cards, login ID’s, secure passwords, etc.). Data center employees are adequately educated about data
center equipment and properly perform their jobs. Vendor service personnel are supervised when doing
work on data center equipment. The auditor should observe and interview data center employees to
satisfy their objectives.
l Equipment – The auditor should verify that all data center equipment is working properly and effectively.
Equipment utilization reports, equipment inspection for damage and functionality, system downtime
records and equipment performance measurements all help the auditor determine the state of data
center equipment. Additionally, the auditor should interview employees to determine if preventative
maintenance policies are in place and performed.
l Policies and Procedures – All data center policies and procedures should be documented and located
at the data center. Important documented procedures include data center personnel job responsibilities,
back up policies, security policies, employee termination policies, system operating procedures and an
overview of operating systems.
l Physical security / environmental controls – The auditor should assess the security of the client’s data
center. Physical security includes bodyguards, locked cages, man traps, single entrances, bolted-down
equipment, and computer monitoring systems. Additionally, environmental controls should be in place
to ensure the security of data center equipment. These include Air conditioning units, raised floors,
humidifiers and uninterruptible power supply.
l Backup procedures – The auditor should verify that the client has backup procedures in place in the
case of system failure. Clients may maintain a backup data center at a separate location that allows
them to instantaneously continue operations in the instance of system failure.
Step 5: Preparing the Audit Report
After the audit examination is completed, the audit findings and suggestions for corrective actions can be
communicated to responsible stakeholders in a formal meeting. This ensures better understanding and support
of the audit recommendations. It also gives the audited organization an opportunity to express its views on the
issues raised.
Writing a report after such a meeting and describing where agreements have been reached on all audit issues
can greatly enhance audit effectiveness. Exit conferences also help finalize recommendations that are practical
and feasible.
Step 6: Issuing the Review Report
The audit review report should summarize the auditor’s findings and be similar in format to a standard review
report. The review report should be dated as per the completion of the auditor’s inquiry and procedures. It
should state what the review entailed and explain that a review provides only “limited assurance” to third
parties.
Typically, a security audit review report consolidates the entirety of the audit. It also offers recommendations
surrounding proper implementation of physical safeguards and advises the audited organization on appropriate
roles and responsibilities of its personnel. Generally, the audit report include:
l The auditors’ procedures and findings.
l The auditors’ recommendations.
l Objective, scope, and methodologies.
l Overview/conclusions.
134
Cyber Crimes and Investigation Procedures LESSON44
The security audit report may optionally include rankings of the security vulnerabilities identified throughout the
performance of the audit and the urgency of the tasks necessary to address them. Rankings like “high”, “low”,
and “medium” can be used to describe the imperativeness of the tasks.
Concluding Remarks
The above discussion confirms the signification of security audit for fortifying the IT infrastructure of a company
as well as the minimize the probability of cyber-attacks. A well conducted security audit ensures the following:
l Identify potential threats including the loss of data, equipment or records through natural disasters,
malware or unauthorized users.
l Evaluate security and risks. Apart from assessing the risk of each of the identified threats happening, it
also guides on how well the organization can defend against them.
l Determine the needed controls by Identifying what security measures must be implemented or improved
to minimize risks.
l Helps the organization in ensuring compliance with the applicable laws and regulations related to the
IT infrastructure and requirement of the company.
Hence, it will be apt to state that periodic security audit is directly proportionate to the growth of the
organization.
Retribution by China
In May 1999 the accidental bombing of a Chinese embassy in Yugoslavia by U.S. Bombers, led to a massive
website defacement and email bombardment attack on American companies and agencies. Pro Chinese
hackers and political groups executed the attacks to gain sympathy for Chinese cause. US Government sites
22. “Middle East E-mail Flooding and Denial of Service (DoS) Attacks” – National Infrastructure Protection C enter – October 26, 2000
and also at http://www.nipc.gov/warnings/assessments/2000/00-057.htm and https://www.sans.org/reading-room/whitepapers/threats/
conventional-terrorismthe-cyber- assault-931 (Accessed on 14th February, 2016)
23. “Cyber Attacks during the War on Terrorism” India/Pakistan Conflict, Institute for Security Technology Studies - Dartmouth College Vatis,
Michael A - September 22, 2001. also at http://www.ists.dartmouth.edu/docs/cyber_a1.pdf (Accessed on 14th February, 2016)
135
PP-AIDA&CS Cyber Crimes and Investigation Procedures
such as the US department of energy and the interior and the National Park Service were all hit and had
website defaced along with the White House website. The sites were downed for three days by continual e-mail
bombing. Although the attack was rather random and brief and affected a small number of U.S. sites, the effects
could have been worse.24
Yugoslavia Conflict
When NATO26 air strikes hit Former republic of Yugoslavia in Kosovo and Serbia, NATO web servers were
subjected to sustained attacks by hackers employed by the Yugoslav military. All NATO’s 100 servers were
subjected to “ping saturation”, Distributed Denial Of service assaults and bombarded with thousands of
e-mails, many containing viruses. The attacks on NATO servers coincided with numerous website defacements
of American military, government, and commercial sites by Serbian, Russian, and Chinese sympathizers of
Yugoslavia. These attacks cause serious disruption of NATO communications infrastructures.
24. Cyber Protests: The Threat to the U.S. Information Infrastructure, October 2001. Also available at https://www.sans.org/reading-room/
whitepapers/threats/conventional- terrorismthe-cyber-assault-931 (Accessed on 14th February, 2016)
25. Cyber Terrorism – “Testimony before the Special Oversight Panel oil Terrorism”- Dorothy E Denning - May 23, 2000. also at https://www.
sans.org/reading- room/whitepapers/threats/conventional-terrorismthe-cyber-assault-931 (Accessed on 14th February, 2016)
26. The North Atlantic Treaty Organization, also called the North Atlantic Alliance, is an intergovernmental military alliance based
on the North Atlantic Treaty which was signed on 4 April 1949. The organization constitutes a system of collective defence whereby its
member states agree to mutual defense in response to an attack by any external party. (Source Wikipedia accessed on 16th February,
2016)
27. See “Attack of the cyber terrorists” by MICHAEL HANLON Available at: http://www.dailymail.co.uk/sciencetech/article-457504/Attack-
cyber-terrorists.html (Accessed on 16th February, 2016)
136
Cyber Crimes and Investigation Procedures LESSON44
137
PP-AIDA&CS Cyber Crimes and Investigation Procedures
30. Article by Praveen Dalal, Cybercrime and cyber terrorism: Preventive defence for cyberspace violations, Computer Crime Research
Center, March 10, 2006.
31. http://gadgets.ndtv.com/internet/news/india-must-wake-up-to-cyber-terrorism-349274 (Accessed on 16th February, 2016)
32. Ibid
138
Cyber Crimes and Investigation Procedures LESSON44
anonymous hackers whose members write slogans critical of India and its claim over Kashmir, have
owned up to several instances of hacking of Indian sites run by the Indian government like breaking
into the high security computer network of Bhabha Atomic Research Center.
4. Indian Parliament attack is one of the deadliest attacks on Indian Democracy. It is a case of cyber
terrorism where accused committed cyber forgery and made passes, downloaded official logo and
layout map of the parliament has been downloaded through the Pakistan service provider. They
controlled the e-mail and identity system of Indian Army.
5. In March, 2016 the Indian Infrastructure was attacked by the Terror outfit with the name of Al Qaeda
who, allegedly hacked a micro site of the Rail net page of the Indian Railways to show its sinister
reach for the first time. The hacked page of Bhusawal division of Personnel Department of the Central
Railway and part of a large intranet created for the department’s administrative needs was replaced by
a message of Maulana Aasim Umar, Al Qaeda chief in south Asia, for all Indian Muslims to participate
in Jihad.33
Information Technology becomes an easy tool in hands of terrorist. They use computers and networks to
communicate with their operatives all around the world in codes without detected by the enforcement agencies.
Cases like Ayodhya incident, attack in Mumbai in 2006, defacement of Indian Military sites in India by hackers
in July 2005, attack on American Center at Kolkata and Pathankot Terrorist Attack etc., are the major cyber
terrorist attacks in India.
As per the cyber law and cyber security expert Prashant Mali “The threat landscape remains very threatening,
India is awakening to the global threat of cyber warfare now. Our cyber security is still ineffective as mass
awakening towards it is missing or inadequate. Even though NTRO and DRDO are mandated with cyber
offensive work, only time will show effectiveness of these organisations.”
With cyber security impacting the country’s security, Shiv Shankar Menon, the national security adviser,
announced that the government is putting in place national cyber security architecture to prevent sabotage,
espionage and other forms of cyber threats.
Shantanu Ghosh, vice president at India Product Operations-Symantec Corporation, which developed Norton
Antivirus has said that “The past few years have witnessed a dramatic shift in the threat landscape. The motivation
of attackers has moved from fame to financial gain and malware has become a successful criminal business
model with billions of dollars in play. We have now entered a third significant shift in the threat landscape, one
of cyber- espionage and cyber-sabotage.”
Rikshit Tandon, advisor to the Cyber Crime Unit of the Uttar Pradesh Police, said: “Cyber terrorism is a grave threat
not only to India but to the world. It can come to any country and, yes, a proactive measure by government and
consortium of countries needs to be taken as a collective effort and policy since internet has no geographical
boundaries”.34
Hacking
Hacking is labelled as amongst the most serious of all cyber crimes. It is said that hacking erodes the faith
of people in information technology and the Internet. Hacking a computer system has been projected as a
menace requiring harsh laws to act as deterrents. Such a general projection is somewhat misconceived.
Hacking a computer simply implies getting into another’s computer without permission. Gaining unlawful
access to another’s computer is hacking. Unauthorized entry into a computer belonging to another is hacking.
139
PP-AIDA&CS Cyber Crimes and Investigation Procedures
It is equivalent to phone-tapping. Hackers see the weakness in the target computer programme and then find
ways to enter and access therein. Anti- hacking tools such as the ‘Firewall’ technology and intrusion detection
systems are preventive measures that can be taken to protect a computer from being hacked. Firewall, like
a wall of fire, prevents hacking. Intrusion detection systems will in addition also try to detect the source of
hacking.
Hacking perse, in simple terms, is criminal trespass into a computer that is a private property. Criminal trespass
under the Indian Penal Code, 1860 is simply defined as entering into property in the possession of another with
intent to commit an offence or to intimidate, insult or annoy any person in possession of such property, or having
lawfully entered into or upon such property, by unlawfully remaining there with intent thereby to intimidate,
insult or annoy any such person or with intent to commit an offence.35 Criminal trespass entails a punishment of
imprisonment upto three months or fine upto rupees five hundred, or with both36 Criminal trespass perse is thus
a minor offence.
140
Cyber Crimes and Investigation Procedures LESSON44
restraint or putting any person in such fear, the punishment prescribed is imprisonment extending to seven
years.43 Lurking house- trespass or housebreaking is punishable with imprisonment extending to two years.44
Lurking house-trespass or housebreaking in order to commit an offence punishable with imprisonment, is liable
for imprisonment upto three years and if such intended offence is theft, the term of imprisonment has been
extended to ten years.45 The punishment for lurking house-trespass or housebreaking by night is punishable
with imprisonment extending to three years.46 Grievous hurt caused whilst committing lurking house-trespass
or housebreaking, is punishable with imprisonment for life, or imprisonment extending to ten years.47 All
persons jointly concerned in lurking house- trespass or housebreaking by night, are liable to be punished with
imprisonment for life or extending to ten years, where death or grievous hurt is caused or attempted to be
caused by any one or more of them.48
Another instance of an offence that has numerous species is “mischief”. Every species of mischief is separately
laid down in the I.P.C. with differing punishments, depending upon the magnitude thereof.49 Many of the offences
in the I.P.C. such as robbery, criminal breaches of trust, cheating etc., have their respective species that are
treated differently from one another.
The legal approach towards hacking should be the same as that of criminal trespass, mischief and the
innumerable other offences in the I.P.C. All forms of hacking cannot be treated alike. It needs to be understood
that hacking too has numerous dimensions and species like other offences.
A person who enjoys exploring computer systems is also a hacker. Many teenagers obsessed with the Internet
and computers hack for fun and excitement. Excitement to make an impact, show of capability and knowledge
of computers, fun and publicity, and the desire to explore are some of the motives of these teenagers to hack
into computer systems.
Another form of hacking is by Internet security companies, to test the computer systems of their clients and
potential clients, to impress them and get business assignments of setting up security systems for the clients.
Hacking is also committed to damage the business of competitors and enemies. Disruption of a computer and
denial of access to a person authorized to access any computer, are some of the damages that may be caused
by hacking. Hacking is also done to spy into others computer systems and for stealing information/data residing
therein. Hacking is also used as a Weapon to commit other crimes such as cheating and misappropriation of
funds electronically from the bank account of another.
Hacking is done at the country level too. Frequently, Pakistani hackers are accused of hacking Indian web-sites.
For instance, the web-site of SEBI (Stock Exchange Board of India) was hacked whereby a link to a pornographic
web-site was inserted.
Hacktivists are protestors against governments or institutions / organizations, who protest through hacking. For
instance, anti-globalization protests have been made through hacking the web-site of WTO.
There are therefore numerous species of hacking, though in essence, it is the offence of criminal trespass.
All forms of hacking cannot thus be treated alike. It is the intent, purpose and consequences of hacking that
determine its gravity. A twelve year old, who, for excitement and playing a prank enters restricted web-sites,
should not be treated as a national enemy. A terrorist organization hacking into a protected system such as
the defence computer systems to steal nuclear secrets, or a criminal syndicate hacking to misappropriate huge
amounts, cannot be treated on par with a teenager prying into the computer system of his best friend’s girlfriend
141
PP-AIDA&CS Cyber Crimes and Investigation Procedures
or even the CBI (Central Bureau of Investigation) for fun and excitement. The nature of the hacking determines
the gravity and all forms of hacking should not be projected or legally treated in the same manner. Hacking has
so many species. Hacking is a skill that can be used positively as well as negatively. A man opening locks to
help people who have lost the key is a locksmith. However, a person who opens locks to steal is a thief.
The seriousness of hacking depends upon the nature, purpose, intent and the extent of loss and injury that
are caused to the victim. For instance, in a reported incident in the U.S., the owner of a hobby web-site for
children received an e-mail informing her that a group of hackers had gained control over her web-site. They
demanded a ransom of one million dollars. The threat was overlooked as a mere scare tactic. A few days late,
she discovered that the hackers had ‘web-jacked’ her web-site. ‘Web-jacking’ has been equated with hijacking
an aeroplane, as forcibly assuming control of a web-site, for diverse motives. The hackers had altered a part
of the web-site which said “How to have fun with goldfish”. The word “goldfish” was replaced with “piranhas”.
Piranhas are tiny but extremely dangerous flesh eating fish. Many children visiting the web-site, purchased
‘piranhas’ from pet shops and tried playing with them, thereby hurting themselves badly.50
Hacking in various forms is already part of several offences, either as the means to their commission or as a
consequence. For instance, hacking could be a tool and means to commit cheating, misappropriation, criminal
breach of trust, theft, copyright violations, spying into official secrets, or as part of the conspiracy to wage war
against the State, that are all well defined offences. Some of the species of hacking have been defined as
contraventions as well as criminal offences in the LT. Act, 2000 as amended by the I.T. (Amendment) Act, 2008.
In the original version of the I.T. Act, 2000, section 66 defined and punished hacking in the following terms:
“Hacking with Computer System - (1) Whoever with the intent to cause or knowing that he is likely to cause
wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in
a computer resource or diminishes its value or utility or affects is injuriously by any means, commits hacking.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may
extend upto two lakh rupees, or with both”.51
The title of the aforesaid section 66 was a misnomer, which created confusion. It was widely believed as if
section 66 was the only legal provision that dealt with the offence of hacking a computer system. This confusion
has been done away with, by certain amendments made by the I.T. (Amendment) Act, 2008. The words “Hacking
with Computer System” have been deleted from section 66, the scope of which has been substantially widened:
“If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with
imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or
with both”.
The various species of the offence of hacking that are provided (even though not called ‘hacking’ specifically)
for or may have elements of hacking, in the amended version of the I.T. Act, 2000 are:
l Access to a computer.
l Downloading, copying or extraction of data from a computer.
l Introducing computer virus and contaminants.
l Causing damage to a computer.
l Causing disruption of a computer.
l Causing denial of access to a computer.
l Affecting critical information infrastructure.
l Cyber terrorism.
50. “Hack Attack” by Shuchi Nagpal, Asian School of Cyber Laws in Indian Express Vigil, March 2002. also available at http://www.asianlaws.
org/press/hack_attack.htm (Accessed on 20th February, 2016)
51. Information Technology Act, 2000., s. 66
142
Cyber Crimes and Investigation Procedures LESSON44
LESSON ROUND-UP
l As discussed in the previous chapters that use of Internet and rapid deployment of information and
communication technologies in recent years have bought various changes in the world both at
individual level as well as organization level.
l Right from the way we communicate to the way we buy our groceries, each and every activity of
human life is revolutionized with the help of information and communication technology. Crime is not
an exception to this revolution brought by information and communication technologies.
l On one hand wherein the pattern of crime has been altered by misusing the tools and techniques
of information and communication technology, on the similar hand, historic trends and practices in
criminal investigation has also been revolutionized.
l This has created a tremendous challenge for law enforcement to develop the capacity to confront
transnational crimes and follow evidence trails.
l India has been a favorite hub for cybercriminals, mostly hackers and other malevolent users who
misuse the Internet by committing crimes.
l On one hand where we are witnessing the advancement of information and communication technology;
on the similar end, we are seeing the new tools and techniques of committing cybercrimes.
l In general, cyber criminals make use of various tools and techniques yet the following are the most
common tools and techniques used recently to conduct cybercrimes.
l The discussion above confirm that India is facing the growing threat of cybercrimes.
l This has led government of India to channelize the effective ways in enhancing the level of cyber
security.
l The Government of India had launched the online cyber-crime reporting portal, www.cybercrime.gov.
in, which is a citizen-centric initiative, to allow the complainants to lodge complaints relating to child
pornography/child sexual abuse material or any content which is sexual in nature.
l For conducting cyber-crime investigation, certain special skills and scientific tools are required without
which the investigation is not possible.
l Due to the Information Technology Act, 2000 (“IT Act”), certain provisions of Criminal Procedure Code
and the Evidence Act, have been amended.
l Along with this, certain new regulations had been enforced by the Indian legal system to meet with the
need of cyber-crime investigation.
l In general parlance, computer forensics is a field of technology that uses investigative techniques to
identify and store evidence from a computer device.
l Computer forensics is primarily used for two separate purposes, investigation and data recovery.
l Both computer forensics and cyber security deal with criminals and computers, hence many a times
they are considered rather similar.
l Despite this initial similarity, the function of computer forensics and cyber security greatly differs from
each other.
l Computer forensics can be an essential facet of modern investigations.
l When a crime is committed and an investigation is started, one of the more common places to look for
clues is the computer or cell phone of a suspect. This is where a computer forensics professional enters
the picture.
143
PP-AIDA&CS Cyber Crimes and Investigation Procedures
l Digital forensics is a branch of forensic science which includes the identification, collection, analysis
and reporting any valuable digital information in the digital devices related to the computer crimes, as
a part of the investigation.
l The digital evidence and digital chain of custody are the backbones of any action taken by digital
forensic specialists. Chain of Custody refers to the logical sequence that records the sequence
of custody, control, transfer, analysis and disposition of physical or electronic evidence in legal
cases.
l Each step in the chain is essential and in case any step is missed, then the evidence may be rendered
inadmissible in the court of law. Thus, we can say that preserving the chain of custody is about following
the correct and consistent procedure and hence ensuring the quality of evidence.
l In general, security audit is a systematic evaluation of the security of a company’s information system
by measuring how well it adheres to an established set of criteria.
l A thorough audit typically assesses the security of the system’s physical configuration and environment,
software, information handling processes and user practices.
l Security audits are often used to determine compliance with regulations such as Information Technology
Act, 2000 and other rules and regulations applicable on the IT environment of a particular organization.
l It majorly specifies how organizations have dealt with the information and data available in the
organization.
l The above discussion confirms the signification of security audit for fortifying the IT infrastructure of a
company as well as the minimize the probability of cyber-attacks.
l Identify potential threats including the loss of data, equipment or records through natural disasters,
malware or unauthorized users.
l Evaluate security and risks. Apart from assessing the risk of each of the identified threats happening, it
also guides on how well the organization can defend against them.
l Determine the needed controls by Identifying what security measures must be implemented or
improved to minimize risks.
l Helps the organization in ensuring compliance with the applicable laws and regulations related to the
IT infrastructure and requirement of the company.
l Hence, it will be apt to state that periodic security audit is directly proportionate to the growth of the
organization.
TEST YOURSELF
(These are meant for recapitulation only. Answers to these questions are not to be submitted for evaluation.)
3. What is Computer Forensics? Mention the significance of Computer Forensics in Cyber Crime.
4. What do you mean Digital Forensics? Describe the branches of Digital Forensics.
144
Cyber Crimes and Investigation Procedures LESSON44
l Security Audit
l Important Cyber Law Case Studies, Cyber Laws and Information Security Advisors. Available at
https://www.cyberralegalservices.com/detail-casestudies.php
l Katz Eric, Cyber Forensics: The Fascinating World of Digital Evidences, Purdue Cyber Forensic Labs
l Graeme Edwards (2020) Cybercrime Investigators Handbook, (Audio Book), Audible by Amazon
l Nelson, Phillips and Steuart (2019) Guide to Computer Forensics and Investigations 6TH edition,
CENGAGE INDIA
l Sharma Nishesh (2017) Cyber Forensics in India: A Legal Perspective, Universal Law Publishing,
India.
l Data Security Council of India (2011) Cyber Crime Investigation Manual with Knowledge Partner Deloitte
l Irwin Luke (2022) What is a Cyber Security and Why is it Important? IT Governance Blog
l Legislative Audit Division - State of Montana (2006, June). “Data Center Review” Helena, MT
l Privacy Technical Assistance Center, “Responding to IT Security Audits: Improving Data Security
Practices”. PDF
l Varghese Jinson (2023) IT Security Audit: Importance, Types and Methodology, Astra.
145
PP-AIDA&CS Cyber Crimes and Investigation Procedures
146
Regulatory Framework on Ai, Lesson
Cyber Security and Cyberspace 5
KEY CONCEPTS
n E-Governance n RBI Regulations n Artificial Intelligence n Cyber Security n Cyberspace n SEBI Regulations
n International Principles
Learning Objectives
To understand:
How to focus on major themes pertaining to artificial intelligence and cybersecurity-crime and its
inter-relationship
The responsibility and function of regulatory authority like SEBI and RBI governing the issues related
to Artificial Intelligence and cyberspace
To study international legal regime related to development of modern technology tools like AI to
improve the existing position of digital security
Lesson Outline
E-Governance in India
RBI Regulations governing AI, Cyber Security and Cyberspace
SEBI Regulations governing AI, Cyber Security and Cyberspace
International Principles governing AI, Cyber Security and Cyberspace
Other Applicable Regulatory Framework
Lesson Round-Up
Test Yourself
List of Further Readings
List of Other References
147
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
E-GOVERNANCE IN INDIA
Meaning of e-Governance
E-Governance as the name suggest is made up of two words. “E” and “Governance”. Hence to understand the
concept of e-Governance, we shall first understand the meaning of Governance. Governance is the process of
making and enforcing decisions within an organization or society.1 It is the process of interactions through the
laws, social norms, power (social and political) or language as structured in communication of an organized
society over a social system (family, social group, formal or informal organization, a territory under a jurisdiction
or across territories). It is usually done by the government of a state. Conceptually, governance can be defined
as the rule of the rulers, typically within a given set of rules. One might conclude that governance is the process
– by which authority is conferred on rulers, by which they make the rules, and by which those rules are enforced
and modified. Hence with “e” in e-Governance which stands for ‘electronic’ - is basically associated with
carrying out the functions and achieving the results of governance through the utilization of ICT (Information
and Communications Technology).
However, this would require the government to change itself – its processes, its outlook, laws, rules and
regulations and also its way of interacting with the citizens. It would also require capacity building within the
government and creation of general awareness about e-Governance among the citizens.
The Council of Europe referred to e-Governance as:
l the use of electronic technologies in three areas of public action;
l relations between the public authorities and civil society the functioning of the public authorities at all
stages of the democratic process (electronic democracy);
l the provision of public services (electronic public services).
In a broader sense, ‘e-governance’ is all about reform in governance facilitated with the inventive and resourceful
use of ICT.
Evolution of E-Governance
Electronic Governance, popularly known as e-governance. E-Governance originated in India during the 1970s
with a focus on in-house government applications in the areas of defence, economic monitoring, planning and
deployment of ICT to manage data intensive functions related to elections, census, tax administration etc. It is a
distinct dimension of New Public Management (NPM) which has gained considerable momentum since the early
1990s. The term ‘e-Governance’ is often used to describe the networking paradigm and its decentralizing and
communicatory implications. E-governance as competing paradigms is the process of enabling governance
experts using Information and Communication Technology (ICT) to make governance effective for citizens in
terms of efficiency, transparency, and cost-effectiveness.
l The establishment of the Department of Electronics in 1970 was the first major step towards
e-governance in India as it brought ‘information’ and its communication to focus.
l National Informatics Centre (NIC) established in 1977, launched the District Information System
program to computerize all district offices in the country
l The main thrust for e-governance was provided by the launching of NICNET in 1987 – the national
satellite-based computer network.
Demands of transparency, ethics, rightfulness, access to justice, eradication of corruption and other related
issues along with welfare driven political leadership, other associated governments, capacity building needs
1. Compare: Bevir, Mark (2012). Governance: A very short introduction. Oxford, UK: Oxford University Press. ISBN 9780191646294
148
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
and perceived citizen expectations and all has contributed to adoption of e-government methods for good
governance.
At a broader level, apart from delivering government services, e-governance includes integration of several
stand-alone systems and services between Government-to-Citizens (G2C), Government-to-Business (G2B),
and Government-to-Government (G2G) as well as back-office processes and interactions within entire
government framework.
The overall objective of such e-governance is to enable the administration to provide services with affordable
cost and optimum time to the end user (citizen).
Objectives
l Better service delivery to citizens.
l Ushering in transparency and accountability.
l Empowering people through information.
l Improve efficiency within Government i.e. between center-state or inter-states.
l Improve interface with business and industry.
Pillars of e-Governance
People
Technology
Pillars of
Process
e-Governance
Resources
149
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
Electronic governance or e-governance is adopted by countries across the world. In a fast-growing and
demanding economy like India, e-governance has become essential. The rapid growth of digitalisation has led
to many governments across the globe to introduce and incorporate technology into governmental processes.
Electronic governance or e-governance can be defined as the usage of Information and Communication
Technology (ICT) by the government to provide and facilitate government services, exchange of information,
communication transactions and integration of various standalone systems and services.
In other words, it is the use of technology to perform government activities and achieve the objectives of
governance. Through e-governance, government services are made available to citizens and businesses
in a convenient, efficient and transparent manner. Examples of e-governance include Digital India initiative,
National Portal of India, Prime Minister of India portal, Aadhaar, filing and payment of taxes online, digital land
management systems, Common Entrance Test etc.
2. Reproduced from E-governance in India: Concept, Initiatives and Issues, Insignts on India, 2018
150
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
The Government approved the National e-Governance Plan (NeGP), comprising of 27 Mission Mode Projects
and 8 components, on May 18, 2006. In the year 2011, 4 projects - Health, Education, PDS and Posts were
introduced to make the list of 27 MMPs to 31Mission Mode Projects (MMPs). The Government has accorded
approval to the vision, approach, strategy, key components, implementation methodology, and management
structure for NeGP. However, the approval of NeGP does not constitute financial approval(s) for all the Mission
Mode Projects (MMPs) and components under it. The existing or ongoing projects in the MMP category, being
implemented by various Central Ministries, States, and State Departments would be suitably augmented and
enhanced to align with the objectives of NeGP.
In order to promote e-Governance in a holistic manner, various policy initiatives and projects have been
undertaken to develop core and support infrastructure. The major core infrastructure components are State
Data Centres (SDCs), State Wide Area Networks (S.W.A.N), Common Services Centres (CSCs) and middleware
gateways i.e National e-Governance Service Delivery Gateway (NSDG), State e-Governance Service Delivery
Gateway (SSDG), and Mobile e-Governance Service Delivery Gateway (MSDG). The important support
components include Core policies and guidelines on Security, HR, Citizen Engagement, Social Media as well as
Standards related to Metadata, Interoperability, Enterprise Architecture, Information Security etc. New initiatives
include a framework for authentication, viz.
e-Pramaan and G-I cloud, an initiative which will ensure benefits of cloud computing for e-Governance projects.
151
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
l Posts
Modernization of Postal Services has been undertaken by the Department of Posts through
computerization and networking of all post offices using a central server-based system, and setting up
of computerized registration centers (CRCs).
It is a unique initiative of the Government of India conceptualized under the umbrella of the overall
National e-Governance Plan (NeGP) and the Jawaharlal Nehru National Urban Renewal Mission
(Jnnurm) aimed at improving operational efficiencies within Urban Local Bodies (ULBs).
Crime and Criminal Tracking Network & Systems (CCTNS) MMP aims at creating a comprehensive and
integrated system for enhancing the efficiency and effective policing at all levels and especially at
the Police Station level through adoption of principles of e-Governance, and creation of a nationwide
networked infrastructure for evolution of IT-enabled state-of-the-art tracking system.
Computerization of the PDS is envisaged as an end-to-end project covering key functional areas such
as supply chain management including allocation and utilization reporting, storage and movement of
food grains, grievance redressal and transparency portal, digitization of beneficiary database, Fair
Price Shop automation, etc.
l Health
ICT for programme management has been undertaken by the Ministry of Health & Family Welfare
in the Mother and Child Tracking System (MCTS) programme and the Ministry envisages a more
comprehensive use of ICT including for Hospital Information Systems, supply chain management
for drugs and vaccines, providing ICT tools to ASHA and ANM workers, programme management of
National Rural Health Mission (NRHM), etc. through this MMP.
l e-panchayat
The Panchayati Raj Institutions (PRIs) are saddled with the problems of inadequate physical and
financial resources, technical capabilities and extremely limited computerization. As a result, the
potential of PRIs as the preferred delivery channel for the schemes of State and Centre as well as for
citizen services has not been fully realized. While some computerization efforts for PRIs have been
made by NIC over the years, the e-Governance revolution sweeping the country has not touched the
PRIs yet in significant measure. The Ministry of Panchayati Raj, Government of India has therefore
decided to take up the computerization of PRIs on a mission mode basis.
l e-District
e-District is one of the 31 Mission Mode Projects under National e Governance Plan (NeGP) with the
DIT, GoI being the nodal ministry. This project aims at providing support to the basic administrative unit
i.e. District Administration by undertaking backend computerization to enable electronic delivery of
high volume citizen centric government services which would optimally leverage and utilize the three
infrastructure pillars of State Wide Area Networks (SWAN), State Data Centers (SDC) and Common
Service Centers (CSCs) to deliver services to the citizen at his doorsteps.
152
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
Recent Initiatives
Some of the major recent initiatives under e-Governance includes the follows:
l Direct Cash Transfer
l Aadhar Enabled Payment System
l MyGov Citizen Portal
l E-Kranti Scheme
l Digital Cloud for every Indian
l Digital India Program.
153
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
154
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
Seeing the potential of digitalization and its constructive impact supporting inclusive development of our country,
Government of India has launched the “Digital India” campaign. The Digital India drive envisions transforming
our nation and creating opportunities for all citizens by harnessing digital technologies.
One notable aspect of the Digital India program is that it is aimed at catching the imagination of the people
and this is the reason that Digital India has attracted the attention of almost everyone, both within the country
and abroad. This is potentially one of the schemes which can bring about transformational benefits and
fundamentally alter almost every aspect of our national life including the way citizens interact with not just the
government but with each other.
The vision of Digital India program is to empower every citizen with access to digital services, knowledge
and information. It can be summarized that this is intending to develop a digitally empowered society and to
digitally integrate the government departments and the citizens of India. It aims at ensuring that the government
services are made available to people of India electronically. Digital India is a Programme to prepare India for
a knowledge future.
Digital India- Meaning and Concepts
Digital India is an initiative undertaken by the Government of India to integrate the government departments
and the people of India. It aims at ensuring that the government services are made available to citizens
electronically by reducing paperwork, increasing transparency, and also to encourage transparency in the
system for government services and facilities. The initiative also plans to connect rural areas with high-speed
internet networks.
One of the major objectives of Digital India includes in providing high speed internet connectivity to 250,000
Gram Panchayats, improve inter-operability, and promote digital literacy.
Digital India is a campaign run by the government of India to make this country a digitally empowered country.
The aim of launching this campaign is to provide Indian citizens electronic government services by reducing
the paperwork. It is very effective and efficient technique which will save time and man power to a great extent.
This initiative was started to connect people of rural areas with the high-speed internet networks to access any
information needed.
Digital India movement is majorly emplacing on promoting e-governance and to transform India into digitally
empowered society and knowledge economy. As per the expert views, Digital India movement is channelized
in preparing India for the knowledge-based transformation and delivering good governance to citizens by
synchronized and co-ordinated engagement with both Central Government and State Governments.
Aims and Objectives:
Digital India campaign has been implemented by the Government of India to ensure following aims and
objectives:
l To ensure the broadband highways;
l To ensure the universal access to mobile phones;
l To facilitate people with high-speed internet;
l To bring e-Governance by reforming government through digitization;
l To bring e-Kranti through electronic delivery of services;
l To make available online information for all;
l To ensure more jobs under the IT specialization.
155
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
Key Areas:
With a view to enlarge the reach of government services to the remotest areas of our country, Digital India
programme is objectifying on three key vision areas which includes ‘Digital Empowerment; Development of
Digital Infrastructure and Ease of accessibility of e-governance and digital services.’
1. Digital Empowerment: To avail the maximum gain of Digital India drive, it is must that the citizens of our
nation should be aware about the facilities and the means to avail them to their fullest. Therefore, to
ensure directed empowerment towards digitalization, government has introduced various schemes to
achieve following aims like universal digital literacy, universally accessible digital resources, availability
of digital resources and services in maximum Indian languages. Further, collaborative digital platforms
are also established for participative governance wherein the citizens are not required to physically
submit documents or certificates to the government and it can be done digitally.
2. Digital Infrastructure: No facility can be availed without a proper infrastructure, so it is with digital
services. To set up an excellent Digital Infrastructure is one the major priority of the government to
ensure reach of the utility to every citizen. To build the requisite digital infrastructure, government is
initiating the following activities:
l Mobile and Bank account would enable participation in digital and financial space at individual
level;
3. E-Governance & e-Services: With a view to extend the reaping of e-governance and to ensure
the availability of e-services on demand, effortlessly integrated services are established across
departments or jurisdictions. The services of digital era are made available in real time from online &
mobile platforms.
Apart from this, all citizens are receiving entitlements to be portable and available on the cloud. Digitally
transformed services are provided for improving ease of doing business. Along with this, citizens are also
encouraged in making financial transactions electronic & cashless. Best among all is the institution of Leveraging
Geospatial Information Systems (GIS) for decision support systems & development.
To emplace the key drivers of Digital India movement, the government has launched several initiatives like
digital locker under the name “Digi Locker” which aims to minimize the usage of physical documents and
enable sharing of e-documents across agencies. Another is ‘MyGov.in’ which is as an innovative platform to
build a partnership between citizen and government. Swachh Bharat Mission (SBM) Mobile app has also been
introduced and used by people and Government organizations for achieving the goals of Swachh Bharat
Mission. Along with this, eSign framework is there which would allow citizens to digitally sign a document online
using Aadhaar authentication.
156
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
3. This information was given by the Minister of State for Electronics & Information Technology, in a written reply to a question in Lok Sabha
on August 03, 2022. Source – E-Governance, Press Information Bureau, Government of India.
157
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
l Direct Benefit Transfers – 315 Schemes across 53 Ministries are offering Aadhaar enabled direct
benefit transfer to citizens. So far, Rs. 24.3 lakh crore has been disbursed through DBT platform.
l Diksha – Diksha is a national level educational platform that helps students and teachers to participate,
contribute and leverage a common platform to achieve learning goals at scale for the country. As on
27th July 2022, 7,633 courses were available and more than 15 crore enrolments have been done.
Some of the major digital initiatives taken by the Government for welfare of farmers are as follows:
l National Agriculture Market (e-NAM) – Government of India has launched National Agriculture
Market (e-NAM) Scheme with the objective of creating online transparent competitive bidding system to
facilitate farmers with remunerative prices for their produce. More than 1.73 crore farmers & 2.26 lakh
traders have been registered on e-NAM platform. Also, 1000 mandis of 18 States and 3 UTs have been
integrated with e-NAM platform.
l M-KISAN – mKisan Portal (www.mkisan.gov.in) for sending advisories on various crop related matters
to the registered farmers through SMSs. In mkisan more than 5.13 crore farmers are registered for
receiving crop advisories through SMS. More than 2,462 crore mobile based advisories have been sent
to farmers to assist them in their farming activities.
l One Stop Window – Farmers Portal (www.farmer.gov.in) for dissemination of information on various
agricultural related matter including, seeds variety, Storage Godown, Pests and plant diseases, Best
Agricultural Practices, Watershed, Mandi details etc.
l Soil Health Card – It provides soil related information to facilitate farmers in farming activities. More
than 22 crore soil health cards have been printed and dispatched to farmers.
l Mobile based advisory system for agriculture & Horticulture (M4AGRI) – It is mobile based advisory
system for agriculture and horticulture. It has been implemented in the North-East States namely
Tripura, Mizoram, Manipur, Meghalaya, Sikkim, and Arunachal Pradesh.
The Government has taken following steps in direction of data governance for socio-economic development in
the country. The brief details are as follows:
l Open Government Data – To facilitate data sharing and promote innovation over non-personal data,
Open Government Data platform has been developed. More than 5.65 lakh datasets across 12,800+
catalogues are published. The platform has facilitated 93.5 lakh downloads.
l API Setu – To facilitate data exchange among the system, API Setu has been developed as a platform.
The platform has more than 2100 APIs, and 1000+ user organisations.
l MeitY has prepared the draft National Data Governance Framework Policy which aims to realize the full
potential of India’s digital government vision, maximize the efficiency of data-led governance & public
service delivery and to catalyze data-based research and innovation. Currently the draft policy is under
finalization. MeitY released the Draft National Data Governance Framework Policy on 26th May 2022
for public consultation.
The Government has already taken necessary measures to tackle challenges with regard to data privacy and
data security through administering the Information Technology (IT) Act, 2000 which has necessary provisions
for data privacy and data security.
158
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
be the solution to a plethora of problems – increasing competition, fraud and cyber security threats, regulatory
compliances, improving efficiency of the revenue stream, etc. According to PwC’s report titled ‘Industry 4.0:
Building the Digital Enterprise report’4, nearly 39% of companies in India planned to invest 8% of their annual
revenues in digital programmes by 2021. As the Indian government pushes for India to become a USD 5 trillion
economy by 2024, it also wants India’s digital economy to become USD 1 trillion by 2025.5 With all these set-
goals in digital India, the banking industry is playing vital role and preparing itself with major digital alterations
in recent years. Most conventional banks are using modern technologies to streamline their operations.
Under this backdrop, regulators are taking lead in regulating the use of modern technologies including AI in the
domain of banking industry.
RBI and Artificial Intelligence: Evolving Governance6
Machine Learning (ML) and Artificial Intelligence (AI) are already being used in supervisory procedures by RBI.
It now intends to make sure that the Department of Supervision at the central bank may reap the rewards of
advanced analytics. Additionally, they have plans to bring in outside consultants for this work. For supervisory
tests, the department has been creating and utilizing linear and a few ML models. Urban Cooperative Banks
(UCBs), Non-Bank Financial Businesses (NBFCs), payment banks, small financing banks, neighborhood banks,
credit information firms, and a few more Indian financial organizations are all subject to the RBI’s regulatory
authority. Artificial Intelligence (AI) and Machine Learning (ML) driven tools for data analysis and information
creation will be integral part of Reserve Bank’s Medium-term Strategy Framework ‘Utkarsh 2.0’ for the period
2023-2025. The first strategy framework (Utkarsh 2022) covering the period 2019-2022 was launched in July
2019. It became a medium-term strategy document guiding the Bank’s progress towards realisation of the
identified milestones. Against the backdrop of a challenging global and domestic environment, Utkarsh 2.0
commences from 2023, when India assumes the G-20 Presidency, With India’s G-20 presidency during the
period of Utkarsh 2.0, it confers a unique opportunity to showcase our accomplishments in the realm of digital
payments and strive towards broad basing of acceptance of the Indian Rupee in bilateral and multilateral
trade. The Vision in Utkarsh 2.0 that will guide the Reserve Bank of India over the period 2023-25 include,
‘Excellence in performance of its functions’; Strengthened trust of citizens and Institutions in the RBI; and
Enhanced relevance and significance in national and global roles. In this age of data, the Bank plays the dual
role of data collection as well as information dissemination. With this comes the responsibility of reliability of
data collected to create meaningful and accurate information. Therefore, adoption of AI and ML driven tool for
data analysis and information creation will be an integral part of Utkarsh 2.0. The RBI is looking to extensively
use advanced analytics, artificial intelligence and machine learning to analyse its huge database and improve
regulatory supervision over banks and NBFCs.
RBI Jurisdiction
l Banks, urban cooperative banks, Non-Bank Financial Businesses (NBFCs), payment banks,
small financing banks, local area banks, credit information firms, and a few other Indian financial
organizations are all subject to the RBI’s regulatory authority.
l To safeguard the interests of depositors and maintain financial stability, it conducts supervision
of these companies intending to evaluate their soundness, solvency, asset quality, governance
structure, liquidity, and operational viability.
4. Available at https://www.pwc.com/gx/en/industries/industries-4.0/landing-page/industry-4.0-building-your-digital-enterprise-april-2016.
pdf
5. Available https://meity.gov.in/ writereaddata/files/india_trillion-dollar_digital_opportunity.pdf
6. Reproduced from Cheguri Preethi (2022) India seeks to expand AI Regulatory Prospects – RBI comes to Rescue, Analytics India.
159
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
Source: https://valuementor.com/en-in/rbi-cyber-security-framework/
The RBI cyber security framework addresses three core areas:
a. Establish Cyber Security Baseline and Resilience;
b. Operate Cyber Security Operations Centre (C-SOC);
c. Cyber Security Incident Reporting (CSIR).
7. Available at https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=10435&Mode=0
160
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
8. Available at https://rbidocs.rbi.org.in/rdocs/content/pdfs/CSFB020616_AN1.pdf
9. https://rbidocs.rbi.org.in/rdocs/content/pdfs/CSFB020616_AN2.pdf
161
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
162
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
practices would facilitate timely measures in containing cyber-risks. It is reiterated that banks need to
report all unusual cyber-security incidents (whether they were successful or were attempts which did
not fructify) to the Reserve Bank. Banks are also encouraged to actively participate in the activities of
their CISOs’ Forum coordinated by IDRBT and promptly report the incidents to Indian Banks – Center
for Analysis of Risks and Threats (IB-CART) set up by IDRBT. Such collaborative efforts will help the
banks in obtaining collective threat intelligence, timely alerts and adopting proactive cyber security
measures.
9. Supervisory Reporting framework
It has been decided to collect both summary level information as well as details on information security
incidents including cyber-incidents. Banks are required to report promptly the incidents, in the format
given in Annex-3.10
10. Organizational arrangements
Banks should review the organisational arrangements so that the security concerns are appreciated,
receive adequate attention and get escalated to appropriate levels in the hierarchy to enable quick
action.
11. Cyber-security awareness among stakeholders / Top Management / Board
It should be realized that managing cyber risk requires the commitment of the entire organization
to create a cyber-safe environment. This will require a high level of awareness among staff at all
levels. Top Management and Board should also have a fair degree of awareness of the fine nuances
of the threats and appropriate familiarisation may be organized. Banks should proactively promote,
among their customers, vendors, service providers and other relevant stakeholders an understanding
of the bank’s cyber resilience objectives, and require and ensure appropriate action to support their
synchronized implementation and testing. It is well recognized that stakeholders’ (including customers,
employees, partners and vendors) awareness about the potential impact of cyber-attacks helps in cyber-
security preparedness of banks. Banks are required to take suitable steps in building this awareness.
Concurrently, there is an urgent need to bring the Board of Directors and Top Management in banks
up to speed on cyber-security related aspects, where necessary, and hence banks are advised to take
immediate steps in this direction.
163
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
164
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
(iii) Update incident management policies and processes to cleanse and share cyber security issues
9. Setting up an Information Security team:
(i) Examine the information security organization structure, as well as the duties and responsibilities
of the CISO, to verify that cyber security problems are effectively addressed inside the Bank.
10. Training and awareness:
(i) Hold cyber security awareness and training workshops for all important stakeholders, including
the Board of Directors, top management, third-party vendors, customers, and employees.
165
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
and effectively manage this ever-increasing data. The regulator has developed a system based on Artificial
Intelligence (AI) that scans various stock market shows and builds a database of recommendations made. This
database will be a part of the big-data network SEBI is employing to conduct comprehensive surveillance for
securities market offences, such as insider trading and front running.
The Securities and Exchange Board of India (SEBI) has asked all mutual funds companies in India to report
Artificial Intelligence (AI) and Machine Learning (ML) applications and systems offered to investors (individuals
and institutions) or used internally by it to facilitate investing and trading or for any other purpose. The move
is aimed at conducting a survey for creating an inventory of the AI / ML landscape in the Indian financial
markets to gain an in-depth understanding of the adoption of such technologies in the markets and to ensure
preparedness for any AI / ML policies that may arise in the future.
As most AI / ML systems are black boxes and their behaviour cannot be easily quantified, it is imperative to
ensure that any advertised financial benefit owing to these technologies in investor facing financial products
offered by intermediaries should not constitute to misrepresentation.
The SEBI adopted the following key initiatives in recognition of the power of emerging technologies in the
recent times in the interest of corporate governance:
l Adoption of AI for surveillance: The future of surveillance will entail sophisticated deployment of
technology to detect more complex and evolving manipulation techniques by fraudsters. It is proposed
that the use of AI for data analytics and pattern recognition will aid SEBI in better identifying abnormal
or fraudulent behaviour in the market including front running and insider trading. Technology will be
used to simulate human intelligence to further refine its alerts system.
l Implementation of data lake at SEBI: This is expected to be achieved through a data lake solution
which can support open source analytical tools such as R, Python, etc. with interoperable features.
During the year, SEBI completed its tendering process for implementation of the proposed Data Lake.
The proposed Data Lake will have characteristics such as visualization, time series/machine learning
analytical capabilities, ability to seek and search both structured/unstructured/semistructured data,
self-serviced business intelligence capabilities, in memory processing of data etc. The implementation
of Data Lake is now underway.
l Setting up a new and modern data centre: SEBI had implemented a large scale tier 3+ data center.
The new data center is currently hosting SEBI’s Private Cloud Infrastructure (SPCI). It is envisaged to
consolidate infrastructure from other data centers in Mumbai to the new Data Center. The consolidation
of all hardware will increase manageability of server side hardware and result in better turn-around
times for service requests.
l Setting up private cloud infrastructure to facilitate rapid scaling of all systems: In 2020-21, SEBI
implemented its private cloud infrastructure also known as ‘SPCI’. It is proposed that new and upcoming
projects will utilize the SPCI and in most cases no separate hardware procurements will be required.
Usage of commodity hardware will be encouraged where practicable. The SPCI is already hosting
many applications such as Resource Person Portal, File Tracking System (IONS) and Data Lake.
l Academic programmes: The National Institute of Securities Markets (NISM) is involved in designing
and offering academic programmes that focus on creating a cadre of professionals in securities
markets. During the academic year 2020-21, NISM has conducted training programmes on various
topics including artificial intelligence, cyber security, blockchain etc. A Post Graduate Certificate in
Management (Data Science in Financial Markets) was also organised.
l Policy initiatives: With a view to analyse complex bank statements, call data records, internal
protocol detail records, hash functions to ensure the sanctity of data, handling of IT digital devices
166
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
and adoption of data analytics to identify the pattern of relationships for unearthing sophisticated
connections while investigating complex cases, a new cell namely ‘Connection Research and Analysis
Cell’ (CRAC) under Integrated Surveillance Department was created in December 2020. Further
multiple subcommittees were formed for various projects such as Data Lake, Data Analytics, Private
Cloud, Network Revamp, etc.
With a growing reliance on technology, the market infrastructure institutions (MIIs) have fully automated their
operations and functions, from order entry to order matching to transaction confirmation, all the way to clearing
and settlement of trades. However, according to SEBI, there have been instances of technical problems resulting
in business disruption or service unavailability.
11 . Students to note that arena of international principals governing AI, Cyber Security and Cyberspace is quite wide. Hence in this chapter,
we are highlighting major bodies guiding the unfirm practice and principles governing/guiding AI, Cyber Security and Cyberspace
12. https://oecd.ai/en/ai-principles
167
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
Its country dashboards allow you to browse and compare hundreds of AI policy initiatives in over 60 countries
and territories. The Observatory also hosts the AI Wonk blog, a space where the OECD Network of Experts on
AI and guest contributors share their experiences and research.
The OECD Principles on Artificial Intelligence promote AI that is innovative and trustworthy and that respects
human rights and democratic values. They were adopted in May 2019 by OECD member countries when they
approved the OECD Council Recommendation on Artificial Intelligence.
The OECD AI Principles are the first such principles signed up to by Governments. They include concrete
recommendations for public policy and strategy, and their general scope ensures they can be applied to AI
developments around the world.
Source: https://oecd.ai/en/ai-principles
13. Reproduced from Kyle Chin (2023) Top Cyber Security Regulations in India, UpGuard. Available at https://www.upguard.com
168
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
The Jurisdiction of Information Technology Rules, 2013 is responsible for mandating all Indian data
centers, service providers, and their intermediates. All intermediaries are required to report any
cybersecurity incidents to CERT-In.
CERT-In acts as the primary task force that:
l Analyzes cyber threats, vulnerabilities, and warning information;
l Responds to cybersecurity incidents and data breaches;
l Coordinates suitable incident response to cyber-attacks and conducts forensics for incident
handling;
l Identify, define, and take suitable measures to mitigate cyber risks;
l Recommend best practices, guidelines, and precautions to organizations for cyber incident
management so that they can respond effectively.
CERT-In roles and functions were later clarified in an additional amendment under Information
Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions
and Duties) Rules (IT Rules, 2013).
CERT-In Newest 6-Hour Data Breach Reporting Deadline
The newest regulations by CERT-In address cybersecurity reporting, mandating all Indian companies,
service providers, intermediaries, data centers, and businesses to report identified cybersecurity
incidents and data breaches within a 6-hour deadline.
However, many Indian organizations disapproved of the impossible requirement, stating that the short
reporting window is insufficient to respond to cybersecurity incidents with a detailed report.
Despite the backlash, affected organizations that fail to follow these regulations face up to one-
year imprisonment, significant penalties, and non-compliance fines if they fail to report cybersecurity
incidents to CERT-In.
2. National Critical Information Infrastructure Protection Center (NCIIPC)
The National Critical Information Infrastructure Protection Center (NCIIPC) was established on January
16, 2014, by the Indian government, under Section 70A of the IT Act, 2000 (amended 2008).
Based in New Delhi, the NCIIPC was appointed as the national nodal agency in terms of Critical
Information Infrastructure Protection. Additionally, the NCIIPC is regarded as a unit of the National
Technical Research Organization (NTRO) and therefore comes under the Prime Minister’s Office (PMO).
The Indian Parliament divides cybersecurity into two segments: “Non-Critical Infrastructure (NCI),” which
CERT-In is responsible for, and “Critical Information Infrastructure (CII),” which NCIIPIC is responsible
for. CII is defined by the Indian Parliament as “facilities, systems or functions whose incapacity or
destruction would cause a debilitating impact on national security, governance, economy and social
well-being of a nation.”
NCIIPC is required to monitor and report national-level threats to critical information infrastructure. The
critical sectors include:
l Power and energy
l Banking, financial services, and insurance
l Telecommunication and information
169
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
l Transportation
l Government
l Strategic and public enterprises
NCIIPC successfully implemented several guidelines for policy guidance, knowledge sharing, and
cybersecurity awareness for organizations to conduct preemptive measures of these important sectors,
especially in power and energy. The guidelines represent the first means for regulating such sectors
and requiring “mandatory compliance by all responsible entities.”
Additionally, the Indian government approved the Revamped Distribution Sector Scheme in August
2021. The main goal of this regulation is to improve the operations of DISCOMs (distribution companies)
by enhancing the cyber infrastructure with AI-based solutions. This will ultimately aid organizations and
companies in meeting the framework’s goals.
3. Cyber Regulations Appellate Tribunal (CRAT)
Under the IT Act, 2000, Section 62, the Central Government of India created the Cyber Regulations
Appellate Tribunal (CRAT) as a chief governing body and authority for fact-finding, receiving cyber
evidence, and examining witnesses.
While CRAT doesn’t have as much jurisdiction for cybersecurity notification as CERT-In, the government
also serves to respond to and act on related cybersecurity incidents and breaches.
According to the Civil Court and Code of Civil Procedure, 1908, CRAT has the power to:
l Receive evidence on affidavits;
l Ensure that all electronic and cyber evidence and records are presented for court;
l Enforce, summon, and issue regular commissions for examining witnesses, documents, and
people under oath;
l Review final decisions of the court to resolve incidents and cases;
l Approve, dismiss, or declare the defaulter’s applications as ex-parte.
4. Insurance Regulatory and Development Authority (IRDAI)
The insurance sector of India is regulated by IRDAI, which issues information security guidelines for
insurers and addresses the importance of maintaining data integrity and confidentiality.
With this new Information and Cyber Security for Insurers Guidelines, the IRDAI:
l Mandates insurance companies to have a CISO (chief information security officer);
l Puts together an information security committee;
l Creates plans for managing cyber crises;
l Creates and implements cybersecurity assurance programs;
l Implements proper methods for protecting data;
l Maintains risk identification and risk mitigation processes.
The insurance sector of India mainly focuses on areas of higher risk, including ransomware attacks,
transaction frauds, data leaks, and risks of violating intellectual property rights. According to a report
by Sophos, 68% of Indian organizations were affected by ransomware and resorted to paying ransom
to recover their data.
170
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
On October 9, 2022, IRDAI introduced an improved cybersecurity framework focused on the insurers’
main security concerns. It aims to encourage insurance firms to establish and maintain a robust risk
assessment plan, improve mitigation methods of internal and external threats, prevent ransomware
attacks and other types of fraud, and implement a strong and robust business continuity.
Depending on the seriousness of the violation, insurers and businesses may be penalized upward of
`1 lakh (`100,000). If insurers fail to protect data they may be fined up to `5 crores per affected person.
The IRDAI Guidelines for Information and Cyber Security for Insurers apply to all insurers regulated by
Insurance Regulatory.
5. Telecom Regulatory Authority of India (TRAI) & Department of Telecommunications (DoT)
The Telecom Regulatory Authority of India, along with the DoT (Department of Telecommunication),
have tightened regulations for user data privacy and how it’s used.
TRAI is a regulatory body, and DoT is a separate executive department of the Ministry of Communications
in India. Although TRAI has been granted more regulatory powers, both works together to govern and
regulate telephone operators and service providers.
On June 16, 2018, TRAI released recommendations for telecom providers on “Privacy, Security and
Ownership of the Data in the Telecom Sector.” In the newest guidelines, TRAI addresses newer
responsibilities governing consumer data because most digital transactions in India are done via cell
phones.
TRAI addresses data protection with the following objectives:
l Define and understand the scope of “Personal data, Ownership, and Control of Data,” namely, the
data of users of the telecom service providers;
l Understand and identify the “Rights and Responsibilities of Data Controllers”;
l Assess and identify the efficiency of how data is protected and which data protection measures
are currently in place in the telecommunications sector;
l Identify and address critical issues regarding data protection;
l Collect and control user data of TISP (traffic information service providers) services.
The DoT has collaborated with the Indian IT ministry to impose layered data consent rules that safeguard
personal data processing. This gives users the freedom to decide whether or not they will consent to
the usage of their personal data and the right to withdraw consent at any time.
The new rules state that organizations and companies will only have to collect the necessary user details
and that the data may be retained only for as long as required. Additionally, Indian telecommunications
service providers comply with common standards like ISO 27000, 3GPP and 3GPP2, and ISO/IEC 15408.
LESSON ROUND-UP
l E-Governance as the name suggest is made up of two words. “E” and “Governance”.
l Demands of transparency, ethics, rightfulness, access to justice, eradication of corruption and other
related issues along with welfare driven political leadership, other associated governments, capacity
building needs and perceived citizen expectations and all has contributed to adoption of e-government
methods for good governance.
171
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
l The National e-Governance Plan (NeGP) has been formulated by the Department of Electronics and
Information Technology (DEITY) and Department of Administrative Reforms and Public Grievances
(DARPG) in 2006.
l These technologies are increasingly used by the society in day-to-day life from personal
communications, buying goods at retail stores, availing services at doorstep to availing the governance
through government offices.
l Seeing the potential of digitalization and its constructive impact supporting inclusive development of
our country, Government of India has launched the “Digital India” campaign. The Digital India drive
envisions transforming our nation and creating opportunities for all citizens by harnessing digital
technologies.
l The advent of information and communication technology has revolutionized all the sectors across
the globe. Indian banking and financial sector are not an exception to the transformation that has
happened with the advent of information technology.
l Of all the IT domains that are impacting this industry, Artificial Intelligence (AI) and Data Analytics are
the most influential contenders.
l Machine Learning (ML) and Artificial Intelligence (AI) are already being used in supervisory procedures
by RBI. It now intends to make sure that the Department of Supervision at the central bank may reap
the rewards of advanced analytics.
l Additionally, they have plans to bring in outside consultants for this work. For supervisory tests, the
department has been creating and utilizing linear and a few ML models. Urban cooperative banks
(UCBs), non-bank financial businesses (NBFCs), payment banks, small financing banks, neighborhood
banks, credit information firms, and a few more Indian financial organizations are all subject to the RBI’s
regulatory authority.
l As of April 2022, SEBI has six committee members that are required to oversee guidance for
cybersecurity initiatives for the Indian market and advise SEBI to develop and maintain cybersecurity
requirements following global industry standards.
l Additionally, SEBI also communicates with other agencies like CERT-In, NCSC (National Cyber
Coordination Center), DoT (Department of Telecommunications), and The Ministry of Electronics and
Information Technology (MeitY).
l SEBI implemented guidelines that apply to organizations within its scope — stock brokers, stock
exchanges, AMCs (asset management companies), mutual funds, and depository participants, among
others.
l Thus, for several years, there were open questions about whether existing international law applied
to cyberspace at all. Today, most states and several international organizations governs AI, cyber
security and cyberspace.
TEST YOURSELF
(These are meant for recapitulation only. Answers to these questions are not to be submitted for evaluation.)
1. Briefly explain the concept of e-governance and types of e-governance.
2. Write a short note on RBI Circular on Cyber Security and its present-day impact on Banking Industry.
172
Regulatory Framework on Ai, Cyber Security and Cyberspace LESSON45
l Nisha Dewani and Others (2022) Handbook of Research on Cyber Law, Data Protection and Privacy
l Walters and Novak (2021) Cyber Security, Artificial Intelligence, Data Protection and Law, Spinger.
l CSC 2.0 – Aims to cover 2.5 Lakhs of Gram Panchayats for Maximising delivery of e-Services to the
citizens, The Digital India Campaign, Ministry of Electronics and Information Technology, Government
of India;
l Digital India – Power to Empower, Ministry of Electronics and Information Technology, Government of
India;
l Digital India – Unlocking the Trillion Dollar Opportunity (2016), A Report by Deloitte in association with
ASSOCHAM India;
l Deepak J.S. (2015), Digital India-The Way Forward, MyGov Blog, Government of India;
l Ghosh Shyamal (2015), Digital India-Way Forward, Broadband India Forum, The Broadcast and Cable
Set, India;
l Sengupta Deb Deep (2015), Digital Transformation-An Only Way Forward, December 2, 2015, The Live
Mint;
l Teletalk 2016 – Digital India: The Way Forward, (2016), MITSOT, MIT School of Telecom Management’s
Blog.
173
PP-AIDA&CS Regulatory Framework on Ai, Cyber Security and Cyberspace
174
Lesson
Data Analytics and Law
6
KEY CONCEPTS
n Data n Analytics n Data Analytics n Legal Analytics n Machine Learning n Logistic Regression n Triple C
Theory n Data Assessment
Learning Objectives
To understand:
What is Data analytics?
Different analytical methods and techniques used by data analysts
What is Machine Learning?
What is Artificial Intelligence and how it helps human being
What is Triple C Theory?
Lesson Outline
Introduction to Data Analytics
Introduction to Legal Analytics
Introduction to Machine Learning for Lawyers
Quantitative Legal Prediction vis-à-vis Business of Law
Bias/ Variance, Precision/Recall & Dimensionality
Overfitting, Underfitting, & Cross-Validation
Logistic Regression and Maximum Likelihood
Triple C Theory and Data Assessment
Network Analysis and Law
Lesson Round-Up
Test Yourself
List of Further Readings
List of Other References
175
PP-AIDA&CS Data Analytics and Law
INTRODUCTION
In modern times, industry whether legal or technology, academy, practitioners and scholars utilize Artificial
Intelligence (AI) and machine learning to perform analysis which used to be labor-intensive endeavors decade
back. Although technology can, in some instances, replicate human decision-making, yet professionals including
lawyers, researchers and scholars play an essential role in compiling data sets, defining analytical queries,
and, most importantly, interpreting findings and presenting them in an accessible way for a broad audience.
Hence, this chapter aims to provide the basis for understanding data analytics, its role in various sectors and
laws, if any, governing the same.
DATA ANALYTICS1
As data is becoming more prominent by the minute, organizations are becoming data-driven, which means
adopting methods to collect more data. This data is then sorted, stored, and then analyzed to derive logical and
valuable information. Data analytics makes the process possible.
Data analytics is the science of analyzing raw data to make conclusions about that information. Many of the
techniques and processes of data analytics have been automated into mechanical processes and algorithms
that work over raw data for human consumption.
l Data analytics is the science of analyzing raw data to make conclusions about that information.
l Data analytics help a business optimize its performance, perform more efficiently, maximize profit, or
make more strategically-guided decisions.
l The techniques and processes of data analytics have been automated into mechanical processes
and algorithms that work over raw data for human consumption.
l Various approaches to data analytics include looking at what happened (descriptive analytics), why
something happened (diagnostic analytics), what is going to happen (predictive analytics), or what
should be done next (prescriptive analytics).
l Data analytics relies on a variety of software tools ranging from spreadsheets, data visualization, and
reporting tools, data mining programs, or open-source languages for the greatest data manipulation.
Data analytics is the process that refers to deriving valuable insights and information from data using quantitative
and qualitative methods. It helps businesses and even in science - researchers use it to verify their theories.
Data analytics is a broad term that encompasses many diverse types of data analysis. Any type of information
can be subjected to data analytics techniques to get insight that can be used to improve things. Data analytics
techniques can reveal trends and metrics that would otherwise be lost in the mass of information. This information
can then be used to optimize processes to increase the overall efficiency of a business or system.
For example, manufacturing companies often record the runtime, downtime, and work queue for various
machines and then analyze the data to better plan the workloads so the machines operate closer to peak
capacity.
Data analytics is important because it helps businesses optimize their performances. Implementing it into the
business model means companies can help reduce costs by identifying more efficient ways of doing business
and by storing large amounts of data. A company can also use data analytics to make better business decisions
and help analyze customer trends and satisfaction, which can lead to new—and better—products and services.
1. Source: Jake Frankefield at el (2023) Data Analytics: What it is, How It’s Used and 4 Basic Techniques, Investopedia. Available at https://
www.investopedia.com/terms/d/data-analytics.asp
176
Data Analytics and Law LESSON 6
l Data Analytics and Statistics: Statistics Tabulating Machine* was counting machine which
has a pretty long history. Like, for comprised of a punch for entering data onto a blank
example, in taxation, governments carried card, a tabulator for reading the cards and summing
out planning activities for the creation of up information and a sorting box for sorting the cards
censuses. It was possible with the use of for further analysis. The invention of the Tabulating
statistics. Data analytics stemmed from Machine was a turning point as it transformed the
statistics, which analyzed the obtained census process and information processing in general.
data.
l Data Analysis and Computing: Technology advancements were game-changers to how businesses
adopted data analytics. In 1890, Herman Hollerith invented the “Tabulating Machine” to reduce the time
taken to create the Census. This machine was highly useful in finishing the 1890 US Census in only 18
months.
l Data mining: Data mining got introduced in the 1990s, which Data mining refers to the process
is a process that discovers patterns in large data files. When of sieving through large amounts
data analytics moved from traditional methods to more of information for the purpose of
modern means, you could obtain more positive results. extracting useful information.
l Google Web Search: When the Google search engine came into the picture, big data could be analyzed
and processed quickly. It played an essential part in the evolution of Data Analytics because the search
engine was more automated, scalable, and high-performing.
*(Source: https://americanhistory.si.edu/collections/search/object/nmah_694410)
l Data Processing: Today, Python & R are the leading technologies in data analytics. They are open-
sourced and are capable of integrating with big data platforms and visualization tools. Businesses
prefer R when the primary goal is exploratory analysis or modeling. At the same time, enterprises prefer
Python to develop applications that have an embedded analytics engine.
l Predictive Modeling: Some advanced data analytics techniques that the data scientists and
organizations are using are: Random Forests, Matrix Factorization, TensorFlow, Simulated Annealing,
etc. For example, Random Forest is a machine learning algorithm which grows and combines multiple
decision trees to create a forest. It is used for both classification and regression problems.
l Visualization: Many organizations are adopting more open-source technologies for their business. A
few examples are D3 and Angular, which is popular development platform which strives to make web
development easier through focus on developer’s productivity, speed and testability. This decision
relies on several factors like cost, customization options, visual appeal, and interactivity.
177
PP-AIDA&CS Data Analytics and Law
178
Data Analytics and Law LESSON 6
4. Prescriptive Analytics
This suggests a course of action. Prescriptive analysis helps businesses make well-informed decisions
and predict the analytics. This type of data analytics uses machine learning strategies that are capable
of finding patterns in large datasets.
Note: Data Set refers to an organized collection of data related to a particular subject.
l Data analysts also have help when reporting or communicating Tableau is a popular tool for
findings. Both Tableau and Power BI are data visualization and business intelligence which is
analysis tools to compile information, perform data analytics, used for the purpose of visually
and distribute results via dashboards and reports. analyzing the data.
l Other tools are also emerging to assist data analysts. SAS is an analytics platform that can assist with
data mining, while Apache Spark is an open-source platform useful for processing large sets of data.
179
PP-AIDA&CS Data Analytics and Law
Data analysts now have a broad range of technological capabilities to further enhance the value they
deliver to their company.
180
Data Analytics and Law LESSON 6
2. Reproduced from Wen Kara (2022) What are the different types of legal data analytics? SimpleLegal. Available on https://www.simplelegal.
com/blog/legal-data-analytics.
181
PP-AIDA&CS Data Analytics and Law
4. Matter analytics
Matter analytics are based on the total list of legal matters along with details like status of matters,
vendors assigned to each matter, when the matter was worked, and more. Detailed matter analytics
allow corporate legal departments to make educated decisions on using certain outside counsels vs.
in-house counsels. After identifying the practice areas, they can use this information along with vendor
costs to explore reducing the number of vendors and consolidating into law firms with multiple legal
services. Legal departments can also assign standard, due diligence and compliance work to in-house
attorneys to save money.
Contract Analytics
Contract analytics are based on the total list of legal contracts as well as detailed information on their status,
type, renewal dates, content, and more.
As legal technology continues to evolve, contract analytics has also grown more advanced to include suggested
revisions from artificial intelligence. While many basic legal platforms can sort and categorize contracts, AI
legal software reviews them. With machine learning, these tools flag issues in contracts and offer changes
based on their analysis of others contracts in the system. This saves lawyers “hundreds of hours” a year.
Case Analytics
Case analytics are based on the total list of legal cases along with information on prior and similar cases,
case types, clients, judges, and more. Case analytics help in-house counsels to prepare their case strategy by
learning from previous cases. With case analytics, attorneys can see trends on what worked and what didn’t
and apply those lessons to strengthen their legal approach towards complex legal issues.
3. Bernard Marr and Company, How AI and Machine Learning Are Transforming Law Firms and The Legal Sector, Forbes. Available at https://
bernardmarr.com/how-ai-and-machine-learning-are-transforming-law-firms-and-the-legal-sector/
182
Data Analytics and Law LESSON 6
relevant, machine learning algorithms can get to work to find other documents that are similarly relevant.
Machines are much faster at sieving through documents as compared to humans and can produce output and
results that can be statistically validated. They can help reduce the load on the human workforce by forwarding
only those documents which are questionable rather than requiring humans to review all documents. Despite the
monotony that legal research entails, it is important that legal research is done in a timely and comprehensive
manner. AI systems such as the one offered by ROSS Intelligence leverages natural language processing to
help analyze documents.
For example, when lawyers using AI-powered software flag certain documents as relevant, the AI learns
what type of documents it’s supposed to be looking for. Hence, it can more accurately identify other relevant
documents. This is called “predictive coding.” Predictive coding offers many advantages over old-school manual
document review. Among other things, it:
l leverages small samples to find similar documents;
l reduces the volume of irrelevant documents that attorneys must wade through;
l produces results that can be validated statistically;
l is at least modestly more accurate than human review;
l is much faster than human review.
183
PP-AIDA&CS Data Analytics and Law
Legal Research
Any lawyer who has ever done research using legal research tools has used legal automation. Finding relevant
cases in previous and recent years involves the laborious process of looking up headnote numbers and going
through voluminous paper volumes. But AI takes legal research to the next level. For example, Ross Intelligence
uses the power of IBM’s Watson supercomputer to find similar cases. It can even respond to queries in plain
English. The power of AI-enabled research is striking: using common research methods, a bankruptcy lawyer
found a case nearly identical to the one he was working on in 10 hours; Whereas Ross’s AI found it almost
instantly.
Note: eDiscovery is a resource that seeks to find evidence in emails, business communications and other
electronic data and collects, preserves, reviews and exchanges information in electronic format for use in
litigation and investigation.
Internal data is information about a firm or law department’s business practices, such as billing rates, legal
expenditure incurred in practice areas, and billable hours. This data might also include productivity data related
to individual lawyers and support staff.
Legal industry data is data that has been externally collected from outside research groups, court dockets, and
sources that cover the wider trends within the legal community. This might include data about case outcomes
or trends about hot practice areas or changing client preferences.
4. Reproduced from Wolff Jeffrey (2021) 5 Ways to Use Legal Analytics Tools to Work Smarter, Not Harder, JD SUPRA. Available at https://
www.jdsupra.com/legalnews/5-ways-to-use-legal-analytics-tools-to-5039823/
5. Reproduced from Wolff Jeffrey (2021) 5 Ways to Use Legal Analytics Tools to Work Smarter, Not Harder, JD SUPRA. Available at https://
www.jdsupra.com/legalnews/5-ways-to-use-legal-analytics-tools-to-5039823/
184
Data Analytics and Law LESSON 6
case outcomes and guiding litigation or settlement strategies. These tools detect trends and patterns in
client data using artificial intelligence to help lawyers understand data better and make better strategic
decisions.
l Structural analytics can give an overview of the scope of a data set. For example, analytics tools
can study file metadata to organize files, while email threading and duplicate and near-duplicate
detection can streamline data sets.
l Conceptual analytics can help lawyers understand the relationships between documents and
provide a high-level overview of a corpus of documents. These tools can recognize concepts and
use them to group related documents together and can even identify the sentiment or emotion
behind documents, flagging concerning documents for review.
l Finally, predictive analytics, such as technology-assisted review, can prioritize the documents
most likely to be relevant and make informed predictions about privileged documents or content;
they can also detect and classify contract clauses.
With these insights, legal teams can conduct more accurate early case assessment, reduce the volume
of eDiscovery data advancing to review, accelerate and improve the quality of document review, and
substantially lower the total cost of eDiscovery.
2. Facilitating Law Firm Marketing and Increasing Client Satisfaction
A law firm is, quite literally, nothing without its clients. Fortunately, legal analytics tools have
revolutionized lawyers’ ability to recognize “ideal” clients and design effective marketing strategies to
capture those clients. Many helpful tools can analyze the characteristics of the ideal client, identify the
target market to maximize profitability, and channel business to the firm.
These tools can also help with benchmarking. For example, law firm can compare their performance
against peer firms. Similarly, instead of wasting money on unsuccessful marketing campaigns, legal
analytics tools can help a firm craft a plan—based on real data—to target and draw in lucrative clients
and increase the firm’s profitability.
3. Making Informed, Risk-based Litigation Decisions
Clients are in the pesky habit of asking their lawyers to predict the future, but few lawyers are naïve
enough to make the attempt. Predictive legal analytics tools, however, give lawyers the next best thing:
a way to accurately predict the specific characteristics of a case based on real case data.
For example, modern analytics tools can predict the likelihood of winning a case, the probable length
of litigation, and the number of hours that the firm should allocate to working on it, all based on past
data. This insight is invaluable for saving time and money because it lets the counsel know which
battles are worth fighting and which should be promptly settled (and for how much). The best part is
that these predictions are personalized based on the specific jurisdiction, judge, and even opposing
counsel in question.
Note: Jurisdiction refers to the authority of a court to hear, decide and rule on cases within a particular
geographical limit. In other words, it is the territory over which the court can exercise its authority.
185
PP-AIDA&CS Data Analytics and Law
are available with a few keystrokes and clicks on a keypad through popular legal research websites
like SCC and Manupatra.
Analytics tools for legal research save lawyers time and effort—and helps them win cases—by rapidly
identifying relevant and significant cases that can inform their arguments and strategy. Searches can
be narrowed by practice area, date, location, or even the number of times that a search term appears
in the result. All of these capabilities arise from data analytics.
Therefore, in this manner, not only do legal research tools create an easy way to sort through legal
cases, but they also provide access to treatises, pleadings, guidelines laid down by the court, and
other helpful materials. In fact, many state bar associations provide free access to legal research tools
so that all lawyers can benefit from this powerful technology.
5. Promoting Lawyer Productivity
Legal analytics don’t just help clients; legal analytics software can also tell partners and heads of law
firm which lawyers are the most productive, efficient, and cost-effective—and which lawyers need to
improve. This data is critical for making decisions about assignments and promotions and deciding how
to manage attorneys and their workload.
For instance, with legal analytics tools that track billable hours, you can see how long a lawyer spends
working on a specific case and dedicate more expensive resources (partners and senior associates)
for only the most important work. Law firms and corporate law offices can also explore hiring remote
lawyers and see how the costs and benefits stack up against full-time employees.
Not only can managers get unparalleled access to data about associates, but legal analytics can
also provide tools to help underperforming lawyers get back on track. Many products have attorney
dashboards, automated document management, and client collaboration tools to boost productivity.
6. Reproduced from Trasberg Henrik (2019) Quantitative Legal Prediction and the Rule of law, Master Thesis, Law and Technology LLM,
TILBURG University Law School.
7. Greenleaf (n 17) 312; For a further description of utilizing big data for building legal prediction models see Richard Susskind and Daniel
Susskind, The Future of the Professions: How Technology Will Transform the Work of Human Experts (Oxford University Press 2015) 226–
228 and 276–278.
8. An overview of advances in computer hardware and artificial intelligence powering the development of quantified legal prediction is
provided by Katz (n 5) 913–923.
9. It is regarded as “supervised” since it involves inferring a classification model from labeled training data. See Ashley (n 6) 109. Ashley
further explains the functioning of supervised machine learning: “The training data comprise a set of examples that have been assigned
outcomes. Each example is a pair consisting of an input object (often a vector of feature values) and a desired output value. The learning
algorithm needs to generalize from the training data to unseen situations.”
10. ibid.
186
Data Analytics and Law LESSON 6
Quantitative Legal Prediction thus creates an “inverse” model in which correlations are created between certain
elements available in the case (such as specific words used) and the outcome of a case, as a result of which
certain value is assigned to each element.
As described by Katz, “simply put, one uses the observables to build the model rather than using the model to
assign causal weight to those observables.”11 In context of legal prediction, this means that certain parameters
or features of a case (e.g. who is the judge, what is the subject-matter of the case, which words or phrases are
present in the case documentation, etc.) are assigned a value that would indicate which way a case would
be decided based on past patterns.12 It is worth noting that the QLP tools will not discover the features that
influence outcomes, but instead learn the weights of such features.13
Quantified legal prediction is what Daniel Katz categorizes as “soft artificial intelligence” in the sense that
the algorithms aim to achieve outcome that would mimic human intelligence while the process to achieve the
outcome does not.14 There is thus no legal reasoning employed in the predictions of the quantified prediction
models. Importantly, data-based prediction models require elements that are relatively simple to extract –
there is no input needed from the larger body of legal system. There is also no knowledge representation
bottleneck that arises with the legal expert systems as the model does not require semantic understanding or
the context of the information extracted.
187
PP-AIDA&CS Data Analytics and Law
based prediction based on patterns from prior case laws with input provided by the user, is able to consistently
predict correctly over 90 % of outcomes of tax law cases in Canada.20
Note: Meta-data refers to that data which provides information about one or more aspects of data.
The algorithm developed by Aletras et al., which predicts cases of European Court of Human Rights with a 79 %
accuracy, has adopted a different direction – instead of assigning value to certain meta-data, it creates correlations
between sequences of words (n-grams)21 available in certain parts of a case (e.g., the legal circumstances and
facts) and case outcome. For example, the term ‘second applicant’ has a significant correlation with ECtHR
identifying an infringement. Another similar model was able to predict ECtHR i.e. European Court of Human
Rights, case outcomes with 75 % accuracy.22 Potentially, such algorithm could be provided with the pleadings/
complaint concerning the case and/or other case documentation as input and, based on the language used in
the input, it predicts (the likelihood of) positive/negative outcome.
There are many other models developed to predict, for example, security fraud class actions and settlement
amounts,23 likelihood of patent being litigated,24 and appeal decisions in tax law in Germany.25 The knowledge
that these tools provide can enable valuable input for significant litigation decisions, for example whether
to litigate or not and whether to seek compromise or discard specific claims. One could envision that if the
prediction accuracy of these models continues to significantly rise, they may be adopted by courts and other
public institutions for making administrative decisions and solving legal disputes.
In addition to case outcome prediction, QLP also provides other benefits. To bring a few examples, QLP-based
algorithms can mine and aggregate information from past case precedents that enables, for example, to predict
how long the case might take, what are the likely legal costs, what is the best way to remedy a particular legal
dispute, etc.26 But most significantly, predictive justice tools can identify certain patterns about how the courts
and the judges operate, such as which prior case laws a particular judge likes to refer to, how the judge tends
to decide in non-obvious cases in respect of a particular subject-matter, whether there are certain lawyers
that tend to win with a particular judge, what are the types of arguments that the judge tends to embrace, etc.
These patterns, which are largely based on the data about how the judge has ruled in the past, render the
adjudication process more transparent as they provide insight into what a particular judge might find relevant in
respect of a certain legal debate. This enables legal counsels to make better strategic decisions and tailor the
legal arguments within the adjudication process for the particular judge. In light of the notion that the judge’s
decision is influenced by its attitudes, biases and other cognitive processes, the input into tendencies of a
judge can have transformational impact on the transparency of adjudication and the predictability of a judge’s
actions.
As another use-case, there are some QLP-based software being adopted by the stake-holders before the case
even proceeds for trial, i.e. at the pre-trial stage. For example, a few US courts are using data-based tools to
assess the risk of recidivism of convicted criminals – a major factor in contemplating the choice and extent of
20. Benjamin Alarie, Anthony Niblett and Albert Yoon, ‘Using Machine Learning to Predict Outcomes in Tax Law’ (2017) SSRN <https://papers.
ssrn.com/sol3/papers.cfm?abstract_id=2855977>
21. N-grams are contiguous word sequences within the text. See Aletras and others (n 9) 8–9.
22. Masha Medvedeva, Michel Vols and Martijn Wieling, ‘Judicial Decisions of the European Court of Human Rights: Looking into the Crystall
Ball’ (2018) University of Groningen, Department of Legal Methods 1 <http://martijnwieling.nl/files/Medvedeva-submitted.pdf>.
23. Blakeley B Mcshane and others, ‘Predicting Securities Fraud Settlements and Amounts: A Hierarchical Bayesian Model of Federal
Securities Class Action Lawsuits’ (2012) 9 Journal of Empirical Legal Studies 482.
24. Colleen V Chien, ‘Predicting Patent Litigation’ (2011) 90 Texas Law Review 283.
25. Bernhard Waltl and others, ‘Predicting the Outcome of Appeal Decisions in Germany’s Tax Law’ (2017) 10429 (eds) Electronic Participation.
ePart 89 <http://link.springer.com/10.1007/978-3-319-64322-9_8>.
26. Katz (n 5); Hildebrandt, ‘Law as Computation in the Era of Artificial Legal Intelligence. Speaking Law to the Power of Statistics’ (n 12) 11.
188
Data Analytics and Law LESSON 6
punishment.27 In law enforcement, predictive justice tools are used for assessing whether a suspect should be
held in pre-trial detention or not.28
Note: Recidivism refers to the tendency of a convicted criminal to relapse into criminal behavior.
What QLP thus promises is an augmented insight into what might be the outcome of a particular case, enabling
the counsel to make smarter whether to commence litigation or not. This value should not be understated –
lawyers are surprisingly bad at predicting outcomes of court cases that exceed certain basic level of difficulty.29
Furthermore, while a lawyer’s ability to reason far exceeds any algorithm, humans’ capacity to sift through
thousands of court cases and identify correlations from historic patterns that may play a significant role in the
outcome of a current case or provide insight into behavior of the judge is dwarfed compared to the ability of AI.
QLP thus enables lawyers to overcome some of the cognitive limitations of the human brain.
27. For example, Compas software by Equivant is used by several courts in US. See Adam Liptak, ’Sent to Prison by a Software Program’s
Secret Algorithm’, The New York Times, 01.05.2017. <https://www.nytimes.com/2017/05/01/us/politics/sent-to-prison-by-a-software-programs-
secretalgorithms.html>. However, it must be noted that using the Compas software has been met with significant scepticism – see for example
Jason Tashea, ’Courts Are Using AI to Sentence Criminals. That Must Stop Now’, Wired Magazine, 17.04.2017 <https://www.wired.com/2017/04/
courts-using-ai-sentence-criminals-must-stopnow/>. See also Ed Yong, ’A Popular Algorithm Is No Better at Predicting Crimes Than Random
People’, The Atlantic, 17.01.2018. <https://www.theatlantic.com/technology/archive/2018/01/equivant-compasalgorithm/550646/>
28. Nick Statt, ’UK police will start using AI to decide whether suspects should be kept in custody’, The Verge, 10.05.2017. <https://www.
theverge.com/2017/5/10/15614980/uk-durham-police-ai-risk-assessment-policing>
29. See analysis of the study by Jane Goodman-Delahunty, Maria Hartwig, and Elizabeth F Loftus in Section 3.3.
30. Pasquale and Cashwell (n 19) 9.
31. See Greenleaf (n 15) 312.
189
PP-AIDA&CS Data Analytics and Law
arguments or legal deduction. Consequently, these algorithms are not able to provide an explanation,
not to mention legal reasoning, for the conclusions reached. On this note, Susskind argues that in many
areas “we can develop high performing, non-thinking machines that can outperform the best human
experts, even though they go about their business in quite unhuman ways” and thus “we will not need
to understand and then replicate the way human experts work, nor will we need to develop thinking
machines to replace much of the work currently undertaken by human professionals.”32 Yet, does our
idea of law permit a situation where important (legal) decisions have no causative basis in law?
l Evidently, it raises some significant concerns. For example, as the output of QLP is not cast into form
of legal argumentation and the reasoning (logic) based on which the algorithms reach conclusions
remains opaque and unintelligible, the decision or a suggestion of a QLP-based algorithm effectively
cannot be contested.
l Furthermore, these models are never unbiased, objective nor neutral in their prediction; but are
affected by a series of design decisions by its developers.”33 Notably, developing the model requires a
trade-off, between volume, relevance, completeness, accuracy and correctness of the training dataset,
the dimensionality and aptitude of the hypotheses space, the time taken for iterant testing, and the
availability of the relevant domain expertise.”34 Since these choices will significantly influence the
conclusions reached by the model, it essentially means that the developers of the algorithms will have
the power to direct the output of a model and thereby influence legal decision-making.
The above-described limitations hint towards some of the rule of law implications that arise with the emergence
of data-based legal decision-making.
Note: Adjudication refers to the legal process by which a judge gives a decision which determines the rights
an liabilities of the parties involved in a case.
The legal disputes for which insight from QLP is sought are presumably cases where no axiomatic solutions
exist. Questions of law in such cases cannot be solved purely by having knowledge of the legal system or the
existing case law, which is why relying on a data-based prediction tool that has a good track record seems
tempting. Yet, such approach misrepresents the adjudication process: It is argued that it is the adversarial legal
argumentation that takes place within the adjudication process, which forges the result of non-obvious cases.
Therefore, the outcome of a dispute (i.e., how legal rule applies in the particular situation) is created within the
adjudication process. Consequently, what a lawyer does in the adjudication process is not just a prediction –
the legal arguments it creates and submits are proposals for regulation of behavior which, if convincing to the
court, are materialized into a legal norm. It is only through this adversarial argumentation that the resolution on
how the disputed behavior is to be regulated comes into existence. As such, QLP misrepresents adjudication by
purporting predetermination where there is none.
32. Susskind and Susskind (n 35) 276; See also Greenleaf (n 17) 312.
33. Mireille Hildebrandt, ‘Algorithmic Regulation and the Rule of Law’ (2018) <http://dx.doi.org/10.1098/rsta.2017.0355>.
34. Hildebrandt, ‘Law as Computation in the Era of Artificial Legal Intelligence. Speaking Law to the Power of Statistics’ (n 12) 10.
190
Data Analytics and Law LESSON 6
The principal issue with the above emerges from the fact that the adjudication process carries a fundamental
role in safeguarding the realization of rule of law. The principle of rule of law postulates that no one is above
the law and law applies equally to all citizens irrespective of their ranks, other distinctions, etc. The rule of law
is evidently an elusive concept with a wide array of objectives, but one of its key aspects is treating individuals
as moral agents entitled to dignity and respect. The adjudication process ensures such treatment by accepting
that law has an arguable character and by providing a procedure where a question of how a certain behavior
should be governed is argued. Thus, the adjudication process is not only a place for reaching a conclusion, but
functions as a forum where the understanding of the law is debated and formed, and the individual is entitled
to participate and influence that procedure. The preemptive character of QLP impedes the adjudication process
in acting as such an institution.
Using QLP for Profiling Judges and its Rule of Law Implications
The second significant rule of law interference relates to applying QLP technology for identifying and
exploiting specific patterns of judges, with the purpose of exploiting these tendencies for one’s advantage. The
commercialized products that have adopted QLP technology increasingly promise the possibility to outline
certain patterns of a judge to better understand what are the arguments, cases, types of evidence, etc., that
a particular judge likes, enabling a more insightful prediction on what might be the most fruitful strategy or a
set of argumentations for a particular case. The value proposal of such use of QLP is thus a more transparent
and predictable adjudication through identification of adjudication patterns otherwise inaccessible to human
cognition.
Simultaneously, the adjudication process is riddled with biases and inconsistencies. The more significant the
patterns these predictive justice tools are able to identify, the more it enables to exploit the disparities that
exist within the judiciary. If patterns of judges become increasingly visible, the extent to which the biases are
exploited will inevitably increase, tilting case outcomes by engaging factors that are not rooted in law or the
legal system at large. This apparent lack of concern for substantive justice would undermine fair adjudication
as well as erode public confidence in the adjudication system.
Joseph Raz states that insufficient regard for the rule of law can lead to uncertainty or it may lead to frustrated
and disappointed expectations.35 Adoption of QLP-based algorithms for identifying patterns of adjudication
affects both of these aspects – on one hand it enhances transparency and foreseeability; on the other, it enables
unfair exploitation of the system, eroding public confidence and giving rise to frustration about the adjudication
process by the courts.
Reconciliation comes in the form of adequate reaction to the developments enabled by QLP – in order to mitigate
the risks on fairness of adjudication and the perception thereof. The emergence of QLP requires attention
and willingness from the judiciary to evolve adjudication in line with the capabilities of the QLP technology.
This includes the need to further understand, embrace and develop a theoretical framework about the role
of biases within adjudication and provide judicial education on understanding significance of the adjudication
data extracted by QLP.
191
PP-AIDA&CS Data Analytics and Law
errors will always be present as there is always a slight difference between the model predictions and
actual predictions. The main aim of ML/data science analysts is to reduce these errors in order to get
more accurate results. In this portion, we are going to discuss bias and variance, Bias-variance trade-off,
Underfitting and Overfitting.
Source: https://www.javatpoint.com/bias-and-variance-in-machine-learning
Machine
Learing Erros
Recuible Irreducible
Error Error
Bias Variance
Source: https://www.javatpoint.com/bias-and-variance-in-machine-learning
l Irreducible Errors: These errors will always be present in the model regardless of which algorithm has
been used. The cause of these errors is unknown variables whose value cannot be reduced.
192
Data Analytics and Law LESSON 6
What is Bias?
In general, a machine learning model analyses the data, find patterns in it and make predictions. While training,
the model learns these patterns in the dataset and applies them to test data for prediction. While making
predictions, a difference occurs between prediction values made by the model and actual values/expected
values, and this difference is known as bias errors or Errors due to bias. It can be defined as an inability of
machine learning algorithms such as Linear Regression to capture the true relationship between the data
points. Each algorithm begins with some amount of bias because bias occurs from assumptions in the model,
which makes the target function simple to learn. A model has either:
l Low Bias: A low bias model will make fewer assumptions about the form of the target function.
l High Bias: A model with a high bias makes more assumptions, and the model becomes unable to
capture the important features of our dataset. A high bias model also cannot perform well on new data.
Generally, a linear algorithm has a high bias, as it makes them learn fast. The simpler the algorithm, the higher
the bias it has likely to be introduced. Whereas a nonlinear algorithm often has low bias.
Some examples of machine learning algorithms with low bias are Decision Trees, k-Nearest Neighbors and
Support Vector Machines. At the same time, an algorithm with high bias is Linear Regression, Linear Discriminant
Analysis and Logistic Regression.
193
PP-AIDA&CS Data Analytics and Law
Usually, nonlinear algorithms have a lot of flexibility to fit the model, have high variance.
Source: https://www.javatpoint.com/bias-and-variance-in-machine-learning
Some examples of machine learning algorithms with low variance are, Linear Regression, Logistic Regression,
and Linear discriminant analysis. At the same time, algorithms with high variance are decision tree, Support
Vector Machine, and K-nearest neighbours.
Source: https://www.javatpoint.com/bias-and-variance-in-machine-learning
194
Data Analytics and Law LESSON 6
1. Low-Bias, Low-Variance:
The combination of low bias and low variance shows an ideal machine learning model. However, it is
not possible practically.
2. Low-Bias, High-Variance:
With low bias and high variance, model predictions are inconsistent and accurate on average. This case
occurs when the model learns with a large number of parameters and hence leads to an overfitting
3. High-Bias, Low-Variance:
With high bias and low variance, predictions are consistent but inaccurate on average. This case occurs
when a model does not learn well with the training dataset or uses few numbers of the parameter. It
leads to underfitting problems in the model.
4. High-Bias, High-Variance:
With high bias and high variance, predictions are inconsistent and also inaccurate on average.
Source: https://www.javatpoint.com/bias-and-variance-in-machine-learning
l Low training error and high-test error.
High Bias can be identified if the model has:
l High training error and the test error is almost similar to training error.
195
PP-AIDA&CS Data Analytics and Law
Bias-Variance Trade-Off
While building the machine learning model, it is really important to take care of bias and variance in order to
avoid overfitting and underfitting in the model. If the model is very simple with fewer parameters, it may have
low variance and high bias. Whereas, if the model has a large number of parameters, it will have high variance
and low bias. So, it is required to make a balance between bias and variance errors, and this balance between
the bias error and variance error is known as the Bias-Variance Trade-Off.
For an accurate prediction of the model, algorithms need a low variance and low bias. But this is not possible
because bias and variance are related to each other:
l If we decrease the variance, it will increase the bias.
l If we decrease the bias, it will increase the variance.
Bias-Variance trade-off is a central issue in supervised learning. Ideally, we need a model that accurately
captures the regularities in training data and simultaneously generalizes well with the unseen dataset.
Unfortunately, doing this is not possible simultaneously. Because a high variance algorithm may perform well
with training data, but it may lead to overfitting to noisy data. Whereas, high bias algorithm generates a much
simple model that may not even capture important regularities in the data. So, we need to find a sweet spot
between bias and variance to make an optimal model.
Source: https://www.javatpoint.com/bias-and-variance-in-machine-learning
Hence, the Bias-Variance trade-off is about finding the sweet spot to make a balance between bias and
variance errors.
37. Reproduced from Overfitting and Underfitting in Machine Learning, Java T Point. Available at https://www.javatpoint.com/overfitting-and-
underfitting-in-machine-learning
196
Data Analytics and Law LESSON 6
The main goal of each machine learning model is to generalize well. Here generalization defines the ability of
an ML model to provide a suitable output by adapting the given set of unknown input. It means after providing
training on the dataset, it can produce reliable and accurate output. Hence, the underfitting and overfitting are
the two terms that need to be checked for the performance of the model and whether the model is generalizing
well or not.
Before understanding the overfitting and underfitting, let’s understand some basic term that will help to
understand this topic well:
l Signal: It refers to the true underlying pattern of the data that helps the machine learning model to
learn from the data.
l Noise: Noise is unnecessary and irrelevant data that reduces the performance of the model.
l Bias: Bias is a prediction error that is introduced in the model due to oversimplifying the machine
learning algorithms. Or it is the difference between the predicted values and the actual values.
l Variance: If the machine learning model performs well with the training dataset, but does not perform
well with the test dataset, then variance occurs.
Overfitting
Overfitting occurs when our machine learning model tries to cover all the data points or more than the required
data points present in the given dataset. Because of this, the model starts caching noise and inaccurate values
present in the dataset, and all these factors reduce the efficiency and accuracy of the model. The overfitted
model has low bias and high variance.
The chances of occurrence of overfitting increase as much we provide training to our model. It means the more
we train our model, the more chances of occurring the overfitted model.
Overfitting is the main problem that occurs in supervised learning.
Example: The concept of the overfitting can be understood by the below graph of the linear regression output:
Source: https://www.javatpoint.com/overfitting-and-underfitting-in-machine-learning
As we can see from the above graph, the model tries to cover all the data points present in the scatter plot. It
may look efficient, but in reality, it is not so. Because the goal of the regression model to find the best fit line,
but here we have not got any best fit, so, it will generate the prediction errors.
197
PP-AIDA&CS Data Analytics and Law
l Cross-Validation
l Removing features
l Regularization
l Ensembling
Underfitting
Underfitting occurs when our machine learning model is not able to capture the underlying trend of the data. To
avoid the overfitting in the model, the feed of training data can be stopped at an early stage, due to which the
model may not learn enough from the training data. As a result, it may fail to find the best fit of the dominant
trend in the data.
In the case of underfitting, the model is not able to learn enough from the training data, and hence it reduces
the accuracy and produces unreliable predictions.
Example: We can understand the underfitting using below output of the linear regression model:
As we can see from the above diagram, the model is unable to capture the data points present in the plot.
198
Data Analytics and Law LESSON 6
Note: Logistic Regression is a supervised machine learning algorithm which is mainly used for
classification tasks where the goal is to predict a probability that an instance is belonging to a
particular class or not.
l Logistic regression predicts the output of a categorical dependent variable. Therefore, the outcome
must be a categorical or discrete value. It can be either Yes or No, 0 or 1, true or False, etc. but instead
of giving the exact value as 0 and 1, it gives the probabilistic values which lie between 0 and 1.
l Logistic Regression is much similar to the Linear Regression except that how they are used. Linear
Regression is used for solving Regression problems, whereas Logistic regression is used for solving the
classification problems.
l In Logistic regression, instead of fitting a regression line, we fit an “S” shaped logistic function, which
predicts two maximum values (0 or 1).
l The curve from the logistic function indicates the likelihood of something such as whether the cells are
cancerous or not, a mouse is obese or not based on its weight, etc.
l Logistic Regression is a significant machine learning algorithm because it has the ability to provide
probabilities and classify new data using continuous and discrete datasets.
l Logistic Regression can be used to classify the observations using different types of data and can
easily determine the most effective variables used for the classification. The below image is showing
the logistic function:
38. Mehta Sourabh (2022) How is Maximum Likelihood Estimation used in Machine Learning, The Analytics India MAG.
199
PP-AIDA&CS Data Analytics and Law
Source: https://analyticsindiamag.com/how-is-maximum-likelihood-estimation-used-in-machine-learning/
The above explains the scenario, as we can see there is a threshold of 0.5 so if the possibility comes out to be
greater than that it is labelled as 1 otherwise 0.
200
Data Analytics and Law LESSON 6
sides of the same coin. This is suggested by the symbolic equation “Data = Reality + Error”, in which “Reality”
represents conclusions drawn from the data that are valid despite the error and “Error” represents spurious
conclusions suggested by the data as a result of error. Since all conclusions fall into one or the other of these
two categories, conclusions about error are at the same time conclusions about reality, and conversely.
Customer
Compeors
Company
Direct Assessment
There are two general approaches to the assessment of data, direct and indirect. Direct assessment consists of
evaluating the coverage and content of a data set. Coverage refers to the faithfulness of the correspondence
between the records that constitute the data set and the statistical aggregate the data set represents. Data sets
may omit records for some entities that should be represented and include records that should not be included.
Improper inclusions occur when a data set includes more than one record for the same entity, includes records
for entities not in the statistical aggregate, or includes fictitious records. Content refers to the completeness and
accuracy of the information contained on the records in the data set.
Indirect Assessment
Direct assessment of data sets is expensive, both because a second data set is required for comparison and
because matching is often a complex and difficult process. The results of direct assessment are, moreover,
limited by response correlation bias and by the tendency of data sets collected at the same or nearly the same
time to have similar content error. The indirect approach, by which data sets are assessed by analyzing the
accuracy of statistics derived from them, is generally far less expensive and will often give results as good as
or better than direct assessment.
201
PP-AIDA&CS Data Analytics and Law
l Demographic data, that is, information on groups of people or population as per certain attributes
like age, sex and place of residence, plays a huge part in this analysis. Figuring out your business’s
target market and their desires will drastically improve the success rate of your marketing
strategies after they are put into circulation.
l The Second C – Competitor Analysis
l Competitor analysis is mainly done by visiting their websites, subscribing to their newsletters,
visiting their stores and/or receiving the service (heuristic analysis) they offer.
l The Third C – Corporation Analysis
l The last step you’ll want to take with this method requires you to analyze your own client’s
corporation. You’ll want to know what marketing strategies have worked for them in the past and
what ideas have failed. The best way for you to do this is, again, from the customer’s viewpoint.
Note: Case law citation refers to a referencing system used by legal professional to identify judicial decisions,
either in series of books called Reporters, or on Legal research websites, or a neutral style which identifies
the case regardless of where it is reported.
39. Whalen Ryan (2016) Legal Networks: The Promises and Challenges of Legal Network Analysis, 2016 Mich. ST. L. Rev. 539
40. See, e.g., John P. Heinz & Edward O. Laumann, Chicago Lawyers: The Social Structure of the Bar (1982).
41. See, e.g., Romain Boulet, Pierre Mazzega & Danièle Bourcier, A Network Approach to the French System of Legal Codes—Part I: Analysis
of a Dense Network, 19 Artificial Intelligence & L. 333 (2011).
42. See, e.g., Jialun Qin et al., Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network, in 3495 Lecture Notes in
Computer Science: Intelligence & Security Informatics 287 (Paul Kantor et al. eds., 2005).
43. See, e.g., Fowler & Jeon.
202
Data Analytics and Law LESSON 6
associated with nodes and edges. The network data in this article were acquired from external data
sources. The network is represented by nodes and edges: the nodes are the relational data such as
sources (cases on the one hand, and Roman law, customary law and case law on the other hand), while
the edges represent the citations between these nodes. On all occasions, the cases records are the
sources because only these records contain references.
LESSON ROUND-UP
l In the modern times, industry whether legal or technology, academy, practitioners and scholars utilize
artificial intelligence (AI) and machine learning to perform analyses which used to be labor-intensive
endeavors a decade back.
l Data analytics is the science of analyzing raw data to make conclusions about the information.
l Many of the techniques and processes of data analytics have been automated into mechanical
processes and algorithms that work over raw data for human consumption.
l Data analytics is the process that refers to deriving valuable insights and information from data using
quantitative and qualitative methods.
l Legal analytics, with the help of data processing technologies, helps lawyers clean up, collate, and
structurally analyze data.
l Data in the law industry can be broadly classified into individual data, law firm data, and industry data.
l Individual data is the data that one has in one’s personal repository.
l Legal analytics is tool of facilitation and improving efficiency of legal results rather than a replacement
or a solution for all legal case and client needs.
l Practice of law analytics gives in-house counsel insight that supports the legal practice, including data
on legal contracts and cases.
l Artificial Intelligence (AI) is beginning to transform the legal profession in many ways and aims to take
on higher-level tasks such as advising to clients, negotiating deals and drafting of standard contracts
and agreements.
l Adoption of QLP algorithms to predict case outcome essentially provides individuals a risk management
tool when deciding whether to adjudicate or not. This risk management tool can predict a case outcome,
on average, with a better accuracy than a lawyer, promising a new era in how litigation decisions are
made.
l Machine learning is a branch of Artificial Intelligence, which allows machines to perform data analysis
and make predictions.
l Maximum Likelihood Estimation (MLE) is a probabilistic based approach to determine values for the
parameters of the model.
l The likelihood function measures the extent to which the data provide support for different values of
the parameter.
l While legal scholars have not adopted network analytic methods to the same extent as those in
other fields of study, there have been a variety of legal network studies, and the trend appears to be
increasing.
203
PP-AIDA&CS Data Analytics and Law
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. Write a short note on Data Analytics.
2. What is Artificial Intelligence (AI) and Machine Learning (ML). Discuss the role of AI and ML in Law and
Legal Industry.
3. Write Short Note on any two of the following:
a. Bias/Variance
b. Overfitting and Underfitting
c. Legal Analysis.
4. Discuss 3 Ways to use Legal Analytics. Substantiate the same with suitable examples.
l Novotna Tereza, Network Analysis in Law: A Literature Overview and Research Agenda
l Park So-Hui et al (2021) A Survey of Research on Data Analytics-Based Legal Tech, MDPI, Volume 13,
Issue 14
l Trasberg Henrik (2019) Quantitative Legal Prediction and the Rule of law, Master Thesis, Law and
Technology LLM, TILBURG University Law School. Available at http://arno.uvt.nl/show.cgi?fid=149307
204
Data Analytics and Law LESSON 6
l Marios Koniaris et al (2018) Network analysis in the legal domain: a complex model for European Union
legal sources. Get access Arrow, Journal of Complex Networks, Volume 6, Issue 2, April 2018, Pages
243–268.
l Network Analysis and Law: Introductory Tutorial, Computer Legal Studies, Jurix 2011
l Lauri Donahue (2018) A Primer on Using Artificial Intelligence in the Legal Profession, JOLT Digest,
Harvard University. Available on https://jolt.law.harvard.edu/digest/a-primer-on-using-artificial-
intelligence-in-the-legal-profession
l Legal Analytics: Definition and Advantage, Legal Practice, Lego Desk. Available at https://legodesk.
com/legopedia/legal-analytics-definition-advantage/#:~:text=This%20data%20is%20collected%20
from,similar%20scenarios%2C%20and%20so%20on.
Lexis Insights (2023) What is Legal Analytics, Lexis Nexis. Available on https://www.lexisnexis.com/
community/insights/legal/b/thought-leadership/posts/what-is-legal-analytics
205
PP-AIDA&CS Data Analytics and Law
206
PART II
Technological
Perspective
Lesson
Computer Hardware and Software
7
KEY CONCEPTS
n Computer System n Primary Storage n Secondary Storage n Computer Peripherals – Inputs, Output, and
Storage Devices n Computer Software n Software Trends n Multi-Programming n Multi-Processing n Time
Sharing n Batch Processing n On-Line and Real-Time Processing n Application Software
Learning Objectives
To understand:
The basic functions of hardware parts of the computer
Identify the names and distinguishing features of different kinds of devices
Identify the names, and distinguishing features, of memory and storage devices
Identifies BIOS and System software
Lists jobs of the operating system
Features of different operating systems
Lesson Outline
An Introduction – Computer System Concept, Types, Categories and Emerging Technologies
Components of a Computer System
Primary and Secondary Storage
Computer Storage Capacities
Computer Peripherals – Inputs, Output and Storage Devices
Computer Software: An Introduction
Software Trends
Multi-Programming
Multi-Processing
Time Sharing
Batch Processing
On-Line and Real Time Processing
Application Software
Lesson Round-Up
Test Yourself
List of Further Readings
List of Other References
209
PP-AIDA&CS Computer Hardware and Software
AN INTRODUCTION
A computer is an electronic device that receives information and data, automatically stores it and retrieves
it at any time, and uses it in a useful manner. The computer converts different types of numbers and solves
intractable mathematical equations very quickly and with high accuracy.
The computer was invented in the second half of the twentieth century and now it has become the backbone
of life. Some operations before the invention of the computer were very difficult, including searches and doing
some arithmetic activities. In 1642 AD, the calculator was invented to facilitate arithmetic operations such as
addition, subtraction, and other arithmetic operations.
Presently, in the world of digital economies, computers play an important role. Further, computer is vital in
people’s day to day life. It will be apt to state that computer is indispensable, and its presence has become very
important and necessary in our daily life, and it has become easier for us to do many operations and activities.
The computer has been able to invade the lives of individuals in a large way, and it is used in all areas of their
lives. Computer use is common in homes, institutions, businesses, and education, it is also an integral part of the
services, entertainment, and other sectors.
Based on this great position that it has enjoyed, the manufacturers have been interested in producing many
shapes and types for it in line with the user’s need, including the mobile device, office devices, and others.
The more advanced the device is, the more benefits will be gained from it. Hence the hardware and software
are getting updated in the market time and again. One cannot understand the functioning of the computer
without understanding the role of hardware and software in it. Hence this chapters dedicates to provide a clear
understanding of Hardware and Software.
CPU
Input CU Output
Devices Devices
ALU
210
Computer Hardware and Software LESSON 7
Characteristics of a Computer2
High Speed
l Computer is a very fast device.
l It is capable of performing calculations of very large amounts of data.
l The computer has units of speed in microseconds, nanoseconds, and even the picosecond.
l It can perform millions of calculations in a few seconds as compared to a man who will spend many
months performing the same task.
Accuracy
l In addition to being very fast, computers are very accurate.
l The calculations are 100% error free.
l Computers perform all jobs with 100% accuracy provided that the input is correct.
Storage Capability
l Memory is a very important characteristic of computers.
l A computer has much more storage capacity than human beings.
l It can store a large amount of data.
l It can store any type of data such as images, videos, text, audio, etc.
Diligence
l Unlike human beings, a computer is free from monotony, tiredness, and lack of concentration.
l It can work continuously without any error and boredom.
l It can perform repeated tasks with the same speed and accuracy.
Versatility
l A computer is a very versatile machine.
l A computer is very flexible in performing the jobs to be done.
l This machine can be used to solve problems related to various fields.
l At one instance, it may be solving a complex scientific problem, and the very next moment it may be
playing a card game.
Reliability
l A computer is a reliable machine.
l Modern electronic components have long lives.
l Computers are designed to make maintenance easy.
Automation
l Computer is an automatic machine.
l Automation is the ability to perform a given task automatically. Once the computer receives a program
2. Reproduced from Introduction to Computer Hardware, Sathyabama Institute of Science and Technology
211
PP-AIDA&CS Computer Hardware and Software
i.e., the program is stored in the computer memory, then the program and instruction can control the
program execution without human interaction.
Reduction in Paper Work and Cost
l The use of computers for data processing in an organization leads to reduction in paper work and
results in speeding up the process.
l As data in electronic files can be retrieved as and when required, the problem of maintenance of large
number of paper files gets reduced.
l Though the initial investment for installing a computer is high, it substantially reduces the cost of each
of its transactions.
Mobile computers and mobile Fits on your lap or in your hand Usually one
devices
Source: https://portal.abuad.edu.ng/
There are two types of supercomputers: General Purpose and Special Purpose.4
General Purpose: This form of a supercomputer can be divided into three subtypes.
l Vector processing supercomputers rely on array processors. These are similar to the central processing
unit (CPU) of a standard computer. However, they perform rapid mathematical operations on a large
3. Reproduced from https://en.wikiversity.org/wiki/Types_of_computers
4. https://blog.udemy.com/categories-of-computer/
212
Computer Hardware and Software LESSON 7
number of data elements. These were the basis of the supercomputer industry in the 1980s and 90s,
and today’s devices still have some form of vector processing instruction.
l Clusters refer to groups of connected computers that work together as a supercomputing unit. An
example is a group that runs high-powered database programs that help produce results from the
compilation of Big Data.
l Commodity clusters are large numbers of standard-issued personal computers (PCs). They’re connected
through high-bandwidth and low-latency local area networks (LANs).
Special Purpose: Special purpose computers are supercomputers designed with an explicit purpose to
achieve a particular task or goal. They normally use application-specific integrated circuits (ASICs) for better
performance. IBM’s Deep Blue is an example of one of these devices.
2. Quantum Computer
The industry is replacing supercomputers with Quantum Computers. A quantum computer is a computer that
exploits quantum mechanical phenomena. It measures in “Qubits”.
3. Mainframe
Mainframe (colloquially, “big iron”) computers are similar to supercomputers in many aspects, the main
difference between them is the fact that a supercomputer uses all its raw power to focus on very few tasks,
while a mainframe performs thousands or millions of operations concurrently. As discussed, mainframes are
not supercomputers. Here are a few differences.
l They serve a large number of users.
l They’re used as storage space for the collection, compilation, and release of multiple database
arguments.
l Mainframe computations are recorded in MIPS instead of quadrillions of instructions.
l They cost less to purchase and maintain.
l They can run multiple operating systems at the same time.
Due to their nature, mainframes are often employed by large organizations for bulk data processing, such
as census, industry and consumer statistics, enterprise resource planning, and transaction processing.
4. Server Computer
A server is a central computer that contains collections of data and programs. Also called a network server,
this system allows all connected users to share and store electronic data and applications. Two important
types of servers are file servers and application servers.
Servers are a step below supercomputers because they don’t focus on trying to solve one very complex
problem but try to solve many similar smaller ones. An example of servers would be the computers that
Wikipedia stores its encyclopedia. Those computers have to go and find the page you’re looking for and
send it to you. In itself, it’s not a big task, but it becomes a job for a server when the computers have to
go and find lots of pages for a lot of people and send them to the right place. Some servers, like the ones
Google uses for something like Google Documents, have applications on them instead of just files, like
Wikipedia.
5. Midrange Computers
The midrange is a step down from a mainframe. About the size of a regular refrigerator, this multiprocessing
machine supports a maximum of 200 users at the same time. Despite its name, a midrange computer isn’t
considered a PC.
213
PP-AIDA&CS Computer Hardware and Software
This category of machine, originally named minicomputer, was developed in the 1960s as an affordable
alternative to mainframes. However, it had higher processing power. The main reason is that midrange
computers are capable of running on higher-level programming languages. For example, in the 70s and
80s, they processed data through Fortran or BASIC.
While midrange computers still exist, they are nearly obsolete. The processing power they possessed is now
found in desktops, laptops, and even smart devices.
6. Microcomputers
A microcomputer is a smaller machine that runs on a microprocessor. This category costs far less than larger
computers with immense power. Such “minicomputers” are used for regular and practical use.
The age of the microcomputer began in 1970 when the microprocessor was released. Rather than a series of
circuit boards or vacuum tubes, a single central processing unit was established. Since the size of a computer
could be greatly reduced, the company MITS was able to release the first personal microcomputer, the
ALTAIR 8800, in 1974.
7. Workstation Computer
Workstations are high-end, expensive computers that are made for more complex procedures and are
intended for one user at a time. Some of the complex procedures consist of science, math, and engineering
calculations and are useful for computer design and manufacturing. Workstations are sometimes improperly
named for marketing reasons. Real workstations are not usually sold in retail, but this is starting to change;
Apple’s Mac Pro would be considered a workstation.
8. Personal Computer or PC
PC is an abbreviation for a Personal Computer, it is also known as a Microcomputer. It’s physical
characteristics and low cost are appealing and useful for its users. The capabilities of a personal computer
have changed greatly since the introduction of electronic computers. By the early 1970s, people in academic
or research institutions had the opportunity for single-person use of a computer system in interactive mode
for extended durations, although these systems would still have been too expensive to be owned by a
single individual. The introduction of the microprocessor, a single chip with all the circuitry that formerly
occupied large cabinets, led to the proliferation of personal computers after about 1975. Early personal
computers, generally called microcomputers, were sold often in kit form and in limited volumes and were
of interest mostly to hobbyists and technicians. By the late 1970s, mass-market pre-assembled computers
allowed a wider range of people to use computers, focusing more on software applications and less on the
development of processor hardware. Throughout the 1970s and 1980s, home computers were developed for
household use, offering some personal productivity, programming, and games, while somewhat larger and
more expensive systems (although still low-cost compared with minicomputers and mainframes) were aimed
for office and small business use.
Today a personal computer is an all-around device that can be used as a productivity tool, a media server,
and a gaming machine. The modular construction of the personal computer allows components to be easily
swapped out when broken or upgraded.
9. Microcontroller
Microcontrollers are mini-computers that enable the user to store data and execute simple commands and
tasks. Many such systems are known as embedded systems. The computer in your car, for example, is an
embedded system. A common microcontroller that one might come across is called Arduino.
214
Computer Hardware and Software LESSON 7
Mobile computers are small and meant to be taken from place to place. Today, many mobile devices have
the same power, if not more, as a desktop computer. Furthermore, because they are destined for use in
different locations, they are more versatile.
There have been waves of mobile computing over the years. Each of them has seen advancements that
made the devices smaller. Yet, they still had the same performance abilities.
l Portability: This concept began with the introduction of the Dynabook in 1968. Though it was originally
considered for children, developers realized a portable computer could be used for everyday needs.
The first official portable computer, the GRiD Compass, came out in 1981 and was the size of half a
briefcase.
l Miniaturization: By the 1990s, the size of computer hardware had reached a stage where small mobile
computers could be introduced into the market. Thus, the concept of the personal digital assistant (PDA)
was created. The PDA wasn’t considered a substitute for a desktop. Rather, it was a supplement for
those who spent long periods away from their PCs.
l Connectivity: This wave is connected to wireless communications. In 1973, a team at Motorola patented
a mobile phone concept. A decade later, it produced the DynaTAC 8000X, the first commercial mobile
phone small enough to carry. As technology improved, items like a short message service (SMS),
calendars, and internet browsing were introduced to extend connectivity.
l Convergence: The next wave took place when manufacturers decided to combine specialized mobile
devices into hybrids. The first phase was the smartphone. This combined a PDA’s functionality with
mobile phone operations. This created a large series of innovations that included mini-QWERTY
keyboards and touchscreens.
The concepts created during these waves are still active today. Those that aren’t, like PDAs, are
incorporated into other devices. Below is a list of contemporary mobile computers.
11. Laptops
Laptops are designed to be used in different locations. Components are contained within a single panel that
has the functions of a keyboard, mouse, and power switch. An attached screen folds over, so the laptop is
easily carried. As their size and weight decreased over the years, laptops have become more popular. When
attached to a docking station, they have the same abilities as a desktop. For instance, multiple monitors can
be attached to the station for a larger display.
12. Netbook
The netbook is a smaller version of a laptop. It’s intentionally designed to be lighter and less expensive. For
instance, it might have a screen that’s six or seven inches wide, compared to the 11-inch to 13-inch screen of
a standard laptop.
Everything in a netbook is miniaturized. Low-voltage, low-power CPUs are installed due to size restraints. To
maintain its lightness, a netbook has smaller hard drives.
While popular in the late 2000s and early 2010s, the netbook market has eroded in place of smart tablets.
215
PP-AIDA&CS Computer Hardware and Software
13. Tablet
A tablet, also called a smart tablet, is a flat mobile computer. Rather than having a keyboard and mouse,
it uses touch-screen functionality for navigation. Tablets tend to be more versatile due to the wide range of
third-party applications they can leverage.
Several types of tablets exist. Specialized models like the Amazon Kindle are primarily used for items like
reading eBooks. However, they also allow users to watch videos and play games.
Hybrid tablets, like Microsoft Surface, have a similar style to this mobile computer. However, they come with
a desktop-style OS and keyboard extensions to act like a microcomputer.
14. Handheld game console
Before the popularity of smart devices, handheld game consoles ruled the market. Some of the most popular
of these were Nintendo’s Game Boy & DS and the Sony PSP. Currently, the Nintendo Switch is the market
leader as other consumers turn to their smartphones and tablets to play games.
15. Smartphone
A smartphone is a mobile device that combines cellular and mobile computing functions into one unit.
They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile
operating systems, which facilitate wider software, internet (including web browsing over mobile broadband),
and multimedia functionality (including music, video, cameras, and gaming), alongside core phone functions
such as voice calls and text messaging. Smartphones typically contain a number of metals–oxide–
semiconductor (MOS) integrated circuit (IC) chips, including various sensors that can be leveraged by their
software (such as a magnetometer, proximity sensors, barometer, gyroscope, or accelerometer), and support
wireless communications protocols (such as Bluetooth, Wi-Fi, or satellite navigation).
16. Microcontrollers
Microcontrollers, also known as embedded systems, are minicomputers that store data. Additionally, they
execute simple commands and tasks. These are located in places that form the world called the “Internet of
Things” (IoT).
IoT comprises those computing devices that operate out of other systems. Your vehicle’s onboard computer
is an example. Not only does it maintain the regular operations of your car, but it also sends information to
the manufacturer or, in the case of trouble, a third party that alerts emergency services.
Microcontrollers are also part of appliances, including smart refrigerators and manufacturing machines. If it
can reach the internet through an app or a wireless connection, the microcontroller is part of the IoT.
EMERGING TECHNOLOGIES
Emerging technologies are technologies whose development, practical applications, or both are still largely
unrealized. These technologies are generally new but also include older technologies finding new applications.
Emerging technologies are often perceived as capable of changing the status quo.5
Emerging technologies are characterized by radical novelty (in the application even if not in origins), relatively
fast growth, coherence, prominent impact, and uncertainty and ambiguity. In other words, an emerging
technology can be defined as “a radically novel and relatively fast-growing technology characterized by a
certain degree of coherence persisting over time and with the potential to exert a considerable impact on the
socio-economic domain(s) which is observed in terms of the composition of actors, institutions, and patterns
5. Rotolo, Daniele; Hicks, Diana; Martin, Ben R. (December 2015). "What is an emerging technology?" (PDF). Research Policy. 44 (10): 1827–
1843.
216
Computer Hardware and Software LESSON 7
of interactions among those, along with the associated knowledge production processes. Its most prominent
impact, however, lies in the future and so in the emergence phase is still somewhat uncertain and ambiguous.”67
Artificial Intelligence Automate and optimize Chatbots, fraud detection, image recognition,
(AI) and processes, provide insights predictive maintenance,
Machine Learning (ML) personalization, recommendation engines, etc.
Robotic Process Automation of repetitive and Data entry, invoicing, HR onboarding, financial
Automation (RPA) rule-based tasks reporting, etc.
Virtual Reality (VR) and Immersive experiences, user Gaming, education, training, marketing,
Augmented Reality interaction tourism, etc.
(AR) with digital environments
Blockchain Secure and transparent Supply chain tracking, digital identity, voting,
transactions payment processing, etc.
Internet of Things (IoT) Improved efficiency, Smart homes, industrial automation, healthcare
automation, and monitoring monitoring,
energy management, etc.
Digital Trust Building trust in digital Online banking, e-commerce, social media,
interactions digital identity, etc.
Internet of Behaviours Analysis and use of data from Retail analytics, healthcare monitoring, smart
human behaviour cities, etc.
6. Ibid
7. Reproduced from Koenig India – Step Forward
217
PP-AIDA&CS Computer Hardware and Software
Predictive analytics Analysis and use of data to Customer retention, fraud detection, supply
predict outcomes chain optimization,
risk management, etc.
Following are the emerging technologies related to computer systems and information and communication
technologies:8
1. Computing Power
Computing power has already established its place in the digital era, with almost every device and appliance
being computerized. And it’s here for even more as data science experts have predicted that the computing
infrastructure we are building right now will only evolve for the better in the coming years. At the same time,
we have 5G already; gear up for an era of 6G with more power in our hands and devices surrounding us.
2. Smarter Devices
Artificial intelligence has played an essential role in making our world smarter and smoother. It is not just
simulating humans but going the extra mile to make our life hassle-free and simpler. These smarter devices
are here to stay in 2023 and even further, as data scientists are working on AI home robots, appliances,
work devices, wearables, and so much more! Almost every job needs smart software applications to make
our work life more manageable. Smarter devices are another addition to the IT industry that is of high
requirement and demand as more companies transform into digital spaces.
3. Datafication
Datafication is simply transforming everything in our life into devices or software powered by data. So, in
short, Datafication is the modification of human chores and tasks into data-driven technology. From our
smartphones, industrial machines, and office applications to AI-powered appliances and everything else,
data is here to stay for longer than we can ever remember! So, to keep our data stored the right way and
secure and safe, it has become an in-demand specialization in our economy.
4. Artificial Intelligence (AI) and Machine Learning
Artificial Intelligence, or AI, has already received a lot of buzz in the past decade, but it continues to be
one of the new technology trends because its notable effects on how we live, work, and play are only in
the early stages. AI is already known for its superiority in image and speech recognition, navigation apps,
smartphone personal assistants, ride-sharing apps and so much more.
8. Reproduced by Nikita Duggal (2023) Top 18 New Technology Trends for 2023, Simplilearn.com. Available at https://www.simplilearn.com/
top-technology-trends-and-jobs-article
218
Computer Hardware and Software LESSON 7
Other than that AI will be used further to analyze interactions to determine underlying connections and
insights, to help predict demand for services like hospitals enabling authorities to make better decisions
about resource utilization, and to detect the changing patterns of customer behavior by analyzing data in
near real-time, driving revenues and enhancing personalized experiences. Machine Learning is the subset
of AI.
5. Extended Reality
Extended reality comprises all the technologies that simulate reality, from Virtual Reality, Augmented Reality
to Mixed Reality, and everything else in between. It is a significant technology trend presently as all of us
are craving to break away from the so-called real boundaries of the world. By creating a reality without any
tangible presence, this technology is massively popular amongst gamers, medical specialists, and retail
and modeling.
6. Digital Trust
With people being accommodated and tangled with devices and technologies, confidence and trust have
been built towards digital technologies. This familiar digital trust is another vital trend leading to more
innovations. With digital conviction, people believe that technology can create a secure, safe, and reliable
digital world and help companies invent and innovate without worrying about securing the public’s
confidence.
7. 3D Printing
A key trend in innovation and technology is 3D printing which is used to formulate prototypes. 3D printing
is another innovation that’s here to stay. Companies in the data and healthcare sector require a lot of 3D
printing for their products. All you need is a sound knowledge of AI, Machine Learning, Modeling, and 3D
printing.
8. Genomics
Imagine a technology that can study your DNA and use it to improve your health, helping you fight diseases
and whatnot. Genomics is precisely that technology that peruses upon the make-up of genes, DNAs, their
mapping, structure, etc. Further, this can help quantify your genes and result in finding diseases or any
possible problems that can later be a health issues.
9. New Energy Solutions
The world has agreed to be greener for the sake of its landscapes and the energy we use. This results in
cars running on electricity or battery and houses using greener choices like solar and renewable energy.
What’s even better is that people are conscious of their carbon footprints and waste; thus, minimizing it or
turning those into renewable energy is even more helpful.
10. Robotic Process Automation (RPA)
Like AI and Machine Learning, Robotic Process Automation, or RPA, is another innovative technology.
RPA is the use of software to automate business processes such as interpreting applications, processing
transactions, dealing with data, and even replying to emails. RPA automates repetitive tasks that people
used to do.
11. Edge Computing
Formerly a new technology trend to watch, cloud computing has become mainstream, with major players
AWS (Amazon Web Services), Microsoft Azure, and Google Cloud Platform dominating the market.
219
PP-AIDA&CS Computer Hardware and Software
9. Students to note that Input Device, Output Device and Storage Device is being discussed in below mentioned sub-section of this Chapter.
220
Computer Hardware and Software LESSON 7
(B) Computer software10 – They also known as programs or applications. They are classified into two
classes namely - system software and application software.
(C) Liveware – It is the computer user. Also, known as orgware or the humanware. The user commands the
computer system to execute instructions.
Memory
Primary Secondary
Memory Memory
Source: https://www.shiksha.com/
10. Students to note that Software is discussed in detail in the other sub-sections of this chapter.
11. Reproduced from https://www.shiksha.com/online-courses/articles/difference-between-primary-memory-and-secondary-memory/
221
PP-AIDA&CS Computer Hardware and Software
222
Computer Hardware and Software LESSON 7
capacity, but users should focus on usable capacity instead because usable capacity can be significantly lower
than raw capacity. That is why raw capacity is generally reported in decimal terabytes.
Usable Capacity
This is how much data can be stored in the system in the absence of any data reduction, meaning before data
reduction. The use of the term usable capacity to mean capacity before data reduction. Usable capacity is
lower than raw capacity because of overheads such as RAID (redundant array of independent disks) and flash
over-provisioning. The ratio of the usable capacity to the raw capacity is referred to as the “usable ratio”, which
by definition is usable capacity divided by raw capacity is greater or equal to one.
Usable Capacity / Raw Capacity = Usable Ratio
12. Students to note - Primary and Secondary Storage is already discussed in the above mentioned sub-sections of the Chapter.
223
PP-AIDA&CS Computer Hardware and Software
c. Memory Registers: A register is a temporary unit of memory in the CPU. These are used to store
the data, which is directly used by the processor. Registers can be of different sizes (16-bit, 32-bit,
64 bit and so on) and each register inside the CPU has a specific function, like storing data, storing
an instruction, storing address of a location in memory etc. The user registers can be used by
an assembly language programmer for storing operands, intermediate results etc. Accumulator
(ACC) is the main register in the ALU and contains one of the operands of an operation to be
performed in the ALU.
l Memory Unit is the primary storage of the computer.
l It stores both data and instructions.
l Data and instructions are stored permanently in this unit so that they are available whenever
required.
3. Output Unit:
The output unit consists of output devices that are attached to the computer. It converts the binary data
coming from the CPU to human understandable form. The common output devices are monitor, printer,
plotter, etc.
l The output unit displays or prints the processed data in a user-friendly format.
l The output unit is formed by attaching the output devices of a computer.
l The output unit accepts the information from the CPU and displays it in a user-readable form.
224
Computer Hardware and Software LESSON 7
Other types of software include programming software, which provides the programming tools software
developers need; middleware, which sits between system software and applications; and driver software, which
operates computer devices and peripherals.
Set of instructions that tells the computer hardware what to do is known as computer program. This program or
collection of such programs is known as computer software. Concept of software is illustrated in following figure:
Source: https://www.codesansar.com/
Among the various categories of software, the most common types include the following:
l Application software: The most common type of software, application software is a computer software
package that performs a specific function for a user, or in some cases, for another application. An
application can be self-contained, or it can be a group of programs that run the application for the user.
Examples of modern applications include office suites, graphics software, databases and database
management programs, web browsers, word processors, software development tools, image editors
and communication platforms.
l System software: These software programs are designed to run a computer’s application programs and
hardware. System software coordinates the activities and functions of the hardware and software. In
addition, it controls the operations of the computer hardware and provides an environment or platform
for all the other types of software to work in. The OS is the best example of system software; it manages
all the other computer programs. Other examples of system software include the firmware, computer
language translators and system utilities.
l Driver software: Also known as device drivers, this software is often considered a type of system
software. Device drivers control the devices and peripherals connected to a computer, enabling them
225
PP-AIDA&CS Computer Hardware and Software
to perform their specific tasks. Every device that is connected to a computer needs at least one device
driver to function. Examples include software that comes with any nonstandard hardware, including
special game controllers, as well as the software that enables standard hardware, such as USB storage
devices, keyboards, headphones and printers.
l Middleware: The term middleware describes software that mediates between application and system
software or between two different kinds of application software. For example, middleware enables
Microsoft Windows to talk to Excel and Word. It is also used to send a remote work request from an
application in a computer that has one kind of OS, to an application in a computer with a different OS.
It also enables newer applications to work with legacy ones.
l Programming software: Computer programmers use programming software to write code. Programming
software and programming tools enable developers to develop, write, test and debug other software
programs. Examples of programming software include assemblers, compilers, debuggers and
interpreters.
SOFTWARE TRENDS
An article published in DevTeam.Space14 highlighted the key trends in software development are as follows:
1. Mixed Reality (MR): High potential in enterprise solutions
Mixed Reality (MR), i.e., a combination of Augmented Reality (AR) and Virtual Reality (VR) has significant
potential in enterprise applications. AR integrates digital content with the physical environment of users,
whereas VR creates an immersive experience for users. Organizations in many sectors like defense, tourism,
architecture, construction, gaming, healthcare, etc. are realizing key business value with the help of this
technology.
2. Blockchain: Augmenting enterprise solutions with transparency, efficiency and security
While cryptocurrencies like Bitcoin and Ether have made us sit up and notice blockchain, the technology
has wide implications for enterprise systems. Blockchain is a Peer-To-Peer (P2P) network, and it offers
decentralization, a distributed ledger, security features, and transparency.
Smart contracts running on blockchain networks are tamper-proof and transparent, therefore, they improve
trust. Their execution is irreversible, which can make contract administration easier. Businesses and
governments are keenly exploring blockchain, therefore, its global market is growing rapidly.
3. Artificial Intelligence (AI): Ushering in intelligent enterprise systems
Artificial Intelligence (AI) is a multi-disciplinary branch of computer science, which intends to make machines
perform tasks that only human beings could do earlier. It is a vast field, and while parts of it have been
commercialized, research & development continue on its other dimensions.
AI includes various capabilities like machine learning (ML), deep learning, vision, natural language
processing, speech, etc.
4. The Internet of Things (IoT)
As technology trends go, the Internet of Things (IoT) is one that could have far-reaching impacts on our world,
and not just on businesses. IoT is a network of physical objects like gadgets, devices, vehicles, appliances,
etc., and these devices use sensors. Devices on these networks use application programming interfaces
(APIs) to exchange data over the Internet.
226
Computer Hardware and Software LESSON 7
IoT is a result of the integration of various technologies like sensors, Big Data, AI, ML, Radio-Frequency
Identification (RFID), and APIs. Read more about it in “What is the Internet of Things (IoT)?”.
5. Language and framework trends for developing enterprise apps
Both Kotlin and Swift, the popular languages for native development on Android and iOS respectively, figure
prominently in the list of “most preferred languages”.
6. Cybersecurity: A Key consideration when building enterprise solutions
Experts consistently point out how cybercrimes cause trillions of dollars in losses, therefore, it is no surprise
that cybersecurity is a prominent consideration when developing an enterprise app. Cybercriminals are
organized, moreover, they are continuously upgrading their capabilities.
One ought to proactively mitigate the key application security risks. More often than not, mitigating
application security risks boils down to managing the project well, adhering to IT architecture and coding
guidelines, etc.
Key applications security risks are as follows:
l Injection;
l Ineffective Authentication;
l Exposure of Sensitive Data;
l XML External Entities (XXE);
l Incorrect Implementation of Identity and Access Management;
l Inadequate Security Configurations;
l Cross-Site Scripting (XSS);
l Deserialization without Adequate Security;
l Using Outdated Software with Known Vulnerabilities;
l Sub-Optimal Logging and Monitoring Processes.
7. “Progressive Web Applications” (PWAs)
“Progressive Web Apps” (PWAs) are web apps; however, they deliver a user experience partly similar to
native mobile apps. They are responsive, speedy, and secure, moreover, they can work offline. While PWAs
fall short of the native app user experience, developing them can be a good option if the development
budget is your priority. There is only one codebase to develop and maintain, therefore, PWAs are less
costly. In recent years, several businesses have seen improved customer engagement with the help of
PWAs, as you can read in “Progressive Web Apps (PWA): Source materials”.
8. Low-Code Development
A key trend that has emerged in recent years is low-code development. Businesses using this approach
have the objective of improving software development efficiency, and they seek to minimize hand-coding
for this.
Low-code development platforms offer GUIs, and developers use them to draw flowcharts depicting the
business logic. The platform then generates code for implementing that business logic.
If you plan to take advantage of such platforms then you should look for enterprise-grade platforms with
industry-standard security features. Appian and Mendix are good examples of low-code development
platforms.
227
PP-AIDA&CS Computer Hardware and Software
9. Code quality
Some things never change. And that’s why the importance of code quality in software development will
never decrease. Since many projects involve continuous integration of code from multiple contributors, this
process can throw up many code issues. Software development teams that maintain a high quality of code
enable their organizations to maintain the code easily.
10. Outsourcing
As the global business environment grows more and more complex, businesses are striving to make the
best use of the capabilities they have. Businesses have found out the importance of focusing on their
core competencies and offloading the peripheral tasks to partners that have core competencies there. This
realization continues to drive the trend of IT outsourcing.
One might need to outsource software development for its business too, however, focus on the right priorities.
E.g., in the longer term, delivering a quality product to your customers matters more than reducing cost.
MULTI-PROGRAMMING
Multi-programming is the allocation of more than one concurrent program on a computer system and its
resources. Multiprogramming allows using the CPU effectively by allowing various users to use the CPU and
I/O devices effectively. Multiprogramming makes sure that the CPU always has something to execute, thus
increases the CPU utilization.
MULTI-PROCESSING
Multi-processing is the use of two or more central processing units (CPUs) within a single computer system.
The term also refers to the ability of a system to support more than one processor or the ability to allocate
tasks between them. There are many variations on this basic theme, and the definition of multiprocessing can
vary with context, mostly as a function of how CPUs are defined (multiple cores on one die, multiple dies in one
package, multiple packages in one system unit, etc.). According to some on-line dictionaries, a multiprocessor
is a computer system having two or more processing units (multiple processors) each sharing main memory and
peripherals, in order to simultaneously process programs
TIME SHARING
Time sharing is the sharing of computing resources among several users simultaneously. Since this will allow
many users to work in a single computer system simultaneously, it would lower the cost of providing computing
capabilities.
BATCH PROCESSING
Batch processing is the method computers use to periodically complete high-volume, repetitive data jobs.
Certain data processing tasks, such as backups, filtering, and sorting, can be compute intensive and inefficient
to run on individual data transactions. Instead, data systems process such tasks in batches, often in off-peak
times when computing resources are more commonly available, such as at the end of the day or overnight. For
example, consider an ecommerce system that receives orders throughout the day. Instead of processing every
order as it occurs, the system might collect all orders at the end of each day and share them in one batch with
the order fulfillment team.
A good example of batch processing is how credit card companies do their billing. When customers get their
credit card bills, it isn’t a separate bill for each transaction; rather, there is one bill for the entire month.
228
Computer Hardware and Software LESSON 7
229
PP-AIDA&CS Computer Hardware and Software
l Real-time systems, on the other hand, are computer systems that are designed to process data in real-
time, as soon as it is generated. These systems typically have strict timing constraints and must be able
to respond to events in a timely manner. Examples of real-time systems include control systems for
manufacturing plants, traffic control systems, and flight control systems.
Key differences between online and real-time systems include:
l Timing: Online systems allow users to access and interact with data at any time, while real-time systems
are designed to respond to events in real time.
l Latency: Online systems may have higher latency as data is transmitted over a network, while real-
time systems typically have very low latency.
l Response time: Online systems may have longer response times as they must wait for user input and
may require additional processing time, while real-time systems must respond to events quickly and
have very short response times.
l Reliability: Real-time systems must be highly reliable and ensure that data is processed accurately
and on time, while online systems may not require the same level of reliability.
In summary, while online systems allow users to interact with data stored in databases and are accessible from
anywhere at any time, real-time systems are designed to process data in real time and must respond to events
quickly and accurately.
APPLICATION SOFTWARE16
The term “application software” refers to software that performs specific functions for a user. When a user
interacts directly with a piece of software, it is called application software. The sole purpose of application
software is to assist the user in doing specified tasks. Microsoft Word and Excel, as well as popular web browsers
like Firefox and Google Chrome, are examples of application software. It also encompasses the category of
mobile apps, which includes apps like WhatsApp for communication and games like Candy Crush Saga. There
are also app versions of popular services, such as weather or transportation information, as well as apps that
allow users to connect with businesses. Global Positioning System (GPS), Graphics, multimedia, presentation
software, desktop publishing software, and so on are examples of such software.
Function of application software:
Application software programs are created to help with a wide range of tasks. Here are a few examples:
l Information and data management;
l Management of documents (document exchange systems);
l Development of visuals and video;
l Emails, text messaging, audio and video conferencing, and cooperation are all options;
l Management of accounting, finance, and payroll;
l Management of resources (ERP and CRM systems);
l Management of a project;
l Management of business processes;
l Software for education (LMS and e-learning systems);
l Software for healthcare applications.
230
Computer Hardware and Software LESSON 7
LESSON ROUND-UP
l A computer is an electronic device that receives information and data, automatically stores it and
retrieves it at any time, and uses it in a useful manner.
l One cannot understand the functioning of the computer without understanding the role of hardware
and software in it.
231
PP-AIDA&CS Computer Hardware and Software
l Hence this chapters dedicates to provide a clear understanding of Hardware and Software.
l Computer system primarily comprises a central processing unit (CPU), memory, input/output devices
and storage devices.
l All these components function together as a single unit to deliver the desired output.
l Emerging technologies are characterized by radical novelty (in application even if not in origins),
relatively fast growth, coherence, prominent impact, and uncertainty and ambiguity.
l From the computer system perspective, computer can be defined as a collection of entities (hardware,
software and liveware) that are designed to receive, process, manage and present information in a
meaningful format.
l Primary memory is the internal memory of a computer system. It stores and retrieves data, instructions,
and information.
l Secondary memory is a storage device that the CPU cannot access directly. It is used as a permanent
storage device.
l Storage capacity is an important factor when deploying infrastructure in the data center.
l Storage capacity refers on disk space one or more storage devices provides.
l Software is a set of computer programs and associated documentation and data. This is in contrast to
hardware, from which the system is built and which actually performs the work.
l The computer software and hardware complete any task together. The software comprises of set of
instructions which on execution deliver the desired outcome.
l In other words, each software is written for some computational purpose.
l Software is a generic term used to refer to applications, scripts and programs that run on a device.
l Some examples of software include operating systems like Ubuntu or Windows 7/10, word processing
tools like LibreOffice Writer or Microsoft Word, video player like VLC Player, photo editors like Paint and
LibreOffice Draw.
l Multi-programming is the allocation of more than one concurrent program on a computer system and
its resources.
l Multi-processing is the use of two or more central processing units (CPUs) within a single computer
system.
l Time sharing is the sharing of computing resources among several users simultaneously.
l Batch processing is the method computers use to periodically complete high-volume, repetitive data
jobs.
l Real-time systems are those systems that do not lag and respond instantly.
l These are different from online systems in the sense that they transform their state with correspondence
to real or physical time.
l The term “application software” refers to software that performs specific functions for a user.
l When a user interacts directly with a piece of software, it is called application software.
232
Computer Hardware and Software LESSON 7
l The sole purpose of application software is to assist the user in doing specified tasks.
l Microsoft Word and Excel, as well as popular web browsers like Firefox and Google Chrome, are
examples of application software.
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. Briefly describe any four types of computer system prevalent in present digital era in India.
2. Write a short note on emerging technologies in the world of information and communication technologies.
3. What do you mean by Primary and Secondary Storage. Also state the difference between the two.
4. What is Software? Discuss five recent trends in software in 2023.
5. Write a note on Application Software. Give some example of Application Software.
l Archana Charles (2023) Top 19 New Technology Trends Emerging in 2023, Koenig India – Step Forward
l Basic Concepts in Computer Hardware and Software, Wikieducator.
l Categories of Computers: Types and Components, Udemy Team. Available at https://blog.udemy.com/
categories-of-computer/
l Computer System, Book by NCERT. Available at https://ncert.nic.in/textbook/pdf/kecs101.pdf
l Introduction to Computer Hardware, Satyabhama Institute of Science and Technology, 2021.
l Kaur Gurneet (2023) 10 Emerging Technologies in Computer Science that will shape our future, The
Coin Telegraph.
l Udemy Team (2022) Categories of Computers: Types and Components, Blog Udemy.
l https://ncerthelp.com/cbse%20notes/class%2011/ip/NotsForIPClass11Chapter%20(1).pdf
l https://byjus.com
l https://static.vikaspedia.in/media/files_en/education/Digital%20Litercy/it-literacy-courses-in-
associating-with-msup/computer-hardware-and-software-stu.pdf
l https://www.takshilalearning.com/importance-of-computer/#:~:text=The%20use%20of%20a%20
computer%20at%20home%20provides%20great%20advantages,learning%20new%20skills%20
and%20hobbies.
l https://www.geeksforgeeks.org/
l https://www.koenig-solutions.com/blog/top-new-technology-trends
l https://www.javatpoint.com/multiprogramming-vs-time-sharing-operating-system#:~:text=The%20
main%20difference%20between%20Multi,is%20to%20minimize%20response%20time.
l https://aws.amazon.com/what-is/batch-processing/#:~:text=Batch%20processing%20is%20the%20
method,run%20on%20individual%20data%20transactions.
233
PP-AIDA&CS Computer Hardware and Software
234
Lesson
Network Basics and Security
8
KEY CONCEPTS
n Network n Wired Network n Wireless Network n Computer Security n Network Security n Internet Security
n Network Protocol n IP Address n Nodes and Hosts n Protocols n Data Packets n Domain Name
Learning Objectives
To understand:
The concept of network and computer security
And get acquainted with different types of network
And gather an understanding of how networks operate along with relevant networking models
The common threats to network security
Measures to protect against attacks to network
Lesson Outline
Computer and Network Security: An Introduction
Intranets
Extranets
Internet
Networking concepts OSI models TCP/IP model
Ports
Secure protocols
Common network attacks
Network Devices Hubs
Bridges
Switch
Security Devices
Firewall
Lesson Round-Up
Glossary
Test Yourself
List of Further Readings
235
PP-AIDA&CS Network Basics and Security
Introduction
In today’s technologically driven world, computers are used to network and connect on a daily basis throughout
organizations, businesses, schools, government institutions and authorities. The importance of network and
security can be understood by way of the following example:
In a multinational corporation having corporate offices around the world, employees are dependent upon
computers to connect with clients, hold meetings and execute projects. In order to connect the huge workforce,
such corporations have networks which host multiple servers at the same time. The workstations of the
employees may have varied types of operating systems, hardware, software configuration, IP protocols and
the employees using them may have different levels of awareness regarding cyberspace. Considering that
thousands of employee workstations are connected to the internet, such a company network can become a
potential target of cyber-attacks.
In this Lesson, an attempt has been made to trace the basic concepts of network and network security.
NETWORK SECURITY
A computer network is a group of two or more devices/computers connected to one another for efficient
exchange of information. Networks are connected through networking devices like computer, switches, routers,
modems, etc. These networking devices may be connected through wires (for example, cables) resulting in a
wired network or through wireless media (for example, air) resulting in a wireless network.
It is important to note that data on a network is transmitted for communication in the form of packets, which are
nothing but small chunks of data1.
Network Security refers to the protective measures undertaken by an organization or individual to secure its
network systems and data from unauthorized access and attacks by hackers. The basic aim of any network
security system is to safeguard the accessibility, accuracy and confidentiality of sensitive data.
The importance of network security can be understood by way of the following example: Most businesses have
moved to an electronic mode where transactions are conducted online and goods are sold through company
owned websites or e-commerce websites. In order to facilitate such operations on the internet, it is important
to safeguard company resources and information, as any unauthorized attack can leak sensitive company
and customer information into the public domain. Even a minor security threat has the potential to disrupt the
company’s efficiency and reputation in the market.
Network security seeks to protect data in order to ensure and maintain the following2:
Data confidentiality: Assures that the data does not fall in the hands of unauthorized users.
Privacy: Assures that individuals are able to decide what data belonging to them may be disclosed, to whom it
is disclosed and the extent of disclosure.
Data Integrity: Assures that the data remains in its intended form, subject to modification only in authorized
manner.
System Integrity: Assures that systems perform their intended function, unhampered by any external
manipulation.
Availability: Assures that data available on the system is readily accessible and not denied to authorized users.
236
Network Basics and Security LESSON 8
INTRANETS
It refers to a private network within organizations for ensuring secure data sharing and communication among
all the employees3. It enables the organization to safely transmit sensitive and confidential data. The term ‘intra’
means ‘inside’. Therefore, it can be said that intranet centralises the digital workplace of an organisation, so
that documents, projects, databases, etc. can be shared securely within the organization4. Intranet is used by
departments and all employees of a company.
Intranet enables the organization to not only benefit from time and cost savings but also increases the
productivity and efficiency of workforce, by making the information available on a real time basis. Intranet also
serves as a tool to facilitate easy communication between the workforce.
EXTRANETS
It refers to a private network existing within an organization which uses the internet to connect with people
outside the organization, like customers and suppliers. This network is controlled in a manner that allows
customers, third parties or partners to access specific information only without providing them with access to
entire network5.
Extranet is used by business partners, suppliers and customers for collaboration with the company6. Benefits of
extranet include flexibility, reduced time in processing of orders, timely updation of information and reduction
of errors.
INTERNET
A worldwide network of inter-connected computers, servers, phones, and electronic devices is referred to as the
internet. These devices communicate with one another using the transmission control protocol (TCP) standard
to allow for the quick exchange of data and files as well as other services7.
Internet is a global hub of computer networks which enables a user at one computer system/workstation to not
only interact but also share and receive data and resources from any other user working on any other system/
workstation8.
The internet is widely used for purposes of communication, transmission of information and sharing of resources
across devices on a network. Whenever a user tries to visit a website, a request is made by protocol to the
server, which is a collection of web pages. The server in turn, looks for the exact webpage and delivers the same
to the user’s computer/device, resulting into an ‘end-to-end’ user experience9.
3 Difference between Intranet and Extranet, Available at: https://byjus.com/gate/difference-between-intranet-and-extranet/.
4 Ibid.
5 Supra, Note 2.
6 Ibid.
7 Chiradeep BasuMallick, What Is the Internet: Meaning, Working and Types, SPICEWORKS, (February 22, 2022); Available at: https://www.
spiceworks.com/tech/networking/articles/what-is-the-internet/.
8 Ibid.
9 Ibid
237
PP-AIDA&CS Network Basics and Security
NETWORKING CONCEPTS
OSI model
Open Systems Interconnection (OSI) model is reference framework created by the International Standards
Organization to foster an understanding of how technologies and devices interact with each other on a network.
This model consists of different layers which work together to move data around a network10. The different
layers of OSI Network will be discussed as follows:
l Physical Layer: This is the lowest layer in OSI model and is concerned with physical aspect of
data transmission. Here, information is contained in the form of bits, which is transmitted to
network notes. The transmission takes place through optical fibre, metallic cable, wireless radio
wave, etc.
l Data Link Layer: This layer breaks the data into smaller units called frames and adds a header and
trailer to each frame. The header contains a destination address to which the frame is transferred. This
layer ensures that data is transferred from node to node without any error.
l Network Layer: This layer determines the best route to transmit the data packet to its destination
and this function is known as ‘routing’. The Network Layer also places the IP addresses of sender and
receiver on header of each frame.
l Transport Layer: This layer takes data from higher levels of OSI model and breaks the same into
‘segments’, which are then sent to lower layers of the model for data transmission.11 It also undertakes
sequencing of data so that it is received and reassembled in correct order at the destination.
l Session Layer: This layer is responsible for establishing, maintaining and terminating connections
between networked devices12. It initiates a session and ensures that the session remains active
while data is being transmitted. After successful transmission, this layer closes the session. It also
establishes checkpoints, from where date transfer can be resumed in case of interruption during
any session.
l Presentation Layer: This layer is responsible for ensuring how data is presented to the network. It
undertakes three primary operations, namely Translation, Compression and Encryption. Translation
is done to convert data in form which can be understood by differently configurated computers.
Compression is done to reduce the size of data so that it can be transferred in a speedier manner.
Encryption involves encoding the data to protect it from getting tampered.
l Application Layer: This layer works as an interface to provide network services to the end user13.
The network applications produce data which is then transmitted over a network14. This layer allows
network applications to access the network and display information to the user.
238
Network Basics and Security LESSON 8
Please Note: This Model is only used for reference purposes and the current model being used on the internet
is TCP/IP model.
Presentaon Layer
is concerned with
how the data is
presented to network. Applicaon Layer
communicates directly
Sessions Layer creates 7. Applicaon Layer with user’s applicaon
communicaon channels program.
across devices in a 6. Presentaon Layer
network.
5. Session Layer Network Layer is responsible
Transport Layer converts for roung and transmi ng
data into units called segments
4. Transport Layer the data packets, by finding
and ensures that data is best route to send data
3. Network Layer from source to desnaon.
transmi ed in the correct order
as intended by sender. 2. Data Link Layer
Physical Layer provides a
Sessions Layer creates 1. Physical Layer physical medium for
communicaon channels transmission of bits. Lowest
across devices in a layer of the model.
network.
APPLICATION LAYER
TRANSPORT LAYER
INTERNET LAYER
NETWORK ACCESS
LAYER
15 Kartik Menon, The best guide to understand what is TCP/IP model, (February 26, 2023), Available at: https://www.simplilearn.com/
tutorials/cyber-security-tutorial/what-is-tcp-ip-model.
16 Supra, Note 18.
239
PP-AIDA&CS Network Basics and Security
l HHTP: The Hyper Text Transfer Protocol (HTTP) is the foundation of data exchange over the
World Wide Web as it makes data (be it in the form of files, images, sound clips, etc) easily
accessible to the user through hyperlinks. HTTP further specifies how data requests by the
user will be processed by sending it to the appropriate server, which in turn will send respond
to such request17.
l SMTP: Simple Mail Transfer Protocol (SMTP) is entrusted with the task of sending and receiving
electronic mails18.
l FTP: File Transfer Protocol (FTP) is concerned with transfer of files over a network19.
ii. Transport Layer: This layer is concerned with packaging of data into smaller packets and segments
so that they can be transmitted over the network. This layer also creates a communication
channel between the sender and receiver device for an error-free transmission of data without any
hindrance.
l TCP: Transmission Control Protocol (TCP) is the protocol which establishes a connection between
the source and destination system and further ensures proper movement of segments over
communication channel.20
l UDP: User Diagram Protocol (UDP) is mainly responsible for detection of errors during transmission
of data over the network21.
iii. Internet Layer: This layer is responsible for routing the data during transmission by pointing out the
path which the data packets will use for transmission. This layer also helps in identification of data over
the network by providing IP addresses to the system.
l IP: Internet Protocol (IP) is the most important protocol in internet layer, as it is responsible for
sending data packets across a network from the source to destination.
l ARP: Address Resolution Protocol (ARP) uses the IP address to locate the physical address of the
host22.
l IGMP: Internet Group Management Protocol (IGMP) is used for data transmission to a group of
networks23.
iv. Network Access/Interface Layer: This layer is concerned with physical aspect of data transmission in
raw form, i.e. binary format, through physical communication modes over a network24. This layer makes
use of protocols like ethernet cables, fibre links and token rings.
240
Network Basics and Security LESSON 8
PORTS
Ports are network points allotted to specific process or service, where connections begin and end25. Ports are
managed by a computer’s operating system26.
Ports helps to make network connections more efficient and flawless. At any particular point of time, a computer
may receive and send varied kind of data over the same network connection. In this scenario, ports help the
computer to sieve through the data traffic and directs the computer what to do with the data.
Ports can be both physical as well as virtual. Physical ports serve as connection points from where external
devices can be connected to the computer. Virtual ports are connection points that allows data to freely flow
between a program and the computer or over the internet27.
In simple terms, port is an address which is assigned to every application running on a computer which utilises
the internet for communication28. Port helps to transmit data between a computer application and computer
network29.
Every process or service (which is run by an application) is connected to a separate port. Every port has a port
number which helps to identify which application is running on a device. Sometimes, this number is automatically
assigned to the application running on the computer by the operating system30.
In a network, port numbers fall in the range between 0 to 6553531. The range of Port Numbers are as follows:
l Well known/System ports (falling in the range between 0 to 1023) are associated with common
applications and services such as FTP, HTTP and SMTP32. For example, port number 80 is used with
HTTP, whereas FTP uses port number 20 and 21.
l Registered Ports (falling in the range between 1024-49151) are assigned for specific use on application
to Internet Assigned Numbers Authority33.
l Dynamic Ports (falling in range between 49152-65565), which are also called Unassigned or Ephemeral
Ports, are utilised for any type of service34.
241
PP-AIDA&CS Network Basics and Security
Ports are concerned with Transport Layer of the Internet Protocol Suite or TCP/IP model. Only protocols like the
Transmission Control Protocol (TCP) or User Diagram Protocol (UDP) found in the Transport Layer are able to
indicate the exact port to which a data packet is required to be sent.
SECURE PROTOCOLS
The communication protocols which are structured to transmit data between two connection points in a secure
and encrypted form are called secure protocols. Such protocols aim to preserve the security, integrity and
authenticity of data during communication through network channels, including the internet. Such protocols
prevent unauthorized access to data in a network.
Secure Protocols usually make use of cryptography and encryption techniques to secure and encrypt data,
which can only be decrypted by using special algorithm, logical key, formula or a combination of them35.
This means if data falls into the hands of any third party, it will be unreadable and of no use, unless it is duly
decrypted.
Commonly used secure protocols are Secure Sockets Layer (SSL), Secure File Transfer Protocol (SFTP) and
Transport Layer Security (TLS).
SSL Protocol is designed to facilitate secure data transfer between a web browser and a web server, while
guarding the confidentiality and authenticity of information. It is very popular as most web browsers support SSL
protocol. It is found between the application layer and transport layer.
TLS Protocol generates a master key for encryption of data using a pseudo-random algorithm36. The encrypted
data is then transmitted from the client to server, ensuring data protection. It encrypts communication between
web browser and web server (for example- a web browser loading a website)37.
Other secure protocols are also used, apart from SSL and TLS. For example, FTPS which stands for File Transfer
Protocol Secure helps in secure transmission of files over the internet.
Secure Protocols are essential to protect the safety and security of sensitive data which may be shared over
the internet. Nowadays, increased number of transactions are conducted online, which involves sharing of
OTPs (One-Time Passwords), debit and credit card details, UPI number, bank account details, etc. In order to
safeguard such information and protect against falling prey to cybercrimes, secure protocols protect security
and privacy of such sensitive data.
35 Margaret Rouse, Network Security Protocols, Available at: https://www.techopedia.com/definition/29036/network-security-protocols.
36 Types of Internet Security Protocols, GEEKS FOR GEEKS, (September 27, 2021), Available at: https://www.geeksforgeeks.org/types-of-
internet-security-protocols/.
37 What is Transport Layer Security, CLOUDFLARE, Available at: https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/
242
Network Basics and Security LESSON 8
Passive Attack: It involves intrusion in the form of monitoring by an attacker, with the goal of “reading data on
the network”38. Through this attack, an attempt is made by third party/attacker to obtain confidential information
which is being transmitted. More often than not, neither the sender, nor the receiver is aware that the data
security has been breached and data has been read by an attacker as such attacks do not involve any alteration
of data.
Passive Attacks are of two types; Interception and Traffic Analysis. Interception involves reading of contents of
any message, file, email, etc which may be sent across a network and extracting the information contained in
the message. Interception may be avoided by having encryption protection in place. Traffic Analysis involves
monitoring of traffic which is moving across a data network, which on careful analysis may reveal information
like size, frequency and number of messages and the source and destination of such messages39.
Active Attack: It involves active intrusion by an attacker, with the goal of “writing data onto the network”40.
Attacker in such situations can seriously tamper with the data being transmitted across a communication
network by:
243
PP-AIDA&CS Network Basics and Security
244
Network Basics and Security LESSON 8
Hubs are not able to differentiate between data packets. Therefore, any information or data which is shared
with a hub through a port, is in turn transmitted to every other port connected to the hub. This means data is
sent to all the connected devices on a network. A major limitation of a hub is that if data is received from two
different devices at the same time, it may lead to a collision.
BRIDGES
A bridge can be defined as a device which connects smaller sub-networks in order to create a single, bigger
network45. This function of a bridge of consolidating a single network from multiple sub-networks is called
‘network bridging’46. Bridges are used to create one extended LAN from multiple LANs. Bridges are found in the
data link layer of the OSI model.
The following types of bridges are found in a computer network:
a. Transparent Bridges: Transparent bridges connect numerous network segments to other bridges in
order to make routing choices47.
b. Translational Bridges: When switching from one kind of networking system to another, translational
links are employed. They can link various networks, including Ethernet and Token ring networks48.
c. Source Routing Bridges: A source routing bridge chooses the best path between two server hosts49.
SWITCH
A switch is a network device which is used to connect multiple computers or devices on a network. On receiving
data, a switch identifies the destination from data packet and locates where exactly to send the packet. Unlike
a hub, a switch sends data only to the designated nod and does not send the data to all devices on a network.
A switch drops signals when it receives data which is corrupted in any manner. In such a case, a switch makes
a request to the sender to resend the data packet. Switches are commonly used in homes and offices to create
network connections to access the internet, smart TVs, etc.
45 Jaya Sharma, What is a Bridge in a computer network?, March 3, 2023, Available at: https://www.shiksha.com/online-courses/articles/
bridge-in-computer-network/.
46 Ibid.
47 Jaya Sharma, What is a Bridge in a computer network?, March 3, 2023, Available at: https://www.shiksha.com/online-courses/articles/
bridge-in-computer-network/.
48 Ibid.
49 Ibid.
245
PP-AIDA&CS Network Basics and Security
Switch Hub
Concerned with data link layer of OSI Concerned with physical layer of OSI
model. model.
Since they are associated with network Since they are not associated with any
software, they are ‘active’ devices. software, they are ‘passive’ devices.
SECURITY DEVICES
Network Security refers to the practice of safeguarding the network from any unauthorized access or external
risks. The devices used by network administrators to safeguard their network are called network security
devices.
Network Security devices are typically physical or virtualised hardware appliances, with vendor specific
software installed. Seldom, organizations build their own network security device using custom software and
commodity server hardware. For a specific type of equipment, one strategy may be more cost-effective than the
other depending on your company’s specific needs.51
With the spike in cloud computing, some devices that would be traditionally hosted on a local network, are
instead provided by a third party. Businesses commonly host security applications used to protect web
applications and email communications in the cloud, especially if the websites and email services themselves
are cloud-hosted.
Types of Network Security Devices:
l Active Devices: Such devices block the surplus or unwanted traffic on a network. For example, firewalls,
anti-virus scanning devices, content filtering devices, etc.
l Passive Devices: Such devices are concerned with identification and reporting of intrusion on a network.
For example, intrusion detection devices.
l Preventive Devices: Such devices prevent potential security attacks by scanning, detecting and
identifying breaches of security on a network.
l Unified Threat Management: These devices provide one-stop security solutions for all network
problems. For example: Firewalls, web caching, etc.
Authentication Applications: These applications authenticate the identity of the sender of data to ensure that
the communication has been sent by the intended sender and not an imposter/hacker, before providing
access to a network. Data may be authenticated in the following manner:
l Peer Entity Authentication: It assures and reaffirms the identity of the entity involved in the
communication.
l Data Origin Authentication: It verifies whether the source disclosed by the sender is the same as the
actual source of data.
50 What are hub and switch in a computer network?, TUTORIALS POINT, Available at: https://www.tutorialspoint.com/what-are-hub-and-
switch-in-computer-network.
51 Available at: https://blog.netwrix.com/2019/01/22/network-security-devices-you-need-to-know-about/.
246
Network Basics and Security LESSON 8
l Access Control: It prevents unauthorized use of data by controlling the access to the data by specifying
under what conditions the data may be accessed, who may access the data, etc.
l Data Confidentiality: It assures that the privacy of the data has been protected against unauthorized
access.
l Data Integrity: It assures that the data has not been tampered or compromised and its original form has
not been altered.
Other security mechanisms:
l Encipherment: This technique is employed to hide the data in order to protect its authenticity and
confidentiality. Data may be enciphered by both cryptography as well as encipherment.
l Digital Signature: Under this mechanism, the sender put his digital signature on the data which is
then verified by the receiver. A digital signature authenticates that the data has originated from the
sender.
l Traffic Padding: This mechanism inserts extra bits into the data stream which is being transmitted, so
that any attempt to analyse the traffic is frustrated52.
l Network Access Control: This technique controls the level of access granted to a network by placing
password protections, firewalls, etc.
l Notarization: This mechanism involves the use of a trusted third party in the process of data exchange.
FIREWALL
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based
on an organization’s previously established security policies. Appositely, it is a barrier that stands between
a private internal network and the open Internet at its most basic level. Firewalls exclude unwanted and
undesirable network traffic from entering the organization’s systems. Depending on the organization’s firewall
policy, the firewall may completely disallow some traffic or all traffic, or it may perform a verification on some
or all of the traffic.53
Primarily, it is an essential component of any security design since it gives your network security device
control over host level defences, eliminating the need for guesswork. With the help of an integrated intrusion
prevention system (IPS), firewalls, and especially Next Generation Firewalls, concentrate on thwarting
malware and application-layer attacks. These Next Generation Firewalls can react swiftly and seamlessly
to detect and respond to external attacks across the entire network. They can implement policies to better
protect your network and do speedy analyses to find intrusive or dubious activities, like malware, and stop
it.
Firewalls can carry out fast assessments to detect intrusive or suspect behaviour, such as malware, and
can be configured to act on previously specified policies to further safeguard a network. Network can be
configured with precise policies to allow or prohibit incoming and outgoing traffic by using a firewall as
security infrastructure.
52 Types of Security Mechanism, (September 10, 2020), GEEKS FOR GEEKS, Available at: https://www.geeksforgeeks.org/types-of-
security-mechanism/.
53 Available at: https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/#:~:text=A%20Firewall%20is%20a%20
network,network%20and%20the%20public%20Internet.
247
PP-AIDA&CS Network Basics and Security
Home
Internet Firewall
Network
LESSON ROUND-UP
l A network can be defined as a group of two or more computers or electronic devices which are
connected together for the efficient exchange of information and resources.
l Computer networks are typically categorised as LAN (Local Area Network), MAN (Metro Area Network),
and WAN (Wide Area Network) based on the geographic region covered and data transfer rate.
l Each device in a communication network that can receive, generate, store, or send data to network
routes is referred to as a node.
l Network Security refers to the level of protective measures undertaken to secure data during
transmission.
l Network security protects data to ensure its confidentiality, integrity and privacy.
l The unique number which identifies a computer or device or network on the internet is called Internet
Protocol (IP) Address.
l Port is an address which is assigned to every application running on a computer which utilises the
internet for communication.
l Secure Protocols usually make use of cryptography and encryption techniques to secure and encrypt
data.
l Passive Attacks and Active Attacks are the common network attacks.
l The devices used by network administrators to safeguard their network are called network security
devices. For example, Unified Threat Management, Encipherment, Digital Signature, etc.
248
Network Basics and Security LESSON 8
GLOSSARY
Network: A network can be defined as a group of two or more computers or electronic devices which are
connected together for the efficient exchange of information and resources.
Wired Network: It refers to a network where devices are connected through cables to switches, which are in
turn connected to network router for accessing the internet.
Wireless Network: It refers to a network where devices are connected through radio waves to an access
point, which is in turn connected to a router, for accessing the external network.
Security: In simple words, it refers to the state of being safe or free from danger. However, in terms of
computer science, security refers to the level to which a program or device is safe from unauthorized use.
Computer Security: It refers to protection of computer systems through tools, measures and techniques, in
order to protect data and evade hackers, data theft or unauthorized use.
Network Security: It refers to the level of protective measures undertaken to secure data during transmission.
Internet Security: It refers to the level of protective measures undertaken to secure activities conducted over
the internet.
Network Protocol: Protocols enables transmission of data between various devices on the same network
and allows internal devises on a network to communicate irrespective of differences in their internal
configuration, structure or design.
IP Address: The unique number which identifies a computer or device or network on the internet is called
Internet Protocol (IP) Address. When a computer connects to the internet through internet service provider
(ISP), this IP address enables the identification and location of the computer device. IP address may affect
the kind of information that you may receive over the internet.
Nodes and Hosts: A node is a term which is used to refer to any computer or device which is connected to a
network. A host refers to any device having an IP address which requests or provides networking resources
to other hosts or nodes connected to a network.
Protocols: Protocols enables transmission of data between various devices on the same network and allows
internal devises on a network to communicate irrespective of differences in their internal configuration,
structure or design.
Suppose, a computer which uses IP Protocol may not be able to communicate with a computer which does
not use the same protocol. This is where standardized protocols help to establish communication by serving
as a common language for computers.
Data Packets: Data which is transmitted through the internet is organised into smaller chunks, called data
packets. The Computer/device is able to understand the final output of data sent via data packets, with help
of protocols.
Domain Name: A domain name refers to the address of a website which a user types into the web browser.
Domain name allows a user to connect to the server that hosts a website’s data and services, in the absence
of an IP address.
249
PP-AIDA&CS Network Basics and Security
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. What is meant by network security? What are the goals of network security?
2. What is the difference between intranet and extranet?
3. Discuss the different types of active attacks.
4. Explain the Internet Suite Protocol.
5. Differentiate between a hub and a switch.
6. Write short notes on: (a) Firewalls, (b) Security Devices, (c) Internet and (d) Protocols.
7. What is the use of a bridge in a network connection?
8. Explain different types of network security devices.
250
Lesson
Softwares and Software Security
9
KEY CONCEPTS
n Defects n Bugs n Failure n Flaws n Vulnerabilities n Software n System Software n Application Software n
Utility Software n Software Security
Learning Objectives
To understand:
The concept of software
The Differentiate between different types of software
And appreciate the concept and need of software security
The software security mechanisms
And learn how software security is perceived by the courts through various case laws
Appreciate the legal and statutory compliances regarding software security.
The get familiar with recent trends in software security
The best practices of software security
Lesson Outline
Introduction Analysis of Indian Law on Software Security
Software-Overview SaaS; PaaS, IaaS and On Premise Software:
Overview and Recent Trends
Characteristics of good software
Legal and Compliance Requirements of
Software Classification
Software Security
Other types of software on the basis of
Lesson Round-Up
availability and shareability
Glossary
Software Security
Test Yourself
Software security a proactive security
List of Further Readings
Software security best practices
What to Avoid in Software Security
Software Security: Overview and Significance
Case Study and Case Laws
251
PP-AIDA&CS Softwares and Software Security
Introduction
Security concerns in terms of software has become a pertinent issue in recent times and rightly so, because a
weak software or complete lack of software can be a potential breeding ground for common security issues
and malicious attacks.
In today’s tech savvy world, software security cannot be ignored as we regularly interact with a multitude of
software in our everyday life, right from home to office. Any kind of external intervention in software systems
can seriously threaten the security of data and make it prone to unauthorized access. Therefore, it is important
to take timely decisions for software security at all levels. An organization has to make decisions regarding
investment in appropriate software security solutions to ensure company software systems are adequately
protected. Software developers must design and develop security software mechanisms to safeguard against
malware and other attacks. Individuals must regularly check and update their software security mechanisms to
identify and guard against possible breaches.
In this chapter, we will understand about software, potential threats to software security and solutions to
software security.
SOFTWARE-OVERVIEW
A computer system is composed of hardware and software components. Hardware is the external physical
components of the computer which can be touched by users. Examples of hardware include desktop, printer,
mouse, etc. On the other hand, software refers to set of instructions which enable the hardware components to
perform1. Examples include Windows, Linux, MS Word, PowerPoint, MS Excel, etc. Software, thus, can be referred
to as a “set of instructions” which direct the hardware to do a particular task and specifies the manner in which
the said task must be accomplished2.
The concept of software rests on the basic principle of:
The input fed into the computer through the hardware device is programmed by the software to produce the
desired result or output.
The difference between software and hardware has been discussed in detail below:
Hardware Software
It is the physical parts of the computer which It is the collection of instructions which directs the computer
process the data1. as to ‘which’ task to perform and ‘how’ to perform it.
Hardware is unable to perform any task without Software can only be run and executed in computer
the support of software. hardware.
It understands only machine-level language. It accepts inputs by users, converts it into machine-level
language which is then sent to Hardware for processing.
It can be seen, felt and touched. It can only be seen and cannot be touched.
Examples: Monitor, Hard disk, CPU, Keyboard, Examples: Windows, Linux, MS PowerPoint, MS Excel, etc.
Printer, Mouse, etc.
252
Softwares and Software Security LESSON 9
b) Functionality: A software must be able to perform its intended function and fulfil the purpose for which
it was designed3.
c) Reliability: A software must be able to operate, without failure, over a specified period of time, under
certain conditions.
d) Versatility: It refers to quality of the software of being able to perform as per the requirements of the
user in varied conditions and environments.
e) Stability: A software must be stable enough to withstand changes made in its design and
f) Modifiability: A software must be capable of accepting modifications in its structure and design,
necessitated by needs which may arise in due course.
h) Portability: It refers to the ease with which software can be ported from one platform to another without
(or with minimal) changes, while obtaining similar results.
i) Maintainability: Software must be able to withstand changes made its code, so that the software can
be altered or modified or new changes/features can be introduced as per requirements.
SOFTWARE CLASSIFICATION
Software can be classified into the following types:
253
PP-AIDA&CS Softwares and Software Security
Systems Software: These software enables interaction of the user with hardware components of the computer
and helps in running programs on the computer. System software serves as a point of interaction between the
hardware components of computer and user applications. It is relevant to note that computer hardware only
understands machine language (that runs into binary digits of 0s and 1s) whereas application function in human-
readable language (for example: English). Therefore, a system software converts machine language to human
readable language and vice versa to facilitate smooth functioning of the computer.
254
Softwares and Software Security LESSON 9
2. Language Processor: It performs the task of conversion of human readable language into machine language
and vice versa9. The interactions between users and computer takes place in three languages namely:
l Machine Language: This language consists of binary digits of O’s and 1’s, which is only understood by
a machine. It can be called as a ‘machine-friendly’ language.
l Assembly Language: This is the Low-Level Language (LLL) which uses “Mnemonics” or words and
symbols in English language to represent long strings of binary digits (0’s and 1’s)10. For example: the
mnemonic “READ” means that data has to be retrieved from the memory11. This language is dependent
upon machines and varies according to the processor used12.
l High Level Language: This language consists of statements in English, which is readable and
understandable to humans13. It can be called ‘programmer friendly’ language. For example: JAVA, C++,
etc.
Since the machine level language cannot be comprehended by users, HLL is commonly used for coding.
The codes so developed (i.e. source codes) have to again be converted into machine language (i.e. machine/
object code) so that it can be understood by the computer to produce the desired output. This conversion is
primarily the function of Language Processor.
A language processor is typically made of three essential components:
l Assembler: This component of language processor converts assembly language into high level
language.
l Compiler: This component of language processor converts high level language into machine language
in one go.
l Interpreter: This component of language processor is employed in line by line conversion of high-level
language into machine language. The execution time of this processor is slow.
The difference between Compiler and Interpreter has been outlined below:
COMPILER INTERPRETER
It is concerned with simultaneous conversion of It is concerned with line by line conversion of High Level
High Level Language into Machine Language, Language into Machine Language.
all at once.
Errors are reported after compilation. Errors are reported line by line, as and when they occur.
It first scans the entire source code which is then It scans the source code line by line and converts one
converted to object/machine code, in one go. statement at a time.
9. Software and its Types, GEEKS FOR GEEKS, Available at: https://www.geeksforgeeks.org/software-and-its-types/.
10. Supra, Note 8.
11. Ibid.
12. Study Material on Types of Software, Available at: https://stlawrencehighschool.edu.in/uploads/onlineclass/364aecdbfc1a21ddc39606d569
2ec3cf.pdf.
13. Ibid.
255
PP-AIDA&CS Softwares and Software Security
3. Device Driver: This software acts an interface between the user and the input-output devices of a computer14.
4. BIOS: Basic Input Output System is responsible for controlling the input output devices of a computer. BIOS
also initiates the booting process of a computer.
Application Software
These are software which are dedicated to the performance of a particular task or function.
Application software are of the following two types:
l General Purpose Application Software: These are “ready to use” software, made for common use.
For example, VLC Media Player is used to play audios and videos, MS PowerPoint is used to create
presentations, etc.
l Specific Purpose Application Software: These types of software are customised for businesses or
organisation. For example, a library may have a software that keeps a track of all the books, ticket
reservation software, software used for management and allocation of rooms in a hotel, etc.
Utility Software
A utility software is a type of application which assists the system software in performing its work15. This software
performs basic tasks, which are required daily. A computer may function without a utility software; however,
it is found in most computers as it enhances the performance and output of a computer system. Examples of
such software can be an anti-virus software which guards the computer against virus and malware attacks, Text
Editors like Notepad which allows users to create text documents, Disk Defragmenter Tools which rearranges
the files in proper order in a disk, etc.16.
l Freeware: As the name suggests, freeware software are those which can be downloaded from the
internet and used by the users free of cost. These are standardized software which cannot be tailored
to suit individual needs. For example, Google Chrome, Mozilla Firefox, WPS, etc.
256
Softwares and Software Security LESSON 9
l Sharewares: These are made available to the users with a free trial for a limited time period during
which the users can use the software and decide whether they want to purchase the software or not.
Here, users are asked to pay in case they wish to use the software beyond the free trial period.
l Open Source Software: The peculiar feature of this software is that the source course is made available to
the users along with the software and this source code can be modified by the users to suit their individual
needs. This software is available for free or for charge on the internet. For example, Apache Web Server.
Open Source Software offer varied benefits to the user like cost savings, customization and security.
l Closed Source Software: This type of software can be purchased by the users. However, the source
code of such software is protected by intellectual property laws. Most of the commonly used software
belong to this category. For example, Mac OS, Win RAR, etc.
SOFTWARE SECURITY
Software Security refers to the practice of developing and engineering the software in a manner which keeps it
secure from external malicious attacks, while also ensuring that in case of any such attack, the software does
not malfunction and continues to operate. It is essentially a preventive technique to manage and avoid security
risks.
Since computers are heavily reliant upon software for their smooth functioning, it becomes important to secure
software and protect them from undesirable viruses and attacks. Software attacks are increasingly common in
mobile applications. Software developers need to be extra cautious while designing and developing a software
as any loophole in the software can be exploited by hackers. The Developer should be aware about any
possible vulnerability which may arise in respect of a particular software so that the source code can be written
in a manner which guards against such a vulnerability.
257
PP-AIDA&CS Softwares and Software Security
Software security also depends upon the degree of extensibility of systems. Systems are made “extensible”
through updates/extensions which are made to improve the capabilities and functionality of the software,
without re-writing the entire code. These updates must be designed with security of the software in mind.
These trends of extensive networking, increasing system complexity, and built-in extensibility, when combined,
make software security more critical than ever19.
19. Ibid.
20. Proactive v. Reactive Security, IMUNIFY SECURITY, Available at: https://blog.imunify360.com/proactive-vs.-reactive-security-5-tips-for-
proactive-cyber-security.
21. Ibid.
22. Ibid.
23. Ibid.
258
Softwares and Software Security LESSON 9
259
PP-AIDA&CS Softwares and Software Security
and prevent them. Users must also be trained about remedial measures that must be taken as soon as
a breach is detected.
5. Data Encryption: Data encryption converts data into an unreadable format which can only be
deciphered with the help of a security key. It is a proven security technique which is widely used to
protect against data breach.
6. Patching Software: It is always recommended to resolve and fix system vulnerabilities as and when
they are detected. This is known as ‘patching the software’.
7. Use of Firewall: Firewall act as a protective layer and barrier between the internal computer network
and the internet. It allows or prohibits traffic from the internet as per the pre-established security rules
and policies. Use of firewalls is thus recommended as a good security practice.
8. Two factor authentication: It is a security practice which allows access to a software or program only
on providing credentials like login ID and password. Only a user who knows the login ID and password
would be able to access the account.
9. Penetration Testing: This security practice involves hiring a testing team which attempts to penetrate
into the system by using the same tools and in the same manner that a hacker would do, to identify
and flag security issues in the software. It is recommended that penetration testing should be done
periodically. Benefit of this practice is that existing issues or vulnerabilities in the software are quickly
identified and resolved before they are discovered by hackers.
10. Remain agile and proactive: It is recommended that one must always be aware of current and
emerging security trends and new security issues and constantly evolve and adapt to new, updated
and emerging security practices, only after checking its viability.
Therefore, it can be concluded that software security is a continuous process which starts right at the design and
developing stage and continues throughout as software is regularly patched and updated to resolve security
issues.
260
Softwares and Software Security LESSON 9
l Sensitive transactions or high value transactions may be conducted only after double verification or by
using higher level of authentication techniques.
Never mingle data and control functions.
l Lack of proper bifurcation and separation of data and control instructions can result in memory specific
vulnerabilities.
Keep in mind the Users.
l Software must be developed keeping in mind the ultimate users and how they will operate the software.
Keeping the background, biases, preferences of users in mind, security features must be built-in within
the software.
l Moreover, security configurations must be easy to use and set up, so that users can make use of the
same.
l Do not consider security as a feature, rather, built a foundation of the software on basis of security.
Case Study and Case Laws of Indian Law on Software Security 32.33
261
PP-AIDA&CS Softwares and Software Security
262
Softwares and Software Security LESSON 9
The case has received widespread praise as a victory for those who support free expression and has
established a significant precedent for laws on free speech on the internet in India.
Avnish Bajaj v. State (NCT) of Delhi, (2008) 150 DLT 769
In the abovementioned case, the question of intermediaries’ responsibility for user-generated content on
their platforms was addressed. The conflict arose when the CEO of Baazee.com (now eBay India), an online
marketplace, was detained for posting a listing of an offensive video.
According to the Information Technology Act of 2000, the court determined that Baazee.com was an
intermediary and was not responsible for any information supplied by a user, provided that the intermediary
was unaware of the content’s illegality.
The court emphasized that while intermediaries are not obligated to actively track every piece of information
posted on their platforms, they have a duty to promptly remove any illegal content after receiving notice
from the authorities. The CEO was released from jail when the court ruled that his arrest was illegal. This
case has clarified the issue of intermediaries’ responsibility in India and established a significant precedent.
State of Tamil Nadu v. Suhas Kutti, CC No. 4680 of 2004
In this case, the question of cyberstalking and the application of the Indian Penal Code, 1860 (hereinafter
referred to as ‘IPC’) to issue of online harassment were addressed.
The case included a man who had been texting, calling, and emailing a woman to harass her. The man was
found to have engaged in cyberstalking, and the court ruled that these situations were within the provisions
of IPC for criminal intimidation and stalking.
The decision made clear that harassment on the internet is a severe offence that may cause the victim
great mental anguish and suffering, and that the law has to change to accommodate this new type of crime.
The court also emphasized that the anonymity and seclusion offered by online communication might give
offenders the confidence to act in ways they ordinarily wouldn’t in face-to-face meetings.
The case has established a crucial precedent in India for the application of IPC provisions to cases of online
harassment and has brought attention to the necessity for legislation and regulations to deal with the
particular problems created by cybercrime.
MC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra, CM APPL. No. 33474 of 2016
This case addressed the subject of online libel and the responsibility of intermediaries for offensive material
provided by their users.
The case concerned a complaint made by MC Pneumatics against Jogesh Kwatra, a former employee who
was accused of posting false information about the business and its directors on social media channels.
After concluding that the posts were defamatory and harmful to the company’s reputation, the Court ordered
Kwatra to delete the posts and stop publishing any further damaging claims.
The court further determined that the social media sites where the content was posted were intermediaries
under the Information Technology Act of 2000 and weren’t responsible for the material their users submitted,
provided that they met the legal criteria for due diligence. The court emphasized that after obtaining
notification from the person who is impacted or a court order, intermediaries must take immediate action to
remove unlawful information.
The case has established a significant precedent for intermediaries’ responsibility in cyberdefamation cases
in India and has brought attention to the necessity for a balance between the protection of free expression
and the protection of reputation and privacy.
263
PP-AIDA&CS Softwares and Software Security
264
Softwares and Software Security LESSON 9
5. Section 66 D of IT Act – It was put into effect with an emphasis on punishing offenders who
use computer resources to impersonate others. The penalty for the offence is a period of
imprisonment that may last up to 3 years, as well as a fine that may amount to one lakh
rupees.
The Information Technology Act of 2000 does not offer or include certain offences, which are
covered under the IPC. Major crimes that can have a significant negative impact on society as a
whole such as theft of identity and other related cyber scam offences can be penalized through IPC,
in addition to the remedies provided by the Information Technology Act of 2000.
The key provisions of the IPC, 1860 that deal with crimes linked to cybercrimes and the associated
penalties are as follows:
Forgery stipulates that an individual who commits the crime of forgery, i.e. creates a false
document or a false electronic record with the intention to cause damage or injury to the public
or any individual in general, will be penalized by imprisonment for a time that may not exceed
two years, a fine, or a combination of the two.
This section provides that an individual who forges a document or electronic record with the
intention of using it to cheat others, is liable for this offence. If the suspect is proven to be at
fault, he will be sentenced to a period of jail that may last up to seven years, along with
payment of fine.
If any person, who knows that a document/electronic record is forged, uses it as genuine, he
shall be punished in the same manner as if he had himself forged such document or electronic
record.
This offence involves using a forged document or electronic record intending to use to harm
person’s reputation. The penalty prescribed will be 3 years in jail and a fine which will be
imposed as punishment for the offender.
This offence involves putting the victim in a state of fear or inkjury so as to induce him to
deliver to the offender any property, valuable security or anything that can be converted into a
valuable security. The crime is punishable by a sentence of prison that may last up to 3 years,
a fine, or both of them.
The perpetrator will get a penalty as well as a jail sentence that may last up to 7 years.
265
PP-AIDA&CS Softwares and Software Security
SAAS; PAAS, IAAS AND ON-PREMISE SOFTWARE: OVERVIEW AND RECENT TRENDS
IAAS Services
Infrastructure-as-a-Service, abbreviated as “IaaS,” is a type of cloud computing where basic computing,
networking, and storage resources are made available to users on demand through the internet and on a pay-
as-you-go basis.
IaaS enables end users to increase and reduce resources as needed, lowering the need for expensive, upfront
capital expenditures or needless “owned” infrastructure. IaaS offers the most fundamental level of control over
cloud resources in contrast to PaaS and SaaS (even more modern computing paradigms like containers and
serverless).
Early in the 2010s, IaaS began to gain popularity as a computing paradigm, and ever since then, it has evolved
into the de facto abstraction model for many different kinds of workloads. IaaS remains fundamental but is more
competitive than ever due to the emergence of new technologies like containers and serverless, as well as the
introduction of the microservices application paradigm.
266
Softwares and Software Security LESSON 9
advanced networking use cases involve the construction of multi-zone regions and virtual private
clouds.
l Storage: The three primary types of cloud storage are block storage, file storage and object storage.
Block and file storage are common in traditional data centers but can often struggle with scale,
performance and distributed characteristics of cloud. Thus, of the three, object storage has thus
become the most common mode of storage in the cloud given that it is highly distributed, it leverages
commodity hardware, data can be accessed easily over HTTP, and scale is not only essentially limitless
but performance scales linearly as the cluster grows.
Pricing
IaaS prices are based on usage, so customers only pay for what they really use. There are now many different
granularity levels included in the cloud infrastructure pricing models:
l Subscriptions and reserved instances: Many providers offer discounts off the sticker price for clients
willing to commit to longer contract terms, typically around one to three years.
l Monthly billing: Monthly billing models are most common in the BMaaS market, where physical
infrastructure typically implies steady state workloads without spiky characteristics.
l By the hour/second: The most common granularity for traditional cloud infrastructure, end users are
charged only for what they use.
l Transient/spot: Some providers will offer up unused capacity at a discount via transient/spot instances,
but those instances can be reclaimed if the capacity is needed.
Advantages
Several factors, when considered collectively, make cloud infrastructure seem like a good fit:
l Pay-as-you-Go: Unlike traditional IT, IaaS does not require any upfront, capital expenditures, and end
users are only billed for what they use.
l Speed: With IaaS, users can provision small or vast amounts of resources in a matter of minutes, testing
new ideas quickly or scaling proven ones even quicker.
l Availability: Through things like multizone regions, the availability and resiliency of cloud applications
can exceed traditional approaches.
l Scale: With seemingly limitless capacity and the ability to scale resources either automatically or with
some supervision, it’s simple to go from one instance of an application or workload to many.
l Latency and performance: Given the broad geographic footprint of most IaaS providers, it’s easy to put
apps and services closers to your users, reducing latency and improving performance.
267
PP-AIDA&CS Softwares and Software Security
a level of control similar to what they would have in a traditional on-premise data center. As comparison to other
service kinds, IaaS offers the most resemblance to the internal data centre. Storage, servers (or processing
units), the network itself, and management tools for infrastructure upkeep and monitoring make up the core
elements of a data center’s infrastructure. Each of these elements has produced its own specific market niche.
IAAS: Storage
Companies can use storage services to store data on the storage equipment of third-party providers. Customers
can access cloud storage online, which is displayed to them as a collection of storage pools or buckets, utilising
sophisticated interfaces like command-line tools, web interfaces, or programming APIs35. Clients are unaware
of the intricacy of the cloud storage architecture, although it is very sophisticated on the back end and often
consists of distributed storage devices that are controlled by centralised software. Algorithms are used by
sophisticated storage management software to manage data scattered across numerous storage devices.
Network slowness, reliance on internet accessibility, security issues, and restricted control are all potential
drawbacks. Due to the cloud provider’s data center’s distinct geographic location, network latency is greater
than with internal storage. If a customer doesn’t have a local copy of their data and instead saves it all in a
public cloud, they are entirely dependent on internet connectivity. To prevent information loss or compromise,
a cloud provider should provide high-level security, and data transit must be encrypted.
PAAS
Platform-as-a-Service, also known as PaaS, is a cloud computing model that offers customers a full cloud
platform—including hardware, software, and infrastructure for creating, deploying, and managing applications
without the expense, complexity, and rigidity that frequently accompany building and maintaining that platform
on-premises. Without the hassles of updating the operating system, development tools, or hardware, PaaS
offers everything developers require for application development. Instead, a third-party service provider uses
the cloud to supply the whole PaaS environment or platform.
PaaS helps businesses avoid the hassle and cost of installing hardware or software to develop or host new
custom applications. To build custom apps, development teams can easily obtain pay-as-you-go access to
infrastructure, development tools, operating systems, and other resources. The result is simpler, faster, and
secure app development that gives developers the freedom to focus on their application code.
PaaS includes infrastructure (servers, storage, and networking) and platform (middleware, development tools,
database management systems, business intelligence, and more) to support the web application life cycle.
Example: Google App Engine, Force.com, Joyent, Azure.
268
Softwares and Software Security LESSON 9
1. Programming Languages
PaaS providers provide various programming languages for the developers to develop the applications.
Some popular programming languages provided by PaaS providers are Java, PHP, Ruby, Perl, and Go.
2. Application Frameworks
PaaS providers provide application frameworks to easily understand the application development.
Some popular application frameworks provided by PaaS providers are Node.js, Drupal, Joomla,
WordPress, Spring, Play, Rack, and Zend.
3. Databases
PaaS providers provide various databases such as ClearDB, PostgreSQL, MongoDB, and Redis to
communicate with the applications.
4. Other Tools
PaaS providers provide various other tools that are required to develop, test, and deploy the applications.
Advantages of PAAS
The most commonly-cited benefits of PaaS, include:
1. Simplified Development - PaaS allows developers to focus on development and innovation without
worrying about infrastructure management.
2. Lower Risk - No need for up-front investment in hardware and software. Developers only need a PC
and an internet connection to start building applications.
3. Prebuilt Business Functionality - Some PaaS vendors also provide already defined business
functionality so that users can avoid building everything from very scratch and hence can directly start
the projects only.
4. Instant Community - PaaS vendors frequently provide online communities where the developer can
get the ideas to share experiences and seek advice from others.
5. Scalability - Applications deployed can scale from one to thousands of users without any changes to
the applications.
Disadvantages of PAAS
1. Vendor Lock-in - One has to write the applications according to the platform provided by the PaaS
vendor, so the migration of an application to another PaaS vendor would be a problem.
2. Data Privacy - Corporate data, whether it can be critical or not, will be private, so if it is not located
within the walls of the company, there can be a risk in terms of privacy of data.
3. Integration with the rest of the systems applications – It may happen that some applications are
local, and some are in the cloud. Thus, there will be chances of increased complexity when we want to
use data which in the cloud with the local data.
269
PP-AIDA&CS Softwares and Software Security
for teams to develop, run, manage and secure APIs (application programming interfaces) for sharing
data and functionality between applications.
l Internet of Things (IoT): Out of the box, PaaS can support a range of programming languages (Java,
Python, Swift, etc.), tools and application environments used for IoT application development and real-
time processing of data generated by IoT devices.
l Agile development and DevOps: PaaS can provide fully-configured environments for automating the
software application lifecycle including integration, delivery, security, testing and deployment.
l Cloud migration and cloud-native development: With its ready-to-use tools and integration
capabilities, PaaS can simplify migration of existing applications to the cloud particularly
via replatforming (moving an application to the cloud with modifications that take better advantage of
cloud scalability, load balancing and other capabilities) or refactoring (re-architecting some or all of an
application using microservices, containers and cloud-native technologies).
l Hybrid cloud strategy: Hybrid cloud integrates public cloud services, private cloud services and on-
premises infrastructure and provides orchestration, management and application portability across all
three. The result is a unified and flexible distributed computing environment, where an organization
can run and scale its traditional (legacy) or cloud-native workloads on the most appropriate computing
model. The right PaaS solution allows developers to build once, then deploy and mange anywhere in
a hybrid cloud environment.
270
Softwares and Software Security LESSON 9
SAAS SERVICES
Software as a service (or SaaS) is a way of delivering applications over the Internet as a service. SaaS applications
are also known as Web-based software, on-demand software, or hosted software. Common examples are
email, calendaring, and office tools (such as Microsoft Office 365). It is a cloud-based software delivery model
that allows SaaS applications to run on SaaS providers’ servers instead of installing and maintaining software
on-premises. The SaaS provider manages access to the application, including security, availability, and
performance.
SaaS being a cloud based service where instead of downloading software your desktop PC or business network
to run and update, you instead access an application via an internet browser. The software application could
be anything from office software to unified communications among a wide range of other business apps that
are available.
This offers a variety of advantages and disadvantages. Key advantages of SaaS includes accessibility,
compatibility, and operational management. Additionally, SaaS models offer lower upfront costs than traditional
software download and installation, making them more available to a wider range of businesses, making it
easier for smaller companies to disrupt existing markets while empowering suppliers.
The major disadvantage of SaaS applications is that they ordinarily require an internet connection to function.
However, the increasing wide availability of broadband deals and high-speed phone networks such as 5G makes
this less of an issue. Additionally, some SaaS applications have an offline mode that allows basic functionality.
Google Workspace, Trello, Zoom, DocuSign, Slack, Adobe Create Cloud, Mailchimp are some popular examples
of SaaS products.
Characteristics of SAAS
1. SaaS Multi-Tenant Architecture - Multi-tenancy is an architecture where all SaaS vendor clients and
applications share a single, common infrastructure and code base that is centrally maintained. This
architecture allows vendors to innovate more quickly, saving development time previously spent on
maintaining outdated code
2. Easy Customisation with SaaS - Users can easily customise applications to fit their business processes
without affecting the shared infrastructure. A SaaS model supports each user and company’s unique
customisations changes and preserves them through regular upgrades. This means SaaS providers can
make upgrades more often, with less customer risk and lower adoption costs.
271
PP-AIDA&CS Softwares and Software Security
3. Better Access From Network Devices - A SaaS model allows your business to remotely access data
from any networked device, making it easy to manage privileges, monitor data use, and ensure many
users can see the same information simultaneously.
4. SaaS Harnesses the Consumer Web – Anyone familiar with Amazon.com or My Yahoo! will be familiar
with the Web interface of typical SaaS applications. With the SaaS model, you can customise with
point-and-click ease, making the weeks or months it takes to update traditional business software seem
hopelessly old-fashioned.
Advantages of SAAS
SaaS removes the need for organizations to install and run applications on their own computers or in their own
data centers. This eliminates the expense of hardware acquisition, provisioning and maintenance, as well as
software licensing, installation and support37. Due to the increased efficiency and cost-effectiveness of software
as service applications, many businesses turn to cloud-based SaaS for solutions due to following reasons:
1. Low Set Up and Infrastructure costs - You only pay for what you need, so it is a very cost-effective
solution for all-sized businesses.
2. Scalability - You can adapt your requirements to the number of people who need to use the system,
the volume of data and the functionality required as your business grows.
3. Accessible from Anywhere - Just connect to the internet, and you can work from wherever you need
to be via desktop, laptop, tablet or mobile or other networked devices.
4. Automatic, frequent updates - Providers offer timely improvements thanks to their scale and because
they receive feedback about what their customers need. This frees up your IT department for other,
more business-critical tasks.
5. Security at the highest level required by any customer - Because of the shared nature of the service,
all users benefit from the security level set up for those with the highest need.
Future of SAAS
SaaS and cloud computing have come a long way in assisting businesses in creating comprehensive integrated
solutions. Organizations are creating SaaS integration platforms (or SIPs) to build additional SaaS apps as
knowledge and adoption of the model grow38. SaaS is one of many cloud computing remedies for enterprise IT
problems. Other “as-a-Service” choices include:
l Infrastructure as a Service (IaaS) – the provider hosts hardware, software, storage and other infrastructure
components.
l Platform as a Service (PaaS).
l Everything as a service (XaaS) – which is essentially all the “aaS” tools neatly packaged together.
The payment model for these kinds of services is typically a per-seat, per-month charge based on usage – so
a business only has to pay for what they need, reducing upfront costs.
With companies adopting various “aaS” services, long-term relationships with service providers will grow,
leading to innovation as customers’ evolving needs are understood and provided for. SaaS may one day help
address critical business challenges, such as predicting which customers will churn or which cross-selling
practices work best.
272
Softwares and Software Security LESSON 9
On Premise Software
On-premises software is a type of software delivery model that is installed and operated from a customer’s
in-house server and computing infrastructure. Also meaning, thereby that subsequent maintenance, repairs,
safety, and further updates are all handled on-site. It just needs a licenced or purchased copy of software from
an independent software provider and makes use of the natural computer resources of the company. Software
installed on-site is also referred to as shrink wrap. After buying software, the company often installs it on its
servers, connecting relevant database software and configuring operating systems accordingly. Since there is
no involvement of any third-party, the company has full ownership and responsibility.
On-premises software is the most prevalent, traditional method of using enterprise and consumer applications.
On-premises software typically requires a software license for each server and/or end user. The customer
is responsible for the security, availability and overall management of on-premises software. However, the
vendor also provides after sales integration and support services. Because it requires onsite server gear, capital
expenditures for software licences, onsite IT support employees, and longer integration times, onsite software is
more expensive than on-demand or cloud software. On-premises software, however, is regarded as being more
secure because the full instance of the software stays on the organization’s grounds
In the past, on-premise software was the only solution available to companies. Today, that’s changing, as
more and more off-site solutions become popular, and cloud computing becomes the standard. There is now
agreement amongst IT professionals that companies can’t solely rely on on-premise applications. In any case,
a mixture of off-premise and on-premise solutions, also known as a hybrid IT environment, will be the way
forward.
Cost Overall costs in the long-term are lower Substantial upfront investment
required
Security Companies can deploy their own security protocols Technical IT support is required,
increasing costs
User Access Internet connectivity is often not required for in-house This also means access isn’t
solutions available on-the-go
Future-Proofing Additional software can be purchased at extra costs No updates are provided and
new features are costly to add
39. Cybersecurity: Laws and Regulations, India, (November 14, 2022), ICGL, Available at: https://iclg.com/practice-areas/cybersecurity-laws-
and-regulations/india.
273
PP-AIDA&CS Softwares and Software Security
The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011 (hereinafter referred to as ‘IT Rules, 2011’) defines ‘cyber incidents’ under Rule 2(d) in the
following words: “Cyber incidents means any real or suspected adverse event in relation to cyber security that
violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service or
disruption, unauthorised use of a computer resource for processing or storage of information or changes to data,
information without authorisation40”
Rule 8 of the IT Rules 2011 talks about the Reasonable Security Practices and Procedures to be followed by
body corporates and individuals. Rule 841 has been summarized herein below:
As per Rule 8(1) of IT Rules 2011, it is considered that Body Corporates and individuals have compiled with the
reasonable security practices if they have such security practices and standards in place which corresponds
with the information assets which are sought to be protected, keeping in mind the nature of the business42. It is
obligatory to have a documented and elaborate information security programme and security policy containing
“managerial, technical, operational and physical security control measures”43.
It has been clarified in Rule 8(2) that an example of one such standard as referred to in sub-rule (1) of
Rule 8 is the International Standard IS/ISO/IEC 27001 on “Information Technology - Security Techniques
- Information Security Management System – Requirements”44. Furthermore, if any association or entity
follows practices for data protection other than the standard practices prescribed by IS/ISO/IEC, then it
is mandatory to get its code of best practices approved and notified by Central Government45. The Rules
also make it mandatory to get an audit of reasonable security practices and procedures conducted by
an auditor every year or as and when there is significant upgradation of the processes and computer
resources of a body corporate46.
Moreover, the Data Security Council of India (DSCI) regularly publishes standards and best practices in cyber
security, which can be kept in mind while developing security practices.
Reporting of Incidents:
The Information Technology (The Indian Computer Emergency Response Team and Manner of Performing
Functions and Duties) Rules, 2013 (for brevity, ‘CERT-In Rules’) prescribes the procedure of function of CERT-
IN, which is the Computer Emergency Response Team, appointed by Central Government in accordance with
Section 70B of the Information Technology Act, 2000. The CERT-In has been designated as the Nodal Agency
for performing certain cyber security functions, some of which have been enumerated below:
l Handling cybersecurity incidents through emergency measures.
l Issuing guidelines, practices and advisories on cybersecurity and safe practices.
l Flagging, forecasting and alerting cybersecurity incidents, etc47.
Rule 12 of the CERT-In Rules provides for a 24-hour Incident Response Helpdesk for reporting of cyber-security
40. The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011,
Available at: https://www.meity.gov.in/writereaddata/files/GSR313E_10511%281%29_0.pdf.
41. Ibid.
42. Ibid.
43. Ibid.
44. Supra, Note 43.
45. Rule 8(3), Ibid.
46. Rule 8, The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules,
2011.
47. The Information Technology Act, 2000 and The Information Technology (The Indian Computer Emergency Response Team and Manner
of Performing Functions and Duties) Rules, 2013.
274
Softwares and Software Security LESSON 9
incidents48. Certain cybersecurity incidents have been identified in the annexure to the CERT In Rules and the
same shall be mandatorily reported to the Incident Response Helpdesk as soon as possible49.
Rule 12(a) reads as follows50:
“Reporting of incidents: Any individual, organisation or corporate entity affected by cyber security incidents
may report the incident to CERT-In. The type of cyber security incidents as identified in Annexure shall be
mandatorily reported to CERT-In as early as possible to leave scope for action. Service providers, intermediaries,
data centers and body corporate shall report the cyber security incidents to CERT-In within a reasonable time of
occurrence or noticing the incident to have scope for timely action”51.
The Annexure to CERT-In Rules provides for mandatory reporting of the following incidents:
a. “Targeted scanning/ probing of critical networks/ systems;
b. Compromise of critical systems/ information;
c. Unauthorised access of IT systems/ data;
d. Defacement of website or intrusion into a website and unauthorised changes such as inserting malicious
code, links to external websites etc.;
e. Malicious code attacks such as spreading of virus/ worm/ Trojan/ Botnets/ Spyware;
f. Attacks on servers such as Database, Mail and DNS and network devices such as Routers;
g. Identity Theft, spoofing and phishing attacks;
h. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks;
i. Attacks on Critical infrastructure, SCADA Systems and Wireless networks;
j. Attacks on Applications such as E-Governance, E-Commerce etc”52.
The Ministry of Electronics and Information Technology has come out with directions regarding compliances
and reporting obligations passed vide Notification No. 20(3)/2022-CERT-In dated 28.04.202253. The notification
has made it mandatory to report cyber incidents as listed above within a period of six hours of the incident
coming into notice or being brought into the attention of the concerned person. This has been done to ensure
prompt action to the cyber security incident and prevent delays in investigation and consequent action. The
new 6 (six) hour deadline does not have retrospective effect and will apply only to cyber security incidents that
take place on or after June 27, 202254.
275
PP-AIDA&CS Softwares and Software Security
LESSON ROUND-UP
l Any kind of external intervention in software systems can seriously threaten the security of data and
make it prone to unauthorized access.
l Software refers to set of instructions which enable the hardware components to perform.
l System software serves as a point of interaction between the hardware components of computer and
user applications.
l Operating system is basic and essential to the functioning of a computer as all computer applications
sit inside the operating system of a computer.
l Application Software are dedicated to the performance of a particular task or function.
l Software Security refers to the practice of developing and engineering the software in a manner which
keeps it secure from external malicious attacks, while also ensuring that in case of any such attack, the
software does not malfunction and continues to operate.
l Proactive security aims to prevent any data breach incident before any malware is able to access
network server or before vulnerabilities in a software are exploited by hackers.
l Infrastructure-as-a-Service, abbreviated as “IaaS,” is a type of cloud computing where basic computing,
networking, and storage resources are made available to users on demand through the internet and
on a pay-as-you-go basis.
l Platform-as-a-Service, also known as PaaS, is a cloud computing model that offers customers a full
cloud platform—including hardware, software, and infrastructure for creating, deploying, and managing
applications without the expense, complexity, and rigidity that frequently accompany building and
maintaining that platform on-premises.
l Software as a Service (or SaaS) is a way of delivering applications over the Internet as a service.
SaaS applications are also known as Web-based software, on-demand software, or hosted software.
Common examples are email, calendaring, and office tools (such as Microsoft Office 365).
l On-premises software is a type of software delivery model that is installed and operated from a
customer’s in-house server and computing infrastructure.
GLOSSARY
Defects: A defect refers to a mistake made by developer while developing the software which leads to
differences in intended results and actual results.
Bugs: A bug is an error, problem or defect in the design or development of a software which hampers its
ability to produce the desired result or results into producing invalid results.
Failure: It refers to the inability of a software to perform its designated.
Flaws: A flaw refers to a problem in the software code which makes the software prone to security risks.
Software flaws can be rectified by updates formulated by software developer.
Vulnerabilities: It refers to exploitable points within the software which can be targets for potential attack
by hackers.
276
Softwares and Software Security LESSON 9
Software: It is the collection of instructions which directs the computer as to ‘which’ task to perform and ‘how’
to perform it.
System Software: These software enables interaction of the user with hardware components of the computer
and helps in running programs on the computer.
Application Software: These are software which are dedicated to the performance of a particular task or
function.
Utility Software: A utility software is a type of application which assists the system software in performing
its work.
Software Security: It refers to the practice of developing and engineering the software in a manner which
keeps it secure from external malicious attacks, while also ensuring that in case of any such attack, the
software does not malfunction and continues to operate.
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
l Mathias Payer, “Software Security: Principles, Policies and Protection”, July 2021, Available At: https://
nebelwelt.net/SS3P/softsec.pdf
l Gary McGraw, Software Security: Building Security In. Addison-Wesley Professional, 2006.
277
PP-AIDA&CS Softwares and Software Security
278
Lesson
Database Management
10
KEY CONCEPTS
n Data Base n Data Structure n Data Base Management System n Data Mining n Data Warehousing
Learning Objectives
To understand:
The concept of Database with basics of Data Structure
Database Abstraction, Implementation and Creation
DBMS- Users of DBMS and its applications
The purpose of Data Warehousing and Data Mining
The usefulness of Data warehousing and Data mining in context to a large retail firm
Lesson Outline
Data Base Concepts
Data Structure
Data Base Management System
Data Base Files
Data Mining and Warehousing
Lesson Round-Up
Test Yourself
279
PP-AIDA&CS Database Management
DATABASE CONCEPTS
Database concepts are vital to understand how databases function, and databases are a crucial element
in modern computer systems. The aim of databases, data abstraction, data models, database management
systems, data integrity, data security, and the benefits and drawbacks of databases are just a few of the topics
that we’ll cover in this chapter.
Purpose of Database
A database’s goal is to have a collection of data serve as many applications as it can. As a result, a database
is frequently considered to be a collection of data required to carry out specific tasks inside a business or
organisation. It would enable not just data retrieval but also on going data alteration, which is necessary for
operation control. You might be able to search the database to get answers to your inquiries or details for
planning.
Database Abstraction
Providing the user with only the information they need is one of a database’s main goals. This indicates that
the system hides some information about how the data is maintained and kept rather than disclosing all the
information about the data. They are shielded from the complexity of databases, which, if necessary, are
arranged across a number of layers of abstraction to ease their engagement with the system. Three layers are
used to implement the various database levels:
Physical Level (Internal Level): Internal level, the lowest level of abstraction, is most analogous to physical
storage. It explains the specifics of how the data is kept on the storage media.
Conceptual Level: The data that is specifically saved in the database is described at this level of abstraction.
Moreover, it describes the connections between the data. At this level, databases are logically explained using
straightforward data structures. Users at this level are not concerned with the actual implementation of these
logical data structures.
View Level (External Level): It relates to how specific users see the data and is the level that is closest to the
users.
Each modification at one level can have an impact on plans at other levels since a database can be seen
through three different levels of abstraction. Databases may occasionally undergo numerous modifications as
they continue to expand. The database shouldn’t need to be redesigned and implemented as a result of this.
The idea of data independence is useful in this situation.
External Level
Conceptual Level
Physical Level
Internal Level
280
Database Management LESSON 10
Data Models: A database’s data and connections are conceptually represented by a data model. It offers
a blueprint that details how information is set up, kept, and used in a database. Hierarchical, network, and
relational models are the three basic types of data models.
Hierarchical Model: The hierarchical approach organises data in a tree-like form, with a parent-child
connection between each item. No of how many kids a parent has, each child can only have one parent.
Organizational charts and other types of data with a natural hierarchical structure are best suited for the
hierarchical approach.
Network Model: As an extension of the hierarchical model, the network model enables records to have
numerous parent-child connections. It is helpful for modelling data when a record may include several parent
and child connections since it may express complicated relationships.
Relational Model: The model that is being utilised the most is the relational model. Data is arranged in tables
with rows and columns, where each row denotes a distinct record and each column denotes a field or attribute.
A large variety of data kinds and connections may be handled by the relational model, which is adaptable.
Database Management System (DBMS): Software that enables users to build, edit, and administer databases
is known as a Database Management System (DBMS). To manage the storing, retrieval, and modification of
data in a database, it offers a variety of features and capabilities.
Data Definition Language (DDL) is used to create and edit database schema. Data Manipulation Language
(DML) is used to query and modify data. Transaction Control Language (TCL) is used to govern how transactions
are handled.
Data Integrity: Any database must maintain data integrity. It speaks of the precision, thoroughness, and
consistency of information in a database. By imposing restrictions and guidelines on the data in a database, a
DBMS protects data integrity.
Constraints: The structure and connections between tables are established by constraints, which are rules.
They make sure that linkages between tables are upheld and that data is not duplicated. Each row in a table is
guaranteed to be unique by the primary key constraint, and each record in one table is guaranteed to have a
matching record in another table by the foreign key constraint.
Rules: Data values must fall inside particular ranges or satisfy certain requirements, which is why rules like
check constraints are used. A check constraint, for instance, can make sure that a person’s birthdate is not later
than the present day.
Data Security: A crucial idea in databases is data security. It speaks of safeguarding data from unlawful access,
usage, disclosure, or obliteration. To guarantee data security, a DBMS offers a variety of security capabilities,
including authentication, authorisation, and encryption.
Authentication: It includes confirming the user’s identity, usually using a username and password.
Authorization: It regulates each user’s degree of access. It entails allowing or refusing access to particular
database sections.
Encryption: Data is protected by encryption by being transformed into a secret code that can only be cracked
with a special key. It guarantees that the data cannot be read even if an unauthorised person obtains access
to the database.
281
PP-AIDA&CS Database Management
Advantages of Database
Let’s look at some of the advantages offered by database systems and how they solve the issues described
above: -
Database systems are therefore recommended for systems with superior performance and efficiency.
Disadvantages of Database
There may be various issues that arise as a result of the database system’s need to do sophisticated tasks;
these issues can be referred to as the database system’s drawbacks. They include:
Therefore, understanding database principles is essential to comprehending how databases operate. Anybody
dealing with databases has to understand key concepts including data models, DBMS, data integrity, and data
security. To guarantee efficient and successful data administration, it is crucial to keep current with the most
recent database ideas and technology. Databases may offer a strong foundation for organising and analysing
massive volumes of data if the correct skills and resources are applied.
DATA STRUCTURE
A fundamental idea in computer science, data structures are crucial for effective programming. It is a
method of setting up and keeping track of data in a computer so that it may be easily retrieved and used.
We will explore the numerous facets of data structures in this chapter, including their types, operations,
and implementation.
282
Database Management LESSON 10
Data Structure
Non-Primive
Primive
Data Structure
283
PP-AIDA&CS Database Management
node after it as well as data. Linked lists make it simple to add and remove components and can be used to
construct dynamic data structures.
Stacks: It only permits adding and deleting pieces from the top of the stack, which is one end.
Queues: The First-In-First-Out (FIFO) principle governs the operation of queues, which are a type of data
structure. It enables the addition of elements at the back and the removal of parts from the front.
Non-Linear Data Structures: The organisation of data in non-linear data structures is not sequential. Instead,
they show intricate connections between different data points. The most popular non-linear data structure
types are heaps, trees, and graphs.
Tress: Trees are hierarchical data structures in which each node contains zero to more than one offspring and
at most one parent. In hierarchical data representations like file systems, organisational charts, and database
indexes, trees are employed.
Graphs: Graphs are collections of nodes connected by connecting edges. Graphs are used to describe intricate
connections between data items, including those seen in social, transportation, and communication networks.
Heaps: A unique kind of binary tree that meets the heap condition is called a heap. The element with the
greatest (or lowest) priority will always be at the bottom of the heap according to the heap attribute.
284
Database Management LESSON 10
sequential manner. The numerous operations supported by data structures include insertion, deletion, traversal,
and searching. These can be put into practise utilising pointers, linked lists, and arrays. Data structures may
offer a potent platform for data organisation and manipulation with the correct skills and resources.
DBMS Architecture:
There are three levels of a DBMS structure: external, conceptual and internal.
External Level: It specifies the actions that may be carried out on the data as well as how the data is displayed
to the user. The application software that accesses the database is of interest at the external level.
Conceptual Level: The database is logically represented at the conceptual level. It describes the connections
between the various data pieces as well as the general structure of the database. The conceptual level is
unrelated to how the data is physically stored.
Internal Level: The database’s physical representation is at the internal level. It specifies how information is
kept and retrieved on the actual storage hardware.
DBMS Components:
Data Definition Language (DDL), Data Manipulation Language (DML), query language, and data dictionary are
the four parts of a Database Management System (DBMS).
Data Definition Language (DDL): DDL, or Data Definition Language, is used to specify the database’s structure,
including the tables, columns, and connections between them. Also, it outlines the restrictions that apply to
database data storage.
Data Manipulation Language (DML): The database’s data can be changed using the Data Manipulation
Language (DML). Operations like insertion, deletion, modification, and retrieval of data are included.
Query Language: Data is collected from the database using query language. The database library standard
language, SQL (Structured Query Language), is included.
Data Dictionary: A database that contains metadata about the data in the database is called a data dictionary.
It contains details about data kinds, connections between data items, and access rights.
DBMS Features: A DBMS has a number of capabilities that make it an indispensable tool for handling massive
amounts of data. The following are some of a DBMS’s important characteristics:
Data Security: To prevent unauthorised access to data, a DBMS offers a variety of security options. Access
control, authentication, and encryption are all part of it.
Data Integrity: By imposing constraints like uniqueness, referential integrity, and domain integrity, a DBMS
protects the accuracy of the data.
Concurrency Control: Concurrency control is a feature of DBMSs that permits concurrent entry to the database
without compromising with other users’ operations.
Backup and Recovery: In the case of a system breakdown, a DBMS offers backup and recovery options to
avoid losing data. It has capabilities like recovery and transaction recording.
285
PP-AIDA&CS Database Management
Scalability: A DBMS offers scalability characteristics to meet an organization’s expanding data demands. It has
capabilities like replication and segmentation.
DBMS Users
Users with varying access and permissions use a typical DBMS for a variety of objectives. Some people back
up their data while others retrieve it. A DBMS’s users may be roughly divided into three groups: administrators,
designers and end users.
Administrator: Administrators are in charge of managing the database and maintaining the DBMS. They are in
charge of monitoring how it should be utilised and by whom. In order to enforce security and preserve isolation,
they construct access profiles for users and set restrictions. Moreover, administrators take care of DBMS
resources including system licences, necessary equipment, and other upkeep-related software and hardware.
Designers: A company’s DBA staff includes database designers. The individuals who really work on the
designing portion of the database are known as designers. They are in charge of comprehending end customers’
database requirements. They closely monitor what information needs to be stored and in what format. The
whole collection of entities, relations, constraints, and views are identified and designed by them.
End Users: End users are the ones who genuinely profit from a DBMS. End users might be as basic as viewers
who focus on the logs or market prices or as complex as business analysts. They can also be knowledgeable
experts who access data by directly querying the database using a DBMS’s query interface. Those that need
to use data from a database to power sophisticated applications like knowledge bases, decision systems,
intelligent systems, data analytics, or the storage and administration of big data might be considered to be
another group of end users.
Administrators
DBMS
Advantages of DBMS
Controls database redundancy: Because it keeps all the data in a single database file and stores the recorded
data in the database, it is able to manage data redundancy.
Data sharing: A DBMS enables an organization’s authorised users to distribute data across several users.
Easy Maintenance: Because the database system is centralised, it may be simple to maintain.
Time savings: It lessens the requirement for maintenance and development time.
Backup: It has subsystems for backup and recovery that automatically back up data in the event of hardware
or software problems and restore the data as needed.
Multiple User Interface: It offers a variety of user interfaces, including graphical user interfaces and application
programme interfaces.
286
Database Management LESSON 10
Disadvantages of DBMS
Cost of Hardware and Software: To operate DBMS software, a fast data processor and plenty of memory are
needed.
Size: To operate them effectively, it takes up a lot of memory and storage space.
Complexity: The database system adds more requirements and complexity.
Higher Impact of Failure: Failure has a greater impact on databases since, in the majority of organisations,
all data is kept in a single database. If the database is destroyed due to an electrical failure or database
corruption, all data may be permanently lost.
DATABASE FILES
Data is kept in files in a Database Management System (DBMS). A database file is a group of connected
records, each of which has one or more data fields.
The capacity to organise data consistently and logically is one of the main benefits of utilising database files.
Intuitive and effective data access and manipulation are made possible for users as a result. In a Relational
Database Management System (RDBMS), for instance, data is arranged into tables with columns and rows,
making it simple to query for and retrieve certain bits of data. Contrarily, document-oriented databases arrange
data as documents with nested fields and arrays, which makes it simpler to manage unstructured, complicated
data.
The capacity to maintain data consistency is a key benefit of database files. Database files avoid data
duplication or discrepancies by specifying a set of guidelines for how data should be kept and arranged. By
ensuring that data is correct and current, this lowers mistakes and enhances the ability to make decisions.
Database files offer better data security in addition to organised data management and data consistency
enforcement. Since databases allow for restricted access to data, managers can limit user access to sensitive
data. They also provide user authentication and data encryption services to stop unwanted access and security
breaches.
Despite the many benefits of database files, there are a few drawbacks to take into account. The expense of
developing and maintaining a database is one of the biggest obstacles. Database systems may be pricey,
especially for individuals or small organisations. However, setting up and managing databases requires specific
technical skills, which can be difficult for someone without a background in database administration.
The systems’ intricacy is another possible issue with database files. The setup and configuration of databases
may be difficult and time-consuming, requiring extensive planning and design effort. Moreover, they are prone
to data corruption and system failures, both of which can result in the loss of crucial information. We will go
through the different kinds of database files, how they are organised, and how to access and edit them in this
chapter.
287
PP-AIDA&CS Database Management
Network Files: A record may have more than one parent using network files, which are equivalent to hierarchical
files. This makes it possible for records to have more intricate associations.
Object-Oriental Files: Files that store data as objects with attributes and methods are said to be object-oriented
files. The properties of each object stand in for a single record, and the fields of data they represent.
Organization of Database Files:
To speed up access times and maximise storage space, database files are structured into a variety of forms.
These are the most typical database file organisation structures:
Sequential Files: Records are kept in a sequential file in a certain order. Data are appended to the file’s end and
accessed one at a time starting at the starting.
Indexed Files: An index is made in an indexed file that associates each entry with a different identifier. This
makes it possible to quickly retrieve particular files’ records.
Hashed Files: Datasets are assigned to specific positions in a hashed file according to a hashing algorithm. This
enables quick access to particular records using a search key.
Data Mining
The procedure of extracting patterns, trends, and insights from huge databases is known as data mining. By
seeing patterns and connections between the data, it includes drawing information from the data. To glean
insights from data, data mining employs a variety of methods including machine learning, artificial intelligence,
and statistical analysis. Finding hidden patterns and insights that may be utilised to make wise judgements is
the main objective of data mining.
288
Database Management LESSON 10
Data Warehousing
The procedure of gathering, arranging, and storing data from numerous sources in a main repository is known
as data warehousing. A data warehouse’s organisation of the data makes for effective querying and analysis.
Data extraction from diverse sources, including databases, applications, and external sources, is followed by
data transformation into a standard format and transferring into a data warehouse.
Some key characteristics of data modelling include:
Abstraction: In order to make data simpler to comprehend and handle, data modelling entails building a
simplified representation of the real world. This entails defining and portraying the essential entities, connections,
and features of the system being represented in a form that is simple to understand.
Structure: The categories of data, the connections between them, and the limitations that apply to them are all
defined by data modelling, which also identifies the structure of data in a system. With the help of this structure,
data may be stored, organised, queried, and subjected to analysis.
Flexibility: A reliable data model is adaptable enough to take into account system changes. This indicates that
the model should have the flexibility to adapt as the needs of the system do.
Clarity: To ensure that the data modelling simple for others to comprehend and utilise, it should be clear and
unambiguous. To do this, it is necessary to define the connections and constraints of the data being represented
in detail as well as to use standardised notations and language.
Data integrity: Data consistency, accuracy, and completeness should be ensured by data modelling. To do
this, it is necessary to specify the guidelines and limitations that apply to the data and to apply them by utilizing
data validation and error-checking.
289
PP-AIDA&CS Database Management
Scalability: Efficient data modelling will be able to handle massive amounts of data and allow sophisticated
searches and analyses. This necessitates building the system to handle massive datasets and performance-
enhancing data structure and indexing.
Iterative process: As new information becomes available, data modelling is an iterative process that involves
adjusting and rewriting the model. To make sure that the model effectively reflects the demands of the system,
collaboration is required amongst stakeholders, including developers, analysts, and end users.
LESSON ROUND-UP
l Any collection of facts, numbers, or statistics that are gathered and examined with a specific goal is
data. Data comes in a variety of forms, including semi-structured, unstructured, and structured data.
Unstructured data does not adhere to a set format, whereas structured data does. Both structured and
unstructured data components can be found in semi-structured data.
290
Database Management LESSON 10
l Data structures describe how information is arranged and kept in computer systems. Arrays, linked
lists, stacks, queues, and trees are the most popular types of data structures. The type of data and the
operations that must be carried out on it determine which data structure should be used.
l A database management system, or DBMS, is a piece of software that controls how data is stored,
retrieved, and modified. The DBMS conducts functions like data backup, recovery, and security while
also giving users a way to interact with the database through an interface. MySQL, Oracle, SQL Server,
and PostgreSQL are a few popular database management system.
l The data kept in a database is physically represented by database files. These documents are
arranged in tables with rows and columns. Each column is a data element, and each row denotes a
distinct record. The files may be kept on a hard drive or other types of storage.
l The method of obtaining valuable information from huge databases is known as data mining. To find
patterns, correlations, and trends in the data, statistical and machine learning approaches are used.
Data mining findings may be applied to forecasting, predictions, and decision-making.
l The procedure of gathering, storing, and managing data from many sources in a single repository is
known as data warehousing. The relationships across various data pieces are reflected in the schema
that was used to arrange the data. Organizations can rapidly and effectively access and analyse vast
volumes of data thanks to data warehousing. Business intelligence, reporting, and analytics frequently
use it.
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
3. What is a Database Management System (DBMS)? What are the different categories of Database
Management Users?
291
PP-AIDA&CS Database Management
292
Lesson
Data Analytics
11
KEY CONCEPTS
n Data n Data Recovery Tools n Evidence n Internet n Data Protection n Swap Files n Temporary Files n Cache
Files
Learning Objectives
To understand:
The procedure and ethical norms associated with data recovery in the overall perspective of Data
Analytics
Function of computer forensics tools for the different file systems
Different nuances of identification, preservation, and analysis of evidence related to Data Analytics
Lesson Outline
Data Recovery Tools
Data Recovery Procedures and Ethics
Gathering Evidence- Precautions, Preserving and safely handling original media for its admissibility
Document a Chain of Custody and its importance
Complete time line analysis of computer files based on file creation, file modification and file access
Recover Internet Usage Data
Data Protection and Privacy
Recover Swap Files/Temporary Files/Cache Files
Introduction to Encase Forensic Edition, Forensic Toolkit
Use computer forensics software tools to cross validate findings in computer evidence-related cases
Lesson Round-Up
Test Yourself
List of Further Readings
293
PP-AIDA&CS Data Analytics
Data Analycs
1. Descriptive Analytics describes the happenings over time, such as whether the number of views increased
or decreased and whether the current month’s sales are better than the last one.
2. Diagnostic Analytics focuses on the reason for the occurrence of any event. It requires hypothesizing and
involves a much more diverse dataset. It examines data to answer questions, such as “Did the weather
impact the selling of beer?” or “Did the new ad strategy affect sales?”
294
Data Analytics LESSON 11
3. Predictive Analytics focuses on the events that are expected to occur in the immediate future. Predictive
analytics tries to find answers to questions like, what happened to the sales in the last hot summer season?
How many weather forecasts expect for this year’s hot summer?
4. Prescriptive Analytics indicates a plan of action. If the chance of a hot summer calculated as the average
of the five weather models is above 58%, an evening shift can be added to the brewery, and an additional
tank can be rented to maximize production.
295
PP-AIDA&CS Data Analytics
referring to and accessing the file structure records/entries. Having access and control over file systems and
structure, it can also un-format and repair hard drive partitions.
It can be used for both recovering user-stored and system-created data, files, and folders. It can recover data
from virtually any storage device including hard disks, flash drives, external storage cards, tape drives, and
more. Most data recovery software can perform data recovery on common file systems. Machine learning,
also known as artificial intelligence (AI), is gaining traction when it comes to anything related to technology.
AI technology is essential to any organization that regularly deals with large data sets, and high-performing
companies are always searching for a way to make operations more efficient. Eventually, AI’s ability to
streamline the processing of large data sets through machine learning and software as a service (SaaS) will
replace traditional data centers. Data recovery tools are software applications designed to retrieve data that
has been lost, damaged, or corrupted. These tools can be used to recover data from a variety of sources, such
as hard drives, USB drives, memory cards, and mobile devices. Data loss can occur due to a variety of reasons,
such as hardware failure, human error, malware, or natural disasters. When data is lost, it can be a major
setback for individuals and businesses, leading to lost productivity, revenue, and valuable information. Data
recovery tools can help mitigate the effects of data loss by providing a way to recover lost data.
There are two main types of data recovery tools: free and paid. Free data recovery tools are typically limited
in their functionality and may not be able to recover all types of data. These tools are often useful for simple
data recovery tasks, such as retrieving accidentally deleted files. Paid data recovery tools offer more advanced
functionality and can often recover data from more complex situations, such as damaged or corrupted files.
These tools are typically more expensive than free tools, but they offer a higher success rate for data recovery.
There are many data recovery tools available on the market, each with its own set of features and capabilities.
Here are some of the most commonly used data recovery tools:
1. EaseUS Data Recovery Wizard: EaseUS Data Recovery Wizard is a popular data recovery tool that can
recover data from a variety of sources, including hard drives, memory cards, and USB drives. It offers both
free and paid versions, with the paid version offering more advanced features such as deep scanning and
advanced filtering.
2. Recuva: Recuva is a free data recovery tool that can recover data from hard drives, USB drives, and
memory cards. It offers a user-friendly interface and the ability to preview recovered files before they are
restored.
3. Stellar Data Recovery: Stellar Data Recovery is a paid data recovery tool that can recover data from a
variety of sources, including hard drives, SSDs, and mobile devices. It offers advanced features such as
disk imaging, which allows users to create a backup of their hard drives before attempting recovery.
4. Disk Drill: Disk Drill is a data recovery tool that can recover data from a variety of sources, including hard
drives, USB drives, and memory cards. It offers both free and paid versions, with the paid version offering
more advanced features such as data protection and a duplicate finder.
5. R-Studio: R-Studio is a paid data recovery tool that can recover data from a variety of sources, including
hard drives, SSDs, and RAID systems. It offers advanced features such as disk imaging, remote data
recovery, and support for virtual machines.
When using data recovery tools, it is important to follow best practices to maximize the chances of successful
data recovery. Here are some tips for using data recovery tools effectively:
1. Stop using the device: When data is lost, it is important to stop using the device immediately to avoid
overwriting the lost data. Continuing to use the device can cause further damage and decrease the
chances of successful data recovery.
296
Data Analytics LESSON 11
2. Identify the cause of data loss: Before attempting data recovery, it is important to identify the cause of
data loss. This can help determine the best approach for data recovery and prevent further data loss.
3. Use the appropriate data recovery tool: Different data recovery tools are designed to handle different
types of data loss. It is important to choose a data recovery tool that is appropriate for the specific type of
data loss being experienced.
4. Read user reviews: Before using a data recovery tool, it is important to read user reviews and check the
tool’s reputation. This can help identify potential issues and ensure that the tool is effective for the specific
type of data loss being experienced.
5. Back up recovered data: After data has been successfully recovered, it is important to back up the
recovered data to prevent future data loss. This can be done by creating a backup on an external hard
drive or cloud storage.
6. Consider professional data recovery services: In some cases, data recovery tools may not be able to
recover lost data. In these situations, it may be necessary to seek professional data recovery services.
These services are typically more expensive than using data recovery tools, but they offer a higher
success rate for data recovery.
In conclusion, data recovery tools are essential tools for individuals and businesses to recover lost or damaged
data. When using these tools, it is important to follow best practices to maximize the chances of successful data
recovery. Whether using a free or paid data recovery tool, it is important to choose a tool that is appropriate
for the specific type of data loss being experienced and to back up recovered data to prevent future data loss.
There are seven data analysis tools mentioned below in terms of learning, and performance:-
i. Tableau Public
It is a free data visualization application that links to any data source you can think of whether it’s
a corporate Data Warehouse, Microsoft Excel, or web-based information. It also generates data
visualizations, maps, dashboards, and so on, all with real-time changes that are shown on the web.
These may also be shared on social media or with your customer, and you can download the files in
several formats. However, it truly shines when you have an excellent data source. That’s when you
realize Tableau’s ultimate potential. Tableau’s Big Data features make it indispensable. Its approach to
data analysis and visualization is considerably better than that of any other data visualization software
on the market.
ii. R Programming
Well, R is the industry’s premier analytics tool, and it’s extensively used for statistics and data modeling.
It can readily alter data and show it in a variety of formats. It has outperformed SAS in several aspects,
including data capacity, performance, and results. R may be compiled and run on a broad range of
systems, including Windows, UNIX, and macOS. It offers 11,556 packages and lets you explore them by
category. Also, R has tools for installing all packages automatically based on user needs, which may
be used with Big Data.
iii. Python
It’s a scripting language that is simple to understand, write, as well as maintain. Furthermore, it’s a free
open-source tool. Guido van Rossum developed it in the late 1980s and it supports both structured and
functional programming methodologies. Python is simple to learn since it is related to Ruby, JavaScript,
and PHP. Python also contains excellent machine-learning packages such as Tensorflow, Theano,
Scikitlearn, and Keras. Another useful characteristic of Python is that it can be built on any platform,
such as a MongoDB database, SQL browser, or JSON. It also excels at handling text data.
297
PP-AIDA&CS Data Analytics
Digital Ethics
Digital ethics is defined as the field of study concerned with the manner in which digital technology is shaping our
political, social ,and moral well-being. In a broader sense, this field deals with the impact of digital Information
and Communication Technologies (ICT) on our societies and the environment.
298
Data Analytics LESSON 11
There are some common scenarios where data recovery procedures would be necessary:
1. There has been an operating system failure or some critical operating system files have been damaged,
causing the device to not be able to boot up properly. In this case, a simple solution would be to use a
Live USB to boot up from another operating system so that you can access the data from the storage
medium.
2. There has been a hard disk failure and there is physical damage to the storage medium. In this case,
you may be able to repair the hardware, but the storage medium is often beyond repair and the focus
is more on a one-time recovery in an attempt to salvage any data you can. This will often require the
services of a specialized data recovery company.
3. Files have been deleted from a storage medium. As we will discuss later in the presentation, when an
operating system “deletes” files, oftentimes the data is not immediately removed from the drive. This
allows tools such as file carvers to recover this data.
There are three research methods of data recovery namely, Direct-to-cloud backup, cloud-to-cloud backup,
and SaaS backup. With direct-to-cloud, offsite file backups are copied directly to the cloud, bypassing the need
for a local device. Cloud-to-cloud backup is the process of copying data from one cloud to another cloud. SaaS
backup refers to backing up data created in SaaS applications such as Microsoft 365 or Google G Suite.
l File Restore: A file restore is exactly what it sounds like—the process of replacing a lost file or files
from a backup to its primary location. With SIRIS, an administrator can mount a recovery point, view
the protected system’s file structure, locate the necessary files, and restore them back to the primary
system. If you only need to retrieve a file or a small number of files, this is the ideal restore type.
299
PP-AIDA&CS Data Analytics
l Volume Restore: When you perform a volume restore on SIRIS, the contents of the chosen recovery
point are shared as an iSCSI target. This restore type retrieves files and folders with permissions intact
and is used to restore large numbers of files when a bare metal restore is not necessary (i.e., the
physical server is intact and operating correctly).
l Bare metal restores: This is the process of restoring an entire system image (the protected machine’s
data, applications, settings, and operating system) from a backup to a new physical server. “Bare metal”
refers to the new system’s unused, unconfirmed hardware. Bare metal restore is used when a primary
server fails, is damaged, or is otherwise rendered inoperable.
l Local virtualization: Local virtualization is a feature of BCDR solutions that offers fast recovery of
business operations. Local virtualization uses hypervisor technology to boot a virtual server from a
snapshot on the backup device. This enables businesses to continue normal business operations while
the primary server is restored (using one of the methods above). Local virtualization nearly eliminates
costly business downtime. Sometimes, this functionality is known as Instant Virtualization.
l Cloud virtualization: Cloud virtualization refers to the process outlined above, but in the cloud rather
than on a local backup device. Some BCDR solutions can create a tertiary cloud copy of backup server
images. In the event that both the primary and backup servers are inoperable, say because of a fire or
flood, business operations can be continued on the cloud backup server image.
300
Data Analytics LESSON 11
device should be put in a Faraday bag to prevent network interaction from potentially altering data on the
device.
Devices that cannot be turned off can instead be placed on airplane mode or disable any Wi-Fi or Bluetooth
capabilities. If it is necessary to keep the device powered on, connect it to an external power source such as a
portable battery pack. Devices that are found turned off should be left off and their model number, carrier, and
unique identifiers should be documented.
Forensic investigators who encounter computers at a scene should prevent any alteration of evidence during
collection. They should first document any activity on the computer, components, or devices by screenshotting
and recording any information on the screen. If any destructive software is running on the computer, the power
must be immediately disconnected to preserve the evidence.
Investigators that have been appropriately trained can also collect digital evidence at the scene. By using tools
that help them identify which electronic devices contain evidence related to their case. The ability to preview
digital evidence at the scene can save investigators time and resources. Investigators must make duplicate
copies of the content contained on devices to maintain the integrity of the primary source of evidence. The data
obtained should not be altered or modified.
The simple reasons for collecting evidence are:
l Future Prevention: Without knowing what happened, you have no hope of ever being able to stop
someone else from doing it again.
l Responsibility: The attacker is responsible for the damage done, and the only way to bring him to
justice is with adequate evidence to prove his actions. The victim has a responsibility to the community.
Information gathered after a compromise can be examined and used by others to prevent further
attacks.
Collection Options
Once a compromise has been detected, you have two options:
l Pull the system off the network and begin collecting evidence: In this case, you may find that you have
insufficient evidence or, worse, that the attacker left a dead man’s switch which destroys any evidence
once the system detects that it’s offline.
l Leave it online and attempt to monitor the intruder: you may accidentally alert the intruder while
monitoring and cause him to wipe his tracks in any way necessary, destroying evidence as he goes.
Obstacles
l Computer transactions are fast, they can be conducted from anywhere, can be encrypted or
anonymous, and have no intrinsic identifying features such as handwriting and signatures to identify
those responsibly.
l Any paper trail of computer records they may leave can be easily modified or destroyed or maybe only
temporarily.
l Auditing programs may automatically destroy the records left when computer transactions are finished
with them.
l Investigating electronic crimes will always be difficult because of the ease of altering the data and the
fact that transactions may be done anonymously.
l The best we can do is follow the rules of evidence collection and be as assiduous as possible.
301
PP-AIDA&CS Data Analytics
Volatile Evidence
The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving
information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence). The volatile
data that is held in temporary storage in the system’s memory (including random access memory, cache
memory, and the onboard memory of system peripherals such as the video card or NIC) is called volatile data
because the memory is dependent on electric power to hold its contents. Volatile data is the data that is usually
stored in cache memory or RAM. This volatile data is not permanent this is temporary and this data can be
lost if the power is lost i.e., when computer loses its connection. During any cyber crime attack, investigation
process is held in this process data collection plays an important role but if the data is volatile then such type
of data should be collected immediately. Volatile information can be collected remotely or onsite. If there are
many numbers of systems to be collected then remotely is preferred rather than onsite. It is very important for
the forensic investigation that immediate state of the computer is recorded so that the data does not lose as the
volatile data will be lost quickly. If the volatile data is lost on the suspects computer if the power is shut down,
Volatile information is not crucial but it leads to the investigation for the future purpose. To avoid this problem of
storing volatile data on a computer we need to charge continuously so that the data isn’t lost. So that computer
doesn’t lose data and forensic expert can check this data sometimes cache contains Web mail. This volatile
data may contain crucial information.so this data is to be collected as soon as possible. This process is known
“Live Forensics”.
The final step in evidence assessment specifically deals with the evidence itself. You should identify the stability
of the evidence, and collect the most volatile evidence first before moving to nonvolatile evidence. In doing so,
you should prioritize the collection and acquisition of evidence so that the evidence that is most likely to contain
what you’re searching for is examined first. There are different examples of an order of volatility like Registers
and cache, Routing tables, Arp cache, Process table, Kernel statistics and modules, Main memory, Temporary
file systems, Secondary memory, Router configuration & Network topology.
Methods of Collection
There are two basic forms of collection: freezing the scene and honey potting.
Freezing the Scene
l It involves taking a snapshot of the system in its compromised state. You should then start to collect
whatever data is important onto removable non-volatile media in a standard format.
l All data collected should have a cryptographic message digest created, and those digests should be
compared to the originals for verification.
Honey Potting
l It is the process of creating a replica system and luring the attacker into it for further monitoring.
l The placement of misleading information and the attacker’s response to it is a good method for
determining the attacker’s motives.
Artifacts
l There is almost always something left behind by the attacker be it code fragments, trojan programs,
running processes, or sniffer log files. These are known as artifacts.
l Never attempt to analyze an artifact on the compromised system.
l Artifacts are capable of anything, and we want to make sure their effects are controlled.
302
Data Analytics LESSON 11
Collection Steps
1. Find the Evidence: Use a checklist. Not only does it help you to collect evidence, but it also can be used
to double-check that everything you are looking for is there.
2. Find the Relevant Data: Once you’ve found the evidence, you must figure out what part of it is relevant
to the case.
3. Create an Order of Volatility: The order of volatility for your system is a good guide and ensures that
you minimize the loss of uncorrupted evidence.
4. Remove external avenues of change: It is essential that you avoid alterations to the original data.
5. Collect the Evidence: Collect the evidence using the appropriate tools for the job.
6. Document everything: Collection procedures may be questioned later, so it is important that you
document everything you do. Timestamps, digital signatures, and signed statements are all important.
Controlling Contamination: The Chain of Custody
Once the data has been collected, it must be protected from contamination. Originals should never be used
in the forensic examination; verified duplicates should be used. A good way of ensuring that data remains
uncorrupted is to keep a chain of custody. This is a detailed list of what was done with the original copies once
they were collected. Analysis
l Once the data has been successfully collected, it must be analyzed to extract the evidence you wish
to present and to rebuild what actually happened.
Time
l To reconstruct the events that led to your system being corrupted, you must be able to create a timeline.
l Never, ever change the clock on an affected system. Forensic Analysis of Back-ups When we analyze
back-ups, it is best to have a dedicated host for the job. We need a dedicated host which is secure,
clean, and isolated from any network for analyzing backups.
l Document everything you do. Ensure that what you do is repeatable and capable of always giving the
same results.
303
PP-AIDA&CS Data Analytics
l The media used in computer forensic examinations must be sterilized before each use.
l A true image (bit stream) of the original media must be made and used for the analysis.
l The integrity of the original media must be maintained throughout the entire investigation.
Before the Investigation
l For the sake of the first argument, you must have skilled technicians in-house and a top-notch lab with
the right equipment, the right computer forensic tools, and so on.
l District attorneys may require more documentation on the chain of evidence handling.
l When you have a case arise, you know what is required and can work the case from the inception in
support of these requirements.
Methodology Development
l Define your methodology, and work according to this methodology.
l Here methodology defines a method, a set of rules: guidelines that are employed by a discipline.
The chain of evidence is so important in computer forensic investigations. If resources allow, have two computer
forensic personnel assigned to each case every step of the way. Important in the documentation are the times
that dates steps were taken; the names of those involved; and under whose authority were the steps taken.
304
Data Analytics LESSON 11
SafeBack
l SafeBack has become a law enforcement standard and is used by numerous government intelligence
agencies, military agencies, and law enforcement agencies worldwide.
l SafeBack program copies and preserves all data contained on the hard disk. Even it goes so far as to
circumvent attempts made to hide data in bad clusters and even sectors with invalid CRCs.
SnapBack
l Another bit steam backup program, called SnapBack, is also available and is used by some law
enforcement agencies primarily because of its ease of use.
l Its prices are several hundred dollars higher than SafeBack.
l It has error-checking built into every phase of the evidence backup and restoration process.
l The hard disk drive should be imaged using specialized bit stream backup software.
l The floppy diskettes can be imaged using the standard DOS DISKCOPY program.
l When DOS DISKCOPY is used, it is recommended that the MS-DOS Version 6.22 be used and the (data
verification) switch should be invoked from the command line.
l Know and practice using all of your forensic software tools before you use them in the processing of
computer evidence.
l We may only get one chance to do it right.
305
PP-AIDA&CS Data Analytics
to document the system hardware components and how they are connected. Labeling each wire is also
important so that it can easily be reconnected when the system configuration is restored to its original
condition at a secure location.
3. Transport the computer system to a secure location. A seized computer left unattended can easily be
compromised. Don’t leave the computer unattended unless it is locked up in a secure location.
4. Make bit stream backups of hard disks and floppy disks. All evidence processing should be done on
a restored copy of the bit stream backup rather than on the original computer. Bit stream backups are
much like an insurance policy and are essential for any serious computer evidence processing.
5. Mathematically authenticate data on all storage devices. You want to be able to prove that you did not
alter any of the evidence after the computer came into your possession. Since 1989, law enforcement
and military agencies have used a32- bit mathematical process to do the authentication process.
6. Document the system date and time: If the system clock is one hour slow because of daylight-saving
time, then file timestamps will also reflect the wrong time. To adjust for these inaccuracies, documenting
the system date and time settings at the time the computer is taken into evidence is essential.
7. Make a list of key search words. It is all but impossible for a computer specialist to manually view and
evaluate every file on a computer hard disk drive. Gathering information from individuals familiar with
the case to help compile a list of relevant keywords is important. Such keywords can be used in the
search of all computer hard disk drives and floppy diskettes using automated software.
8. Evaluate the Windows swap file. The Windows swap file is a potentially valuable source of evidence
and leads. When the computer is turned off, the swap file is erased. But the content of the swap file can
easily be captured and evaluated.
9. Evaluate file slack: It is a source of significant security leakage and consists of raw memory dumps that
occur during the work session as files are closed. File slack should be evaluated for relevant keywords
to supplement the keywords identified in the previous steps. File slack is typically a good source of
Internet leads. Tests suggest that file slack provides approximately 80 times more Internet leads than
the Windows swap file.
10. Evaluate unallocated space (erased files). Unallocated space should be evaluated for relevant
keywords to supplement the keywords identified in the previous steps.
11. Search files, file slack, and unallocated space for keywords. The list of relevant keywords identified in
the previous steps should be used to search all relevant computer hard disk drives and floppy diskettes.
It is important to review the output of the text search utility and equally important to document relevant
findings.
12. Document file names, dates, and times. From an evidence standpoint, file names, creation dates, and
last modified dates and times can be relevant. The output should be in the form of a word-processing-
compatible file that can be used to help document computer evidence issues tied to specific files.
13. Identify file, program, and storage anomalies. Encrypted, compressed, and graphic files store data in
binary format. As a result, text data stored in these file formats cannot be identified by a text search
program. Manual evaluation of these files is required. Depending on the type of file involved, the
contents should be viewed and evaluated for their potential as evidence.
14. Evaluate program functionality. Depending on the application software involved, running programs to
learn their purpose may be necessary. When destructive processes that are tied to relevant evidence
are discovered, this can be used to prove wilfulness.
306
Data Analytics LESSON 11
15. Document your findings. It is important to document your findings as issues are identified and as
evidence is found. Documenting all of the software used in your forensic evaluation of the evidence,
including the version numbers of the programs used, is also important. Be sure you are legally licensed
to USE the forensic software. Screen prints of the operating software also help document the version of
the software and how it was used to find or process the evidence.
16. Retain copies of the software used. As part of your documentation process, it is recommended that a
copy of the software used to be included with the output of the forensic tool involved. Duplication of
results can be difficult or impossible to achieve if the software has been upgraded and the original
version used was not retained.
Forensic Evidence
Definition
l A chain of custody is a roadmap that shows how evidence was collected, analyzed, and preserved in
order to be presented as evidence in court.
Legal Requirements
l When evidence is collected, certain legal requirements must be met. These legal requirements are
vast, and complex, and vary from country to country.
l CERT Advisory CA-1992-19 suggests the following text be tailored to a corporation’s specific needs
under the guidance of legal counsel:
l This system is for the use of authorized users only. Individuals using this computer system without
authority, or in excess of their authority, are subject to having all of their activities on this system
monitored and recorded by system personnel.
l In the course of monitoring individuals improperly using this system, or in the course of system
maintenance, the activities of authorized users may also be monitored.
l Anyone using this system expressly consents to such monitoring and is advised that if such monitoring
reveals possible evidence of criminal activity, system personnel may provide the evidence of such
monitoring to law enforcement officials.
l The legality of workplace monitoring depends primarily on whether employment policies exist that
authorize monitoring and whether that policy has been clearly communicated to employees.
l To prove that the policy has been communicated, employees should sign a statement indicating that
they have read, understood, and agreed to comply with corporate policy and consent to system
monitoring.
307
PP-AIDA&CS Data Analytics
308
Data Analytics LESSON 11
Evidence Collection
l Another team member (or members) will be assigned the task of evidence collection.
l To avoid confusion, the number of people assigned to this task should be kept to a minimum.
l This member (or members) should also be highly proficient with copying and analysis tools.
l This person will tag all evidence and work with the person responsible for the evidence notebook to
ensure that this information is properly recorded.
l Next, the person will also be responsible for making a reliable copy of all data to be used as evidence.
l The data will include complete copies of drives on compromised or suspect systems, as well as all
relevant log files.
l This can be done on-site or the entire system can be moved to a forensics lab, as needs dictate.
l A binary copy of the data is the proper way to preserve evidence.
l A reliable copy process has three critical characteristics.
l The process must meet industry standards for quality and reliability.
l The copies must be capable of independent verification.
l The copies must be tamperproof.
l Once all evidence is collected and logged, it can be securely transported to the forensics lab.
l A detailed description of how data was transported and who was responsible for the transport, along
with the date, time, and route, should be included in the log. Storage and Analysis of Data.
l The lab must provide some form of access control; a log should be kept detailing the entrance and exit
times of all individuals.
l It is important that evidence never be left in an unsecured area.
l If a defense lawyer can show that unauthorized persons had access to the evidence, it could easily be
declared inadmissible.
As analysis of evidence is performed, investigators must log the details of their actions in the evidence notebook.
The following should be included at a minimum:
l The date and time of analysis.
l Tools used in performing the analysis.
309
PP-AIDA&CS Data Analytics
Authenticode
l Microsoft Authenticode allows developers to include information about themselves and their code with
their programs through the use of digital signatures.
l Through Authenticode, the user is informed
310
Data Analytics LESSON 11
Digital ID
l A Digital ID/Certificate is a form of electronic credentials for the Internet.
l A Digital ID is issued by a trusted third party to establish the identity of the ID holder.
l The third party who issues certificates is known as a Certificate Authority (CA).
l Digital ID technology is based on the theory of public key cryptography.
l The purpose of a Digital ID is to reliably link a public/private key pair with its owner.
l When a CA such as VeriSign issues a Digital ID, it verifies that the owner is not claiming a false identity.
l When a CA issues you a digital certificate, it puts its name behind the statement that you are the rightful
owner of your public/private key pair.
311
PP-AIDA&CS Data Analytics
5. The end user’s browser examines the publisher’s Digital ID. Using the VeriSign root Public Key, which is
already embedded in Authenticode-enabled applications, the end user browser verifies the authenticity
of Software Developer Digital ID (which is itself signed by the VeriSign root Private Key).
6. Using the publisher’s public key contained within the publisher’s Digital ID, the end user browser
decrypts the signed hash.
7. The end browser runs the code through the same hashing algorithm as the publisher, creating a new
hash.
8. The end user browser compares the two hashes. If they are identical, the browser messages that the
content has been verified by VeriSign, and the end user has the confidence that the code was signed
by the publisher identified in the Digital ID, and the code hasn’t been altered since it was signed.
Time Stamping: Because key pairs are based on mathematical relationships that can theoretically be “cracked”
with a great deal of time and effort, it is a well-established security principle that digital certificates should
expire.
Evidence Collection
The Investigator needs to make sure that evidence must be collected in a systematic and careful manner. The
process of evidence collection begins with the preliminary crime scene survey/walk-through, followed by a
determination of the evidence collection sequence to be used. There are various methods that can be adopted
for evidence collection based on the type of crime scene. The evidence collection sequence may be based on
the following information:
l The scene location: whether the crime has occurred inside premises or within a vehicle or it is an
exterior one.
l The condition of the evidence: the condition of evidence (Whether the evidence is fragile or stable)
plays an important role in choosing which evidence collection method is to be used.
312
Data Analytics LESSON 11
313
PP-AIDA&CS Data Analytics
package must be labeled with all the essential details such as Case FIR No., Item No., Type of Evidence (fragile/
stable), etc. After labeling the package must be sealed with evidence tape. Take the entire piece of evidence
as it is found on the crime scene, if possible. New and unused packaging materials should be used. Evidence
must be sealed using proper methods which prevent tampering. For powders such as drugs or others, ordinary
mailing envelopes should not be used because powders will leak out of their corners.
1. Unbreakable Plastic pill bottles with pressure lids or in Manila envelopes, screwcap glass vials, or
cardboard pillboxes- Used to store trace evidence such as hair glass fiber, etc.
2. Paper bags and boxes- Used to package larger and/or heavier pieces of evidence.
3. Clean Paint Cans- Used to store Arson evidence.
4. Paper bags or Manila envelopes- Used to store Blood-stained materials/clothing after air drying.
5. Air-tight containers- used to store.
CHAIN OF CUSTODY
After careful collection of the evidence, the next step of the investigator is to submit evidence in the laboratory
for examination. In the whole process, the maintenance of the chain of custody is very important. The transfer of
property or evidence from a crime scene investigator to any other individual, agency, or location is documented
by having a chain of custody. The list of information that is to be included in the chain of custody:
l List of evidence: the item number and a brief description.
l All transfers must include the date and time of the transfer.
l The signature of the individual releasing the evidence to another individual or location.
l The signature of the individual transporting the evidence.
l The signature of the individual receiving the evidence from another individual or location.
l Reason for the transfer as needed.
After all the collected evidence have been packaged properly they should be properly labeled. After labeling
the next step is to transport all the packed evidence to the crime lab for forensic analysis or for further evaluation.
The chain of custody is a tracking document beginning with detailed scene notes that document where the
evidence was received from or collected. The chain of custody is initially established when an investigator
takes custody of evidence at a crime scene, or when evidence is received from an officer or detective at, or from,
the crime scene. In order to maintain all items, a complete and correct chain of custody must be maintained for
all items.
Notes should be prepared which comprise of documentation of recovery location, the date and time of recovery,
and also the description of items, condition, and whether any unusual markings or alterations to the item were
present during recovery. This is not necessary that the evidence collector only will transport the evidence to
the laboratory. Often some other officer transports the evidence to the lab. That’s why maintenance of chain of
custody log must be maintained indicating the transfer of custody to and from every individual who is involved
in transporting or storing the evidence until it gets to the crime lab.
These include:
a) The collecting officer (who collects the evidence from the crime scene),
b) The transportation officer (who transports the collected & packaged evidence from the Crime scene to
the laboratory),
314
Data Analytics LESSON 11
c) Any evidence storage officer if the evidence is stored prior to taking it to the lab,
d) Any further transportation officer,
e) Anyone who gets into the evidence for any reason,
f) The laboratory evidence collection person(s),
g) Any other person involved in the whole process,
h) Send all evidence (to the crime lab) by registered or certified mail, return receipt requested, to maintain
the chain of custody.
315
PP-AIDA&CS Data Analytics
Most of the applications need a file system to work, hence every partition needs to have one. Programs are
also dependent on file systems, which means that if a program is built to be used in Mac OS, it will not run on
Windows.
316
Data Analytics LESSON 11
317
PP-AIDA&CS Data Analytics
Acquisition
The system should be secured to ensure that all data and equipment stay safe. In other words, all media
required for forensic analysis should be acquired and kept safe from any unauthorized access. Find out all files
on the computer system including encrypted, password-protected, hidden, and deleted (but not overwritten)
files. These files must be acquired from all storage media that include hard drives and portable media. Once
acquired, forensic investigators have to make a copy of them so that the original files are kept intact without
the risk of alteration.
This can be done in four ways:
l Disk-to-Image: This is the most common method as it provides more flexibility and allows to creation of
multiple copies.
l Disk-to-Disk: Used where disk-to-image is not possible.
l Logical: it captures only the files that are of interest to the case. Used when time is limited.
l Sparse: It gathers fragments of deleted or unallocated data.
Extraction
Data extraction, which involves the retrieving of unstructured or deleted data and needs to be processed for
forensic investigation. Many computer users think that a file, once deleted, will disappear forever from the hard
disk. However, this is not true. Deleting files only removes it from the disc contents table. In FAT systems it is
called the File Allocation Table, while in NTFS it is called the Master File Table. Data is stored in clusters on the
hard disc and consists of a certain number of bits. Parts of files are mostly scattered throughout the disc, and
deleting the files makes it difficult to reconstruct them, but not impossible. With increased disk capacity, it now
takes longer for all fragments of a file to be overwritten.
In many cases, the criminals may have hidden the data that can turn out to be useful for forensic investigation.
Criminals with basic technical knowledge have many options available for hiding data such as disk editor,
encryption, steganography, and so on. Recovering and reconstructing this data can be time-consuming, but
generally, it produces fruitful evidence.
318
Data Analytics LESSON 11
Extracting data from unallocated space is file carving. It is a helpful technique in digital forensics that finds
deleted or hidden files from the media. A hidden file can lie in any area such as slack space, unallocated
clusters, or lost clusters of the digital media or disk. For using file carving, a file should have a header that can
be located by performing a search that continues till the file footer is located. Data that lies between these two
points is extracted and then analyzed for file validation.
Reconstruction
Extracted data can be reconstructed using a variety of available software tools that are based on various
reconstruction algorithms such as bottom-up tree reconstruction and inference of partition geometry.
Reconstructed data is thoroughly analyzed for further evidence and put forth in the form of a report.
Reporting
In order to keep a track record of every step of the investigation, document every procedural step. Evidence
presented without proper documentation may not be admissible in court. This documentation should not only
include the recovered files and data but also the physical layout of the system along with any encrypted
or reconstructed data. Forensic analysis of time-based metadata can help investigators correlate distinct
information quickly and to find notable times and dates of activities related to improper computer usage,
spoliation, and misappropriation.
319
PP-AIDA&CS Data Analytics
items. Yet, such analysis cannot be performed successfully when the crucial parts of metadata are missing. That
is why it is extremely important to refrain from using file system repair tools or initiating operations that may
result in its modification until the data is restored completely.
As a rule, when the desired result wasn’t achieved with the help of metadata analysis, the search for files by
their known content it performed. In this case, the “known content” doesn’t imply the entire raw content of a
file, only particular patterns that are typical for the files of the given format and may indicate the beginning or
the end of the file. These patterns are referred to as “file signatures” and can be used to determine whether a
piece of data on the storage belongs to a file of a recognized type. Files recovered with this method receive an
extension based on the found signature, and new names and get assigned to new folders, usually created for
files of different types. The main limitation of this approach is that some files may lack identifiable signatures
or have only a signature denoting the start of a file, making it hard to predict where it ends, especially when its
parts are not stored consequently.
To get the lost files back with maximum efficiency, data recovery software may use the described techniques
concurrently during a single scan launched on storage.
Remote data recovery is performed through a modem or Internet connection by engineers using technology to
achieve the same results as if the hard drive had been sent to a lab, yet in a more convenient manner for the
customer. Assuming the hard drive is still functioning, remote recovery can be achieved for a single file or for
huge volumes of data.
However, many users don’t consider remote recovery to be as reliable as sending damaged drives to a lab.
They believe recovery can be achieved only by engineers with highly specialized tools in state-of-the-art clean
rooms. Users also are concerned about the security of having their computer systems, and their valuable data,
connected to a third-party system and any vulnerability that might create.
Depending on the scenario, remote recovery offers the same advantages as in-lab service, with the added
benefit of faster recovery times -- often as short as one hour. The initial goal is to either make the original volume
mountable -- meaning that the operating system can read and write data to that drive -- or restore the data to
its previous location. If this isn’t possible, the engineer copies the data to a different location on the customer’s
system. With no need to dismantle and ship the drive or hardware for service, many concerns about a traditional
recovery are eliminated. Security isn’t an issue, since each recovery is performed through a connection secured
with proprietary communication protocols and encrypted packets.
Remote recovery can solve many data-loss problems because it works for all types of recoveries, including
servers, desktops, and laptops, across a wide variety of media, platforms and operating systems. In addition,
the pricing structure is similar to traditional in-lab work. With remote recovery, you’re not paying more, but
you’re potentially getting your data back faster.
320
Data Analytics LESSON 11
Remote service requires a stable connection, which can be a challenge in a high-security environment. Many
organizations have strict proxy server or firewall policies and may not be able to connect with outside systems.
Working with large amounts of data can also be a problem. Although remote recovery is capable of recovering
huge volumes of data, sometimes the customer doesn’t have the space available for the copied data. For
example, working with some Unix or Macintosh systems requires special copy-out destinations to maintain data
integrity.
Finally, the unique nature of the service can be a roadblock to using remote data recovery. Since it’s a fairly
new technology, many users feel that remote recovery is too good to be true and don’t believe that it can
deliver on the promises it makes. As the following examples show, however, remote data recovery is an option
that every data-loss sufferer should always consider.
Data privacy generally means the ability of a person to determine for themselves when, how, and to what
extent personal information about them is shared with or communicated to others. This personal information
can be one’s name, location, contact information, or online or real-world behavior. Just as someone may wish
to exclude people from a private conversation, many online users want to control or prevent certain types of
personal data collection.
As Internet usage has increased over the years, so has the importance of data privacy. Websites, applications,
and social media platforms often need to collect and store personal data about users in order to provide
services. However, some applications and platforms may exceed users’ expectations for data collection and
usage, leaving users with less privacy than they realized. Other apps and platforms may not place adequate
safeguards around the data they collect, which can result in a data breach that compromises user privacy.
What are some of the challenges users face when protecting their online privacy?
Online tracking: User behavior is regularly tracked online. Cookies often record a user’s activities, and while
most countries require websites to alert users of cookie usage, users may not be aware of to what degree
cookies are recording their activities.
321
PP-AIDA&CS Data Analytics
Losing control of data: With so many online services in common use, individuals may not be aware of how their
data is being shared beyond the websites with which they interact online, and they may not have a say over
what happens to their data.
Lack of transparency: To use web applications, users often have to provide personal data like their name,
email, phone number, or location; meanwhile, the privacy policies associated with those applications may be
dense and difficult to understand.
Social media: It is easier than ever to find someone online using social media platforms, and social media posts
may reveal more personal information than users realize. In addition, social media platforms often collect more
data than users are aware of.
Cybercrime: Many attackers try to steal user data in order to commit fraud, compromise secure systems, or sell
it on underground markets to parties who will use the data for malicious purposes. Some attackers use phishing
attacks to try to trick users into revealing personal information; others attempt to compromise companies’
internal systems that contain personal data.
What are some of the challenges businesses face when protecting user privacy?
Communication: Organizations sometimes struggle to communicate clearly to their users what personal data
they are collecting and how they use it.
Cybercrime: Attackers target both individual users and organizations that collect and store data about those
users. In addition, as more aspects of a business become Internet-connected, the attack surface increases.
Data breaches: A data breach can lead to a massive violation of user privacy if personal details are leaked,
and attackers continue to refine the techniques they use to cause these breaches.
Insider threats: Internal employees or contractors might inappropriately access data if it is not adequately
protected.
322
Data Analytics LESSON 11
System users can change or modify this default location of the Temporary files by clicking on the Environment
Variables properties of your system or running sysdm.cpl in the Windows Run box.
323
PP-AIDA&CS Data Analytics
create intuitive reports. With EnCase Forensic, examiners can be confident the integrity of the evidence will not
be compromised. All evidence captured with EnCase Forensic is stored in the court-accepted EnCase evidence
file formats.
EnCase Forensic has been used in thousands of court cases and is known for its ability to uncover evidence that
may go unnoticed if analyzed with other solutions. Police agencies, federal agencies, and companies across
the globe depend on EnCase Forensic for its functionality, flexibility, and track record of court acceptance. New
customer-driven enhancements further differentiate EnCase Forensic from all other forensic tools on the market.
FTK can perform forensics analysis on the following file systems: • Microsoft FAT12, FAT16, and FAT32Microsoft
NTFS (for Windows NT, 2000, XP, and Vista) • Linux Ext2fs and Ext3fs.
FTK can analyze data from several sources, including image files from other vendors. It can also read entire
evidence drives or subsets of data, allowing you to consolidate large volumes of data from many sources when
conducting a computer forensics analysis. With FTK, you can store everything from image files to recovered
server folders on one investigation drive. FTK also produces a case log file, where you can maintain a detailed
record of all activities during your examination, such as keyword searches and data extractions. This log is also
handy for reporting errors to Access Data.
At times, however, you might not want the log feature turned on. If you’re following a hunch, for example, but
aren’t sure the evidence you recover is applicable to the investigation, you might not want opposing counsel to
see a record of this information because he or she could use it to question your methods and perhaps discredit
your testimony. (Chapter 15 covers testimony issues in more detail.) Look through the evidence first before
enabling the log feature to record searches. This approach isn’t meant to conceal evidence; it’s a precaution to
ensure that your testimony can be used in court. FTK has two options for searching for keywords. One option
is an indexed search, which catalogs all words on the evidence drive so that FTK can find them quickly. This
option returns search results quickly, although it does have some shortcomings. For example, you can’t search
for hexadecimal string values, and depending on how data is stored on the eve-dense drive, indexing might not
catalog every word. If you do use this feature, keep in mind that indexing an image file can take several hours,
so it’s best to run this process overnight. The other option is a live search, which can locate items such as text
hidden in unallocated space that might not turn up in an indexed search. You can also search for alphanumeric
and hexadecimal values on the evidence drive and search for specific items, such as phone numbers, credit
card numbers, and Social Security numbers.
324
Data Analytics LESSON 11
325
PP-AIDA&CS Data Analytics
integrity. This often involves physically isolating the device under investigation to ensure it cannot
be accidentally contaminated or tampered with. Examiners make a digital copy, also called
a forensic image, of the device’s storage media, and then they lock the original device in a safe or
other secure facility to maintain its pristine condition. The investigation is conducted on the digital
copy. In other cases, publicly available information may be used for forensic purposes, such as
Facebook posts or public Venmo charges for purchasing illegal products or services displayed on
the Vicemo website.
2. Analysis. Investigators analyze digital copies of storage media in a sterile environment to gather the
information for a case. Various tools are used to assist in this process, including Basis Technology’s
Autopsy for hard drive investigations and the Wireshark network protocol analyzer. A mouse jiggler is
useful when examining a computer to keep it from falling asleep and losing volatile memory data that
is lost when the computer goes to sleep or loses power.
3. Presentation. Forensic investigators present their findings in a legal proceeding, where a judge or jury
uses them to help determine the result of a lawsuit. In a data recovery situation, forensic investigators
present what they were able to recover from a compromised system.
One of the most critical aspects of computer forensics is validating digital evidence because ensuring the
integrity of the data you collect is essential for presenting evidence in court. Most computer forensic tools such
as ProDiscover, X-Ways Forensics, FTK, and Encase provide automated hashing of image files. For example,
when ProDiscover loads an image file, it runs a hash and compares that value to the original hash calculated
when the image was first acquired. You might remember seeing this feature when the Auto Image Checksum
Verification message box opens after you load an image file in ProDiscover. Computer forensics tools have
some limitations in performing hashing, however, so learning how to use advanced hexadecimal editors is
necessary to ensure data integrity.
Validating with Hexadecimal Editors Advanced hexadecimal editors offer many features not available in
computer forensics tools, such as hashing specific files or sectors. Learning how to use these tools is important,
especially when you need to find a particular file—for example, a known contraband image. With the hash
value in hand, you can use a computer forensics tool to search for a suspicious file that might have had its name
changed to look like an innocuous file. (Recall that two files with exactly the same content have the same hash
value, even if they have different names.) Getting a hash value with a full-featured hexadecimal editor is much
faster and easier than with a computer forensics tool.
A Computer Forensic Investigation generally investigates the data which could be taken from computer
hard disks or any other storage devices with adherence to standard policies and procedures to determine
if those devices have been compromised by unauthorized access or not. Computer Forensics Investigators
work as a team to investigate the incident and conduct the forensic analysis by using various methodologies
(e.g. Static and Dynamic) and tools (e.g. ProDiscover or Encase) to ensure the computer network system is
secure in an organization. A successful Computer Forensic Investigator must be familiar with various laws
and regulations related to computer crimes in their country (e.g. Computer Misuse Act 1990, the UK) and
various computer operating systems (e.g. Windows, Linux) and network operating systems (e.g. Win NT).
According to Nelson, B., et al., (2008), Public Investigations and Private or Corporate Investigations are
the two distinct categories that fall under Computer Forensics Investigations. Public investigations will be
conducted by government agencies, and private investigations will be conducted by a private computer
forensic team. This report will be focused on private investigations since an incident occurred at a new
start-up SME based in Luton.
326
Data Analytics LESSON 11
LESSON ROUND-UP
l Data recovery tools are an essential tool for individuals to recover lost or damaged data. Such tools
perform differently in case of personal data recovery and forensic data recovery.
l Data privacy is also important because in order for individuals to be willing to engage online, they have
to trust that their personal data will be handled with care. Organizations use data protection practices
to demonstrate to their customers and users that they can be trusted with their personal data.
l Forensic data recovery is the extraction of data from damaged evidence sources in a forensically
sound manner. This method of recovering data means that any evidence resulting from it can later be
relied on in a court of law.
l Digital forensics tools are either hardware or software designed to aid in the recovery of digital evidence
of cyber-attack, and preservation of data or critical systems.
l The chain-of-custody form is critical in evidence gathering, and it comes into play as soon as you
arrive at the scene of the incident. Every report, disk, screenshot, and printout is considered evidence;
the chain of custody will begin as soon as the evidence is placed in an evidence bag or is tagged as
evidence.
l Evidence gathering focuses on collecting all potential evidence, such as might be present in computer/
network logs, on defaced websites, on social media sites, or forensically from a computer hard drive.
l Digital Evidence is any information that is stored or transmitted in the digital form that a party at court
can use at the time of trial. Digital evidence can be Audio files, and voice recordings, Address books
and contact lists, Backups to various programs, including backups to mobile devices, Browser history,
Cookies, Database, Compressed archives (ZIP, RAR, etc.) including encrypted archives, etc.
l Files that are deleted, lost, cached or unallocated can be retrieved using various methods and tools.
Glossary
Data Analytics - Data Analytics is the science of analyzing raw datasets in order to derive a conclusion
regarding the information they hold. It enables us to discover patterns in the raw data and draw valuable
information from them. Data analytics processes and techniques may use applications incorporating machine
learning algorithms, simulation, and automated systems.
Data Recovery - Data recovery is the process of restoring data that has been lost, accidentally deleted,
corrupted or made inaccessible.
Chain of Custody - Chain of Custody form the Chain of Custody form (CCF or CoC) is used to record all
changes in the seizure, custody, control, transfer, analysis, and disposition of physical and electronic
evidence.
Swap File - A swap file is a system file that creates temporary storage space on a solid-state drive or hard
disk when the system runs low on memory. The file swaps a section of RAM storage from an idle program
and frees up memory for other programs.
Computer forensics – Computer forensics which is sometimes referred to as computer forensic science --
essentially is data recovery with legal compliance guidelines to make the information admissible in legal
proceedings. The terms digital forensics and cyber forensics are often used as synonyms for computer
forensics.
Data Privacy- Data privacy is the branch of data management that deals with handling personal data in
compliance with data protection laws, regulations, and general privacy best practices.
327
PP-AIDA&CS Data Analytics
Test Yourself
(These are meant for recapitulation only. Answers to these questions are not to be submitted for evaluation)
1. What is the standard procedure and practice followed for the recovery of data and what ethical norms
to be followed in such cases?
2. What are the precautions need to be followed in identification, preservation, analysis and presentation
of evidence?
3. Why the issue of data privacy is significant in contemporary world today and what are the challenges
faced in protection of such data?
4. Forensic Toolkit can perform forensics analysis on many file systems with different strategies. Discuss.
l Anil Maheshwari, Data Analytics, McGraw Hill Education, First Edition, July 2017
l Jay Liebowitz, Data Analytics and AI, Taylor & Francis, First Edition, August, 2020
l Samaddar, Auerbach P, Data Analytics, Taylor & Francis, First Edition, February, 2019
l Joao Moereira, Andre Carvalho, Tom Horvath, A General Introduction to Data Analytics, Wiley
Interscience, 1st Edition, August, 2020
l Goldenfein, J,Images and Biometrics – Privacy and Stigmatisation. In Monitoring Laws: Profiling and
Identity in the World State (pp. 42-63). Cambridge: Cambridge University Press. doi:10.1017/9781108637
657.003,2019
l Van Alsenoy, B., Introduction. In Data Protection Law in the EU: Roles, Responsibilities and Liability (pp.
343-346). Intersentia. doi:10.1017/9781780688459.023,2019
l Culnan, M., & Bruening, P., Privacy Notices: Limitations, Challenges, and Opportunities*. In E. Selinger, J.
Polonetsky, & O. Tene (Eds.), The Cambridge Handbook of Consumer Privacy (Cambridge Law Handbooks,
pp. 524-545). Cambridge: Cambridge University Press. doi:10.1017/9781316831960.029,2018
328
Lesson
Information Systems
12
KEY CONCEPTS
n Information System n Hardware n Software n Data n Telecommunications n Information Systems n Decision
Support System n Management Information System n Office Automation Systems
Learning Objectives
To understand:
The meaning Information System
Uses of Information System
Types of Information System
Information System and Cyber Security
Information System and Its Application in Different Spheres of Business
Lesson Outline
What is Information System?
How Information System is Useful for Business?
Types of Information System
Application of Information System
Information System and Security
Lesson Round-Up
Glossary
Test Yourself
329
PP-AIDA&CS Information Systems
330
Information Systems LESSON 12
Direct Cutover The direct cutover approach causes the changeover from the old system to the new
system to occur immediately when the new system becomes operational. It is the
least expensive but involves more risks than other changeover methods.
Parallel Operation The parallel operation changeover method requires that both the old and the
new information systems operate fully for a specified period. Data is input to both
systems and output generated by the new system is compared with the equivalent
output from the old system.
When users, management, and IT group are satisfied that the new system operates
correctly then the old system is terminated. It is the costliest changeover method
and involves lower risks.
Pilot Operation The pilot changeover method involves implementing the completely new system
at a selected location of a company. Direct cutover method and operating both
systems for only the pilot site.
The group that uses the new system first is called the pilot site. By restricting the
implementation to a pilot site reduces the risk of system failure as compared with is
less expensive than a parallel system.
Phased operation The phased operation changeover method involves implementing the new system
in stages, or modules. We can implement each subsystem by using any of the other
three changeover methods. In this approach risk of errors or failures is limited to the
implemented module only as well as it is less expensive than the full parallel operation.
331
PP-AIDA&CS Information Systems
332
Information Systems LESSON 12
333
PP-AIDA&CS Information Systems
As newspaper print readership continues to decline, more than 168 million people read a newspaper online, and
millions more read other news sites. About 83 million people watch a video online every day, 66 million read a
blog, and 25 million posts to blogs, creating an explosion of new writers and new forms of customer feedback
that did not exist five years ago. Social networking site Facebook attracted over 1 billion monthly visitors in 2014
worldwide. Businesses are starting to use social networking tools to connect their employees, customers, and
managers worldwide. Many Fortune 500 companies now have Facebook pages, Twitter accounts, and Tumblr
sites.
E-commerce and Internet advertising continues to expand. Google’s online ad revenues surpassed $17 billion in
2013, and Internet advertising continues to grow at more than 15 percent a year, reaching more than $43 billion
in revenues in 2013.
Information system managers oversee a wide assortment of assignments related to the information system,
from coordinating or planning to inquire to supervising arrange security or web operations. Also, they can plan
the computer-related activities of the company. Since information systems managers manage an assortment
of other computer-related employment, they are expected to have knowledge and experience working in IT.
Common Benefits of Information It will induce innovation in business activities through its research
System that should be offered and development.
It will enable automation, reducing steps undertaken to complete
a task.
It helps keep the hardware, software, data storage, and networking
system safe and up to date.
334
Information Systems LESSON 12
335
PP-AIDA&CS Information Systems
+ 1. Trend Analysis.
2. Improvement of corporate
performance in the
marketplace.
2. Execuves may encounter
overload of informaon.
-
1. Due to technical funcons, not
to easy to use by everyone.
336
Information Systems LESSON 12
Attributes of a DSS
l Decision Support System is adaptable and flexible as per the requirement of business and
managers.
l Interactivity is one of the main attributes of decision support system wherein it interacts with all
the spheres of business and all level managers to improve the efficiency of business.
l Decision support system is curated the way that it very easy to use and understand.
l Decision support system are efficient and effective based of the information being fed into it.
l DSS can be extended to whole organization for more efficient performance with ease.
Characteristics of a DSS
l Support for managers at various managerial levels, ranging from top executive to line managers.
l Support for individuals and groups. Less structured problems often requires the involvement of
several individuals from different departments and organization level.
Components of a DSS
Database To solve a problem the necessary data may come from internal or external
Management database. In an organization, internal data are generated by a system
System (DBMS) such as TPS and MIS. External data come from a variety of sources such as
newspapers, online data services, databases (financial, marketing, human
resources).
Model Management It stores and accesses models that managers use to make decisions. Such
System models are used for designing manufacturing facility, analyzing the financial
health of an organization, forecasting demand of a product or service, etc.
Support Tools Support tools like online help; pulls down menus, user interfaces, graphical
analysis, error correction mechanism, facilitates the user interactions with
the system.
337
PP-AIDA&CS Information Systems
338
Information Systems LESSON 12
1. Expert System: An expert system provides managers with insights and advice based on Artificial
Intelligence (AI). In an expert system, the AI is trained to simulate the knowledge of a human
expert in a particular field.
2. Decision Support System: A DSS analyzes business data to assist managers with decision making.
For example, a DSS could project revenue figures based on new product sales assumptions.
3. Transaction Process System: A TPS processes the routine transactions associated with a
business. Examples include payroll processing, order processing for an e-commerce business
and invoicing.
4. Management Support System: An MSS stores and organizes data, enabling end users to generate
reports and analyze data to address business needs and inform planning. A data warehouse is an
example of a MSS.
The data managed by MIS software tools can help managers make better decisions related to sales,
manufacturing, resource allocation and more. Similarly, the MIS department plays an important role in
providing support services within an organization, such as the following:
1. Governance: Governance involves systems and controls over employees’ use of computing
systems. The MIS department defines, manages, and enforces the rules covering how and
whether employees can access the company’s technologies and network infrastructure. The MIS
department is responsible for IT security and enforcing codes of conduct related to computer
systems use.
2. Infrastructure: An organization’s IT infrastructure is comprised of the technology systems
that support the business’ day-to-day functioning -- for example, phones, desktop and laptop
computers, servers, application software and cloud computing. The MIS department provides
internal help desk and support services, assisting employees and troubleshooting issues related
to the infrastructure.
3. Data management: Data management involves provisioning and managing systems that enable
employees to access and update critical business data. The MIS department is responsible for
ensuring the availability and security of the organization’s data management systems.
Pros and Cons of Management Information System
The following are some of the benefits that can be attained using MIS:
l Improve an organization’s operational efficiency, add value to existing products, engender
innovation and new product development, and help managers make better decisions.
l Companies can identify their strengths and weaknesses due to the presence of revenue reports,
employee performance records etc. Identifying these aspects can help a company improve its
business processes and operations.
l The availability of customer data and feedback can help the company to align its business
processes according to the needs of its customers. The effective management of customer data
can help the company to perform direct marketing and promotion activities.
l MIS can help a company gain a competitive advantage.
l MIS reports can help with decision-making as well as reduce downtime for actionable items.
Some of the disadvantages of MIS systems:
l Retrieval and dissemination are dependent on technology hardware and software.
l Potential for inaccurate information.
339
PP-AIDA&CS Information Systems
340
Information Systems LESSON 12
a. Batch Processing: Batch processing is when clusters of transactions are refined simultaneously
using a computer system. This method, although designed to be efficient for breaking down bulky
series of programs, has a drawback as there is a delay in the transaction result.
b. Real-time Processing: Real-time processing carries out its transactions exclusively; this method
ensures a swift reply on the condition of the transaction result. It is an ideal technique for dealing
with singular transactions.
Transaction Processing System Features
There are several features involved in a good transaction processing system. A few of these critical
features are described below.
l Performance: The concept behind the use of TPS is to efficiently generate timely results for
transactions. Effectiveness is based on the number of transactions they can process at a particular
time.
l Continuous availability: The transaction processing system should be a very stable and reliable
system that must not crash easily. Disruption of TPS in an organization can lead to work disturbance
and financial loss.
l Data integrity: The TPS must maintain the same method for all transactions processed, the system
must be designed to effectively protect data and overcome any hardware/ software issues.
l Ease of use: The TPS should be user-friendly in order to encourage the use and decrease errors
from inputting data. It should be structured in such a way that it makes it easy to understand as
well as guarding users against making errors during data-entry.
l Modular growth : The TPS hardware and software components should be able to be upgraded
individually without requiring a complete overhaul.
l Controlled processing: Only authorized personnel, staff members, or employees should be able
to access the system at a time.
Components of Transaction Processing System
Below are some of the components involved in a Transaction Processing System:
a. Inputs: These are source documents gotten from transactions which serve as inputs into the
computer’s accounting system examples are invoices, and customer orders.
b. Processing: This requires the breaking down of information provided by the inputs.
c. Storage: This is saved information in TPS memory, it may be in the form of ledgers.
d. Output: Any generated record may serve as the output.
Limitations of Transaction Processing Systems
l Managing operations with the Transaction Processing System can be complicated if the company
is not big enough to efficiently use the transaction processing system.
l Transaction Processing System needs both hardware and software components to efficiently
manage high data volume. This capacity makes TPSs susceptible to software security breaches
in the form of the virus and faulty hardware issues such as power outage can disrupt the whole
system.
341
PP-AIDA&CS Information Systems
342
Information Systems LESSON 12
provide an electronic means of organizing people, projects, and data. Business dates, appointments, notes,
and client contact information can be created, edited, stored, and retrieved. Additionally, automatic reminders
about crucial dates and appointments can be programmed.
Projects and tasks can be allocated, subdivided, and planned. All these actions can either be done individually
or for an entire group. Computerized systems that automate these office functions can dramatically increase
productivity and improve communication within an organization.
343
PP-AIDA&CS Information Systems
c. Integration : One of the biggest challenges that organizations face when attempting to automate their
processes is integrating various third-party software or apps. The office automation system should work
seamlessly with your other tools like email marketing and CRM system.
d. Managing tasks and deadlines: Task management is an important feature of office automation
solutions. For processes to run smoothly, employees must know what to do and when to do it. The
office automation system should allow to create and view pending tasks and deadlines, as well as
redistribute tasks as needed.
e. Access control and security: To protect the security of office systems, it is required to set access
privileges throughout the organization. Cloud-based solutions also offer advanced security features to
protect data from being compromised.
f. Communication: An important feature of any automation system is the ability to communicate
seamlessly. Stakeholders should have all the information they need to perform each task, as well as
the ability to reach out to others for further assistance.
The office automation system should offer features like a form builder. Form builders can be used to
capture data, display data from other systems, and even design approval screens for managers to
make decisions.
g. Reporting and analytics: To evaluate and improve the office automation system, access to data and
key performance indicators is required.
Fleet Management The fleet management system is an information system application that will assist
System the process of monitoring the logistics fleet and delivery of goods so that the tracking
process becomes more systematic and continues to be centralized. Usually, this
system responds to the detected location by using the help of GPS.
Integrated Service This student service system was created to facilitate student activities on campus
System for Students activities. One of the activities is to obtain results from academic activities in the form
of tests or other activities. In addition, the application of this information system can
also facilitate the registration of the desired courses each semester. Students do not
need to come directly to campus to carry out these activities. These students are
only enough to open the available applications.
344
Information Systems LESSON 12
Online Booking Next is the application of information systems in placing orders online. Reservations
that can be made online can be in the form of transportation tickets, concert tickets,
and hotels. Apart from these things, many other things can be ordered online, either
on a website or an application.
The way it works is also very easy, one only needs to choose what things they
want to order online. Later that person will get evidence in the form of a successful
booking. After the evidence is obtained, the person can immediately exchange the
existing ticket.
Enterprise Resource Also called ERP or management systems, they are systems that focus on the
Planning administration of the production and distribution of goods generated by a company,
and allow to keep track of sales, invoicing, shipments, and many other concepts
related to production. As a result of the information processing, the information issued
allows top management to make decisions that can positively affect a company.
This is an example of a company management information system that not many
ordinary people know about. This information system is widely used by several
companies because it facilitates their activities. Many large companies have used
this system.
This system functions in terms of monitoring or supervision of company management.
Furthermore, this system is also connected to the fields of work units in finance,
marketing, operations, and others. Things that used to take a long time can now be
done in a short time.
Artificial Intelligence One of these information systems was previously used by companies. Artificial
Intelligence or artificial intelligence greatly facilitates the transaction process in the
company. Seeing the sophistication of A.I, it is not surprising that many have applied
this to other places.
Perhaps the most widely heard and most often heard is that AI is applied to mobile
phones. The way this system works is to solve existing problems with the knowledge
of the experts who have been included in it. So, the system that is processed to
produce this information still comes from humans as well.
Video Call This is an information system where the application is on the cellphone. The way it
works is extraordinary, it is easy to just download an application that provides video
call facilities. Then just register via telephone number.
Currently, many applications provide video call facilities, even though these facilities
are already built-in on mobile phones. Usually, this video call facility is integrated
with a chat application that uses internet quota as a means. So, to make this video
call make sure you have an internet connection.
345
PP-AIDA&CS Information Systems
b. Geographic information systems. These systems model large amounts of information that enable
decision-making in fields such as environmental impact, urban planning, or cartography.
c. Banking systems. These systems allow the use of monetary transactions quickly between multiple
customers regardless of the physical location where they are located or even regardless of the bank of
which they are customers.
d. Communication systems. Here we can group all the systems that allow us to send and receive
information from our friends, colleagues, neighbors, and even people we do not even know physically.
A clear example of this type of system is social networks, instant messaging, or e-mail.
e. Content Management Systems. The so-called CMS allows us to create and manage content quickly
and to some extent easily, that is, it is not necessary to be a web programmer to create a complete
structure for a site. As an example, a CMS called Sharepoint hosts the institutional portal and its entire
structure of web pages.
f. Learning Management Systems. LMS is very similar to CMS, the difference is that they allow creating
of educational content and keeping track of a student, using activities ranging from publishing news or
events to discussion forums and evaluations that allow automatic grading of the student.
g. Streaming systems. YouTube, Spotify, or Netflix are mainly a source of entertainment, they provide a
continuous information flow (stream) to the customer and allow them to watch or listen to content from
the network.
346
Information Systems LESSON 12
The accuracy and completeness of the information are crucial to the functioning of an organization.
Focus on integrity to ensure that data is considered authentic and reliable and cannot be manipulated. It
should be noted that integrity is important in order to protect data in its use, not only in the management
of the organization but also in its use by other organizations and individuals.
LESSON ROUND-UP
l Information systems encapsulates the tools that organizations use to collect, manage, and analyze
data and encapsulates Hardware, Software, Data and Telecommunication Networks as its components.
l Implementation of Information System in the organisation can be in four ways i.e., Direct Cutover,
Parallel Operation, Phased Operation and Pilot Operation.
l Information System will induce innovation in business activities through its research and development.
It will also enable automation, reducing steps undertaken to complete a task.
l An executive information system is a management support system that facilitates and supports the
decision-making requirements of an organization’s senior executives. Hence, it is also called an
“executive support system.”
l Decision support systems are interactive software-based systems intended to help managers in
decision-making by accessing large volumes of information generated from various related information
systems involved in organizational business processes, such as office automation system, transaction
processing system, etc.
l A management information system is a computerized database of financial information organized and
programmed in such a way that it produces regular reports on operations for every level of management
in a company.
l Transaction processing is a style of computing, typically performed by large server computers, that
supports interactive applications. In transaction processing, work is divided into individual, indivisible
operations, called transactions.
l Office automation systems are configurations of networked computer hardware and software.
l ERP or management systems, are systems that focus on the administration of the production and
distribution of goods generated by a company, and allow to keep track of sales, invoicing, shipments,
and many other concepts related to production.
Three aspects for system security should be focuses on are Confidentiality, Integrity, and Availability.
Glossary
Telecommunications: Telecommunication is used to connect with the computer system or other devices to
disseminate information.
Executive Information System (EIS): It is a management support system that facilitates and supports the
decision-making requirements of an organization’s senior executives.
Model Management System: It stores and accesses models that managers use to make decisions. Such
models are used for designing manufacturing facility, analyzing the financial health of an organization,
forecasting demand of a product or service, etc.
347
PP-AIDA&CS Information Systems
Expert System: An expert system provides managers with insights and advice based on Artificial Intelligence
(AI).
Knowledge Management System (KMS): helps organizations facilitate the collection, recording, organization,
retrieval, and dissemination of knowledge.
Fleet Management System: The fleet management system is an information system application that will
assist the process of monitoring the logistics fleet and delivery of goods so that the tracking process becomes
more systematic and continues to be centralized.
Artificial Intelligence: Artificial Intelligence or artificial intelligence greatly facilitates the transaction process
in the company. Seeing the sophistication of A.I, it is not surprising that many have applied this to other
places.
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. What do you mean by Information System and How it can be implemented in small business?
2. Utilization of Information Systems in small-size and mid-size firms is minimal.” Justify the statement.
3. Information System does not only mean application of software. Elaborate the statement.
4. How information systems are benefiting businesses to perform more effectively and efficiently.
5. What are various types of Information Systems?
6. How Management Information System and Decision Support System are interrelated?
7. Transactions are easy to process through information systems. Justify the statement.
8. Office automation system comes with numerous of features. Briefly enumerate such features.
9. All 5 types of Information Systems are inter-related and inter-connected. Explain such inter-relatedness
amongst all Information Systems in your own words.
10. Write a note on application of Management Information System in Small Business.
348
Management Information Lesson
Systems – An Overview 13
KEY CONCEPTS
n Management n Information n System n Management Information System n Expert System n Decision Support
System n Transaction Process System n Management Support System n Office Automation System
Learning Objectives
To understand:
The meaning of Management Information System
Components of Management Information System
Utilization of Management Information System in Indian Business World
Management Information System and its relation with other Information Systems
Management Information System and its Application in Different Spheres of Business
Lesson Outline
Definition of Management Information System
Components of Management Information System
Utilization of Management Information System in Indian Business World
Management Information System and Its relation with other Information Systems
Application of Management Information System
Management Information System and Security
Lesson Round-Up
Glossary
Test Yourself
349
PP-AIDA&CS Management Information Systems – An Overview
Introduction
Management Information Systems (MIS) is the study of people, technology, organizations, and the relationships
among them. MIS is a people-oriented field with an emphasis on service through technology. The system
gathers data from the internal and external sources of an organisation.
One of the most important tools which aims to provide reliable, complete, accessible and understandable
information to managers for effective decisions making and improving business performance is Management
information system. The use of management information systems has become necessary for every organization
to facilitate the work procedures and improve efficiency and productivity and improve performance in general.
Moreover the importance of management information systems comes from the benefits that generated by
that system such providing useful information in a timely manner, improved labor productivity, cost savings,
providing the information without any delays and mistakes, and improved the management of work.
A formal method of collecting timely information in a presentable form in order to facilitate effective decision
making and implementation, in order to carryout organisational operations for the purpose of achieving the
organisational goals.” – Walter I. Kennevan
“Management information system is a computer-based information system that provides for management-
oriented reporting based on transaction processing and business operations of the organization.”
– Nowduri & Al-Dossary
A Management Information System is an acronym of three words, viz., Management, Information, System.
1. Management: Management is the art of getting things done through and with the people in formally
organised groups.
2. Information: Information is data that is processed and is presented in a form which assists decision
making.it may contain an element of surprise, reduce uncertainty, or provoke a manager to initiate an
action.
Data usually take the form of historical records. In contrast to information, raw data may not be able to
surprise us, may not be organised and may not add anything to our knowledge.
350
Management Information Systems – An Overview LESSON 13
3. System: The term system is the most loosely held term in management literature because of its use in
different contexts. However, a system may be defined as a set of elements which are joined together to
achieve a common objective. The elements are interrelated and interdependent.
351
PP-AIDA&CS Management Information Systems – An Overview
a. Data Capturing : MIS capture data from various internal and external sources of the organization. Data
capturing may be manual or through computer terminals.
b. Processing of Data: The captured data is processed to convert into the required information. Processing
of data is done by such activities as calculating, sorting, classifying, and summarizing.
c. Storage of Information: MIS stores the processed or unprocessed data for future use. If any information
is not immediately required, it is saved as an organization record, for later use.
d. Retrieval of Information: MIS retrieves information from its stores as and when required by various
users.
a. System approach: The management information system follows a System approach. The system’s
approach implies a holistic approach to the study of the system and its performance to achieve the
objective for which it has stood formed.
b. Management-oriented: For designing MIS top-down approach should follow. The top-down approach
suggests that system development starts from the determination of the management needs and overall
business objectives. Management-oriented characteristic of MIS also implies that the management
actively directs the system development efforts.
c. Need-based: The design of the MIS should be as per the requirements of managers at different levels
that are strategic planning level, management control level, and operational control level.
d. Exception-based: MIS should develop with the exception-based reporting principle. This means an
abnormal situation, that is the maximum, minimum or expected values vary beyond the limits. In such
cases, there should be exceptions reporting to the decision-maker at the required level.
e. Future-oriented: Besides exception-based reporting, MIS should also look at the future. In other words,
MIS should not merely provide past or historical information. Rather it should provide information based
on projections based on which actions may initiate.
f. Integrated: Integration means taking a comprehensive view of the subsystems that operate within the
company and it is significant because of its ability to produce more meaningful information.
g. Common data flows: Because of the integration concept of MIS, there is an opportunity to avoid
duplication and redundancy in data gathering, storage, and dissemination. System designers are aware
that a few key source documents account for much of the information flow. For example, customer’s
orders are the basis for billing the customer for the goods ordered, setting up accounts receivables,
initiating production activity, sales analysis, sales forecasting, etc.
352
Management Information Systems – An Overview LESSON 13
a) Increased Efficiency: One of the primary advantages of MIS is that it can help organizations become
more efficient. MIS systems automate many routine tasks, freeing up employees to focus on
higher-level tasks. This can save time and reduce errors, ultimately leading to cost savings for the
organization.
b) Improved Decision-Making: MIS systems provide organizations with real-time data and analytics, which
can help managers make more informed decisions. For example, an MIS system can provide data on
sales trends, inventory levels, and customer preferences, allowing managers to make decisions based
on facts rather than intuition.
c) Enhanced Communication: MIS systems can improve communication within an organization. For
example, an MIS system can provide a centralized platform for employees to share information,
collaborate on projects, and coordinate tasks. This can help teams work more effectively and achieve
their goals more efficiently.
d) Better Data Management: MIS systems can help organizations better manage their data. For example,
an MIS system can provide tools for data entry, storage, and retrieval. This can help ensure data is
accurate, up-to-date, and easily accessible when needed.
e) Competitive Advantage: MIS systems can provide organizations with a competitive advantage. By
using data and analytics to make informed decisions, organizations can become more efficient, more
responsive to customer needs, and better able to compete in the marketplace.
a) Costly Implementation: Implementing an MIS system can be costly for organizations. There may be
expenses related to purchasing software, hardware, and training employees to use the system. This
can be a significant investment for some organizations.
b) Technical Issues: MIS systems can experience technical issues, such as system crashes or data loss.
This can be frustrating for employees who rely on the system to do their jobs. Organizations may need
to invest in additional technical support to address these issues.
c) Security Risks: MIS systems can also pose security risks. If the system contains sensitive data, such as
customer information or financial records, it could be targeted by cybercriminals. Organizations need
to ensure that their systems are secure and take steps to protect against potential data breaches.
d) Dependence on Technology: MIS systems are dependent on technology, which means that if the system
goes down, employees may not be able to perform their job duties. This can lead to lost productivity
and revenue for the organization.
e) Potential for Human Error: MIS systems can be prone to human error. If employees enter incorrect data
or fail to update the system in a timely manner, it can lead to inaccurate data and decision-making. This
can be a significant issue for organizations that rely heavily on data to make informed decisions.
353
PP-AIDA&CS Management Information Systems – An Overview
b) Business Procedures: Business procedures are agreed upon best practices that guide the users and
all other components on how to work efficiently. Business procedures are developed by the people i.e.,
users, consultants, etc.
c) Data: Data encapsulated the recording of day-to-day business transactions. For example, for a bank,
data is collected from activities such as deposits, withdrawals, loans, credit cards etc.
d) Hardware: Hardware is made up of physical components like the CPU, printers, networking devices,
etc. The hardware provides the computing power for processing data. It also provides networking and
printing capabilities. The hardware speeds up the processing of data into information.
e) Software: Software are programs that run on the hardware. The software is broken down into two major
categories namely system software and applications software. System software refers to the operating
system i.e., Windows, Mac OS, and Ubuntu, etc. Applications software refers to specialized software for
accomplishing business tasks such as a payroll program, banking system, point of sale system, etc.
354
Management Information Systems – An Overview LESSON 13
355
PP-AIDA&CS Management Information Systems – An Overview
If more than one choice looks appealing, managers can use information system to run different
scenarios. For each possibility, the system can calculate key indicators such as sales, costs, and profits
to help them to determine which alternative gives the most beneficial result.
4. Company Record-Keeping: Company needs records of its activities for financial and regulatory
purposes as well as for finding the causes of problems and taking corrective action. The information
system stores documents and revision histories, communication records and operational data. The
trick to exploiting this recording capability is organizing the data and using the system to process and
present it as useful historical information. Users can use such information to prepare cost estimates and
forecasts and to analyze how your actions affected the key company indicators.
356
Management Information Systems – An Overview LESSON 13
information systems gives the data the managers need to determine whether the decisions have had
the desired effect, or whether decision maker must take corrective action to reach organisation’s goals.
If specific results are not on track, managers can use management information systems to evaluate the
situation and decide to take additional measures if necessary.
357
PP-AIDA&CS Management Information Systems – An Overview
A transaction processing system allows application programmers to concentrate on writing code that
supports the business, by shielding application programs from the details of transaction management
4. Management Support System: The Management Support System stores and organizes data, enabling
end users to generate reports and analyze data to address business needs and inform planning. A data
warehouse is an example of a Management Support System.
5. Office Automation System: Office automation systems (OAS) are configurations of networked computer
hardware and software. A variety of office automation systems are now applied to business and
communication functions that used to be performed manually or in multiple locations of a company,
such as preparing written communications and strategic planning.
358
Management Information Systems – An Overview LESSON 13
In the service industries, Management Information System (MIS) gives its prime focus on the services that are
needed to the people. Hence, a continuous monitoring should be done in order to understand the changes
occurring to the services demand based on level and scope.
A regular scrutiny should be done to understand what the customer perceives by good service. After that a
strategy should be adopted that will address the perception of good service to a customer. With the help of the
MIS, the management can provide services. of the highest level by understanding the needs that enhances the
communication, physical and human related processes to maintain this level.
Information systems are also used in the service sector for process automation in order to take competitive
advantages over the others. The information system that is being used differs from service to service. Some of
these services are listed below:
a. Hospital Information Systems : Hospital’s management provides distinctive services to a wide variety
of customers having different perceptions and expectations regarding the services. Discrimination
can be easily carried out by the customers regarding various aspects such as personal and medical
treatment (quality of caring and quality of care), effective and efficient service and service provided at
minimum cost. Customer mainly focuses on the result of the service and appraises the management on
the performance of service process.
So it is concluded that, “Hospital Information System (HIS) is a computerized system that regulates all
the medical and administrative information processing activities in order to achieve an efficient and
effective work performance by health professionals of a hospital.”
The hospital information system is also known as Integrated Hospital Information Processing System
(IHIPS) because it integrates various components like Clinical Information System (CIS), Financial
Information System (FIS), Laboratory Information System (LIS), Nursing Information System (NIS),
Pharmacy Information System (PIS), etc.
b. Hotel Information System: People generally take the service of the hotels when they are visiting some
other place and do not have a place to stay there. It is a place where a person can stay conveniently.
However, in the recent times there have been several changes in the concept of hotel due to several
causes. People always search for differentiated services in a hotel.
One of the common problems that are faced by the managers of hotels is regarding differentiated
service to the customers. The prime objective of any hotel is to offer a room with the basic facilities and
amenities to the customer and ensure that the stay is comfortable. The hotel gets a successful business
if the most of the rooms are occupied and the visitors take those services that can be billed separately.
The hotel business is said to perform well if its occupancy and turnover is high.
The Management Information System that is used in the hotels helps in understanding the expectations
and perceptions of the customers.
359
PP-AIDA&CS Management Information Systems – An Overview
360
Management Information Systems – An Overview LESSON 13
(iii) Management Theory vs. MIS: There were several management theories-Behavioral, Empirical,
Quantitative, Decision theory and Management process. Out of these, decision theory and management
process are the more relevant to MIS. According to decision theory, the most important task of
managers is to take decisions. Under the management process concept, management is defined as
what managers do. The knowledge of these theories enabled the MIS designers to ascertain the type
of decisions made and functions performed by executives in business organizations.
(iv) Information Technology vs. MIS: Computer science is used in information systems to provide accurate
and speedy information to the managers. Information technology facilitated the growth of MIS. It is
important because it covers topics such as algorithms, computation software, and data structures.
Today, computer has a major role in data processing. So, computer technology has been considered a
major factor for MIS development.
LESSON ROUND-UP
l Management Information Systems (MIS) is the study of people, technology, organizations, and
the relationships among them. MIS is a people-oriented field with an emphasis on service through
technology.
l The management information system follows a System approach. The system’s approach implies a
holistic approach to the study of the system and its performance to achieve the objective for which it
has stood formed.
l Management Information System (MIS) can improve communication within an organization. For example,
an MIS system can provide a centralized platform for employees to share information, collaborate on
projects, and coordinate tasks. This can help teams work more effectively and achieve their goals
more efficiently.
361
PP-AIDA&CS Management Information Systems – An Overview
l A management information system is made up of five major components namely people, business
processes, data, hardware, and software.
l Information systems can offer more complete and more recent information, allowing managers to
operate the company more efficiently, one can use information systems to gain a cost advantage over
competitors or to differentiate itself by offering better customer service.
l Management information systems gives the data the managers need to determine whether the
decisions have had the desired effect, or whether decision maker must take corrective action to reach
organisation’s goals.
l The Management Support System stores and organizes data, enabling end users to generate reports
and analyze data to address business needs and inform planning. A data warehouse is an example of
a Management Support System.
l A Management Information Systems supports various levels of management (individual and group),
from top managers to lower managers and supports all decision process level and various styles of
deciding.
l In the service industries, Management Information System (MIS) gives its prime focus on the services
that are needed to the people. Hence, a continuous monitoring should be done in order to understand
the changes occurring to the services demand based on level and scope.
Glossary
System: The term system is the most loosely held term in management literature because of its use in
different contexts. However, a system may be defined as a set of elements which are joined together to
achieve a common objective. The elements are interrelated and interdependent.
Information: Information is data that is processed and is presented in a form which assists decision making.
it may contain an element of surprise, reduce uncertainty, or provoke a manager to initiate an action.
People: People are the users who use the information system to record the day-to-day business transactions.
The users are usually qualified professionals such as accountants, human resource managers, etc. The ICT
department usually has the support staff who ensure that the system is running properly.
Business Procedures: Business procedures are agreed upon best practices that guide the users and all
other components on how to work efficiently. Business procedures are developed by the people i.e., users,
consultants, etc.
System software: It refers to the operating system i.e., Windows, Mac OS, and Ubuntu, etc.
Applications software: It refers to specialized software for accomplishing business tasks such as a payroll
program, banking system, point of sale system, etc.
Operations Research: It is the use of scientific methods and quantitative analysis to solve the problems of
management. It has a significant relationship with MIS since it has developed procedures for analysis and
computer- based solutions to decision problems.
362
Management Information Systems – An Overview LESSON 13
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. What do you understand by Management Information System? Write a brief note.
2. What are important components of Management Information System? Discuss in detail.
3. “Role of Management Information System in organisation in manifold.” Comment on Statement with
example.
4. Despite of many advantages, management information system does suffer from various limitations.
Write briefly upon the limitations of management information system.
5. How management information system and executive information system differ from each other?
6. “Management Information System and other Information System compliments each other in effective
decision making.” Comment on Statement with appropriate example.
7. “Management Information System is vital for small & mid-size firms as well.” Discuss.
8. Explain the relationship between management information system and other academic disciplines.
9. How the concept of Management Information System got evolved. Also explain MIS evolution in
relation to computer technology.
10. How management information system is helping service sector to maximise customer satisfaction?
363
PP-AIDA&CS Management Information Systems – An Overview
364
Lesson
Enterprise Resource Management
14
KEY CONCEPTS
n Enterprise Resource Planning n Mobile ERP n Cloud ERP n Predictive Analytics
Learning Objectives
To understand:
The concept and meaning of Enterprise Resource Planning
The advantages and disadvantages of Enterprise Resource Planning
The functioning of an ERP system
How to analyse the Before ERP and after ERP position of organisations
The different types of ERP system modules
The ERP related technologies
The planning, evaluation and selection of ERP systems
An overview of the recent trends in ERP
Lesson Outline
Enterprise Resource Management: Introduction
Understanding Enterprise Resource Planning
Significance of ERP
How ERP works
Before ERP and After ERP
Benefits of ERP
Limitations of ERP
ERP related Technologies
Types of ERP system modules
Planning Evaluation and Selection of ERP systems
Recent trends in ERP: 2023
Lesson Round-Up
Test Yourself
List of Further Readings
List of Other References
365
PP-AIDA&CS Enterprise Resource Management
Enterprise Resource Planning (ERP) is business process management software that allows an organization
to use a system of integrated applications to manage the business and automate many back-office functions
related to technology, services and human resources.
Source: https://www.stampli.com/blog/accounting/erp-modules-integrations/
ERP software typically integrates all facets of an operation — including product planning, development,
manufacturing, sales and marketing — in a single database, application and user interface.
An ERP software system can also integrate planning, purchasing inventory, sales, marketing, finance, human
resources, and more.
Key Takeaways
l ERP software can integrate all of the processes needed to run a company.
l ERP solutions have evolved over the years, and many are now typically web-based applications that
users can access remotely.
366
Enterprise Resource Management LESSON 14
l Some benefits of ERP include the free flow of communication between business areas, a single source
of information, and accurate, real-time data reporting.
l There are hundreds of ERP applications a company can choose from, and most can be
customized.
Significance of ERP
ERP applications also allow the different departments to communicate and share information more easily with
the rest of the company. It collects information about the activity and state of different divisions, making this
information available to other parts of the company, where it can be used productively.
ERP applications can help a corporation become more self-aware by linking information about production,
finance, distribution, and human resources together. Because it connects different technologies used by each
part of a business, an ERP application can eliminate costly duplicates and incompatible technology. The
process often integrates accounts payable, stock control systems, order-monitoring systems, and customer
databases into one system.
Businesses select the applications they want to use. Then, the hosting company loads the applications onto
the server the client is renting, and both parties begin working to integrate the client’s processes and data into
the platform.
Once all departments are tied into the system, all data is collected on the server and becomes instantly
available to those with permission to use it. Reports can be generated with metrics, graphs, or other visuals and
aids a client might need to determine how the business and its departments are performing.
367
PP-AIDA&CS Enterprise Resource Management
Before ERP:
Human resource
Manufacturing
Material Logisc
management management
Maintenance
Quality management
management
Human resource
Manufacturing
An ERP
Material Logisc
System
management management
Maintenance
Quality management
management
368
Enterprise Resource Management LESSON 14
After introduction of ERP system, databases of different departments are managed by one system called ERP
system. It keeps tracks of all the database within system. In this scenario, employee of one department have
information regarding the other departments.
In a nutshell, Enterprise Resource Planning software tries to integrate all the different departments
and functions of an organization into a single computer system to serve the needs of different
departments.
The task at hand, of implementing one software program that looks after the needs of the Finance
Department together with the needs of the Human Resource Department and the Warehouse, seems
impossible. These different departments usually have an individual software program that is optimized in
the way each department works.
However, if installed correctly this integrated approach can be very cost effective for an organization. With
an integrated solution, different departments can easily share information and communicate with one
another.
The following diagram illustrates the differences between non-integrated systems versus an integrated
system for enterprise resource planning.
Financial Applicaon
Accounng Database
Manufacturing Applicaon
Materials Database
369
PP-AIDA&CS Enterprise Resource Management
Markeng &
Sales Financial
Applicaons Applicaon
Markeng
Resources Planning,
Accounng, Finance,
Manufacturing, Human
Resources, Sales,
Suppliers,
Customers
Human
Manufacturing
Resources
Applicaon
Applicaon
Source: https://www.tutorialspoint.com/management_concepts/enterprise_resource_planning.htm#
l Improves Accuracy and Productivity: Integrating and automating business processes eliminates
redundancies and improves accuracy and productivity. In addition, departments with interconnected
processes can synchronize work to achieve faster and better outcomes.
l Improves Reporting: Some businesses benefit from enhanced real-time data reporting from a single
source system. Accurate and complete reporting help companies adequately plan, budget, forecast, and
communicate the state of operations to the organization and interested parties, such as shareholders.
l Increases Efficiency: ERPs allow businesses to quickly access needed information for clients, vendors,
and business partners. This contributes to improved customer and employee satisfaction, quicker
response rates, and increased accuracy rates. In addition, associated costs often decrease as the
company operates more efficiently.
l Increases Collaboration: Departments are better able to collaborate and share knowledge; a newly
synergized workforce can improve productivity and employee satisfaction as employees are better
able to see how each functional group contributes to the mission and vision of the company. Also,
menial and manual tasks are eliminated, allowing employees to allocate their time to more meaningful
work.
l Competition: It’s true that ERP software requires a major investment, but this cost of investment is
nothing as compared to the bigger cost in not making the investment. While some manufacturers choose
to stick to the tried-and-tested methods of the past, others seek technology solutions. Manufacturers
cannot afford to put off an ERP implementation while their competition invests in ERP and starts reaping
the many benefits that ERP offers.
l Forecasting: Enterprise resource planning software gives users, and especially managers, the tools
they need to create more accurate forecasts. Since the information within ERP is as accurate as possible,
businesses can make realistic estimates and more effective forecasts.
l Collaboration: Nobody wants to run a siloed business with each department functioning separate from
the other. Collaboration between departments is a crucial and often necessary part of the business.
370
Enterprise Resource Management LESSON 14
With the data entered into ERP systems being centralized and consistent, there’s no reason why
departments cannot work together. The software also touches on almost every aspect of a business,
thus naturally encouraging collaborative, interdepartmental efforts.
l Regulatory Compliance: A benefit of ERP software which sometimes goes unnoticed is how it ties well
into regulatory compliance in the manufacturing industry. Powerful ERP solutions will keep track of
regulations within the industry and monitor changes in compliance.
l Flexibility: Modern ERP software systems are robust, flexible, and configurable. They are not a one
size-fits-all proposition but can be tailored to the unique needs of a business. ERP systems also can
adapt to the ever-changing needs of a growing business, ensuring you won’t have to buy a new solution
once your needs change or your business grows.
l Customer Service: It’s easier to provide high-quality customer service using an enterprise solution,
especially when you’re using one as well-equipped as Work Wise ERP. Sales and customer service
people can interact with customers better and improve relationships with them through faster, more
accurate access to customers’ information and history. ERP also facilitates access to marketing
automation and contact center software, ensuring consistent and simultaneous customers interaction.
l Security: ERP systems can help in protection of data. In an ERP system, data is spread across multiple
systems with varying levels of security. This is coupled with built-in resources and firewalls, thereby
increasing the level of protection and also safeguarding against a single point of failure. ERP system
will improve the accuracy, consistency, and security of data, which becomes increasingly important if
the company deals with a lot of sensitive data and information.
371
PP-AIDA&CS Enterprise Resource Management
l Dependence on vendor support: Organizations that use ERP systems are often heavily dependent on
the vendor for support, maintenance, and upgrades. This can create a risk of vendor lock-in and limit an
organization’s ability to switch to other systems or providers.
Note: API or Application Programming Interface, is defined as an interface which enables two applications
to interact, communicate and exchange data with each other without any user intervention.
372
Enterprise Resource Management LESSON 14
During the manufacturing process, the module updates the status of goods-in-progress and tracks actual
production output against forecasts. It can also provide real-time status of the shop floor by capturing
information on the production process and finished goods. The manufacturing module can assist in
planning adequate production by calculating the average time to produce an item and then comparing
supply with demand forecasts.
l Inventory Management: The inventory control module tracks item quantities and locations down to
individual Stock Keeping Units to provide a complete picture of current and incoming inventory (when
combined with the procurement module). This module helps manage inventory costs by ensuring sufficient
stock without tying up cash in excess inventory. It can also analyze sales trends and compare them
to available inventories to help the business make informed decisions to increase inventory turn, boost
margins, and prevent stockouts and delays.
l Warehouse Management: The warehouse management module guides warehouse employees through
processes, including put away when shipments arrive, picking, packing, and shipping. The module
can help businesses plan labor based on forecasted order volume and support picking strategies to
maximize employee productivity. The warehouse management module is often integrated with inventory
management and order management modules to expedite shipping and increase customer satisfaction.
l Order Management: The order management module manages customer orders. After a customer place
an order, this module transmits it to the warehouse, distribution center, or retail location and tracks the
order status as the order is being prepared, fulfilled, and shipped. This boosts the rate of on-time deliveries
and prevents orders from being lost, improving customer satisfaction and reducing expediting costs.
l Supply Chain Management (SCM): The supply chain module tracks the movement of supplies and
goods across the global supply chain. It can provide visibility to every step of the supply chain, from sub-
suppliers and suppliers through manufacturers to shippers, distributors, and end customers or retailers.
These complex modules can be tightly integrated with other related modules such as procurement,
inventory management, and manufacturing. They can also include functionality to manage logistics, trade
regulations, and payments.
l Customer Relationship Management (CRM): The CRM module stores customer and lead information
such as communications history (dates and times of contact), purchase history, and key personnel needed
to manage sales leads. The CRM module improves customer service because employees can access
customer information while working with a customer. Some CRM modules can also perform analytics and
suggest which customers you should target for sales opportunities such as promotions, upselling, or cross-
selling.
Note: Upselling is a sales technique that encourages customers to spend more money by purchasing
an upgraded or premium version of the product they originally intended to buy.
Cross-selling is a sales technique that is used to increase income by persuading the buyer to buy
complementary/ancillary products, in addition to their original order.
l Human Resource Management (HRM): The human resource management, or human capital management
module, helps manage the company’s workforce. It stores and maintains employee records and documents
such as contracts, job descriptions, offer letters, and performance reviews. It also tracks employee hours
and vacation time, paid time off or sick days, and employee benefits information.
The HRM module may also include a Workforce Management Module that is designed to manage hourly
employees. It monitors employee attendance and time and can track and measure productivity and
absenteeism.
373
PP-AIDA&CS Enterprise Resource Management
l Other Functional Modules: Some ERP systems may offer additional modules to manage specific business
processes. These modules often include:
Professional Services Automation: Automates and optimizes planning and project management,
tracking project status and managing human and capital resources.
Ecommerce: This module allows companies to launch online B2B or B2C e-commerce websites
to enable a business to sell goods and services online. Integration of this module within the
ERP system ensures that all payment, order and inventory information is transferred from the
ecommerce module into the shared database, which further that ensures all transactions are
added to the ledger, out-of-stock items are removed from the site and orders ship on time.
Marketing Automation: Automatically manages marketing campaigns across digital channels and
provides reports and analytics to increase leads and conversions.
Technical Modules of ERP Systems: Technical modules provide added functionality to the ERP
system to facilitate integration across modules and application suites. Common technical modules
include
Security Module: Controls access to the ERP system, manages firewalls and encryption to protect
data.
Networking and Interface: Ensures data flow between the different modules and parts of the ERP
system.
Management Information System: Provides managers with the information and analytical tools
they need to make informed decisions.
Application Programming: Allows businesses to create custom code to extend the functionality of
the ERP system.
APIs for External Use: Allows the integration of third-party applications with the ERP software and
facilitates data synchronization.
1. Reproduced from Digital Notes on Enterprise Resource Planning, Department of Mechanical Engineering, Malla Reddy College of
Engineering and Technology.
374
Enterprise Resource Management LESSON 14
Therefore, research carried out by Management Agility Inc, (2005), revealed that it is imperative to adopt
a thorough evaluation process before adopting any ERP solution in SMEs, i.e. Small and Medium Sized
Enterprise.
1. Planning
2. Request For Proposal (RFP)
3. Solution Evaluation
4. Negotiation
5. Selection and Agreement
6. Define Requirements
7. Shop Round for Product
8. Clarify Requirements
9. Evaluation Vendor Inquiry
10. Interact with Vendors
11. Negotiate Agreement
12. Action Agreement.
l Define business case/need and spell-out required values. Be specific. Ensure the business sponsor
is willing to push through business case for change.
l Look round the market for what product is available. Identify vendors that operate and their general
approaches to technologies. Discuss with others in the same industry as you are etc.
l Clarify your requirements and be sure of whether what you are looking for is in line with your
business case. Refine requirements if possible and be specific too.
l Find out what product is looking promising in line with the business need and from which vendor.
Identify which vendor and their products suits the requirements and invite interesting ones for demo
etc. Request for proposal (RFP).
l Invite each shortlisted vendor over for a chat and find out more about the product. List out expectations
based heavily on business requirements.
l At this point evaluate the following approach. Can you afford to change your current process? Can
you afford the change the new product will bring ?
l Initiate Negotiation for the selected product with the selected vendor. Agree on who does what,
when are they to be done. Negotiate deliverables, timelines, cost & payments schedules and terms,
support inclusive.
l Review all legal terms, finalise the contract and select product for onward implementation.
l Alignment of business requirement to what the software/hardware can provide. This is the core of
the whole exercise else stop the evaluation.
l Evaluate the product capabilities in line with the business requirement. Evaluate the impact of the
product on the business requirement.
375
PP-AIDA&CS Enterprise Resource Management
2. Luthar David (2023) 8 ERP Trends for 2023, Oracle Netsuite. Available at https://www.netsuite.com/portal/resource/articles/erp/erp-
trends.shtml
376
Enterprise Resource Management LESSON 14
from anywhere with an internet connection—they don’t need to be in an office. Some CFOs looking
to cut costs amid the economic uncertainty are actually increasing investment in cloud ERP to drive
savings and better support their remote workforce. A 2020 survey of finance executives indicated that
20% expect to spend more on cloud ERP technologies.
2. Two-Tier ERP: Historically, many companies tried to deploy a single ERP system for both the
headquarters and all regional offices and subsidiaries. But in practice, that approach was often costly
and extremely challenging to implement; subsidiaries often had specialized requirements which didn’t
need the full functionality of the corporate system and struggled with the one-size-fits-all approach.
That’s why two-tier ERP is one of the top ERP trends in 2023. Two-tier ERP is a strategy that enables
organizations to leverage their investment in existing ERP systems at the corporate level (tier 1), while
subsidiaries and divisions operate using a different ERP solution (tier 2), which is often cloud-based.
Larger companies may continue to use their core ERP system for financials and other core processes,
while smaller business units turn to solutions that address their specialized needs. The effectiveness
of this approach depends in part on the ability to exchange data between the tiers—some tier 2 cloud
solutions include built-in capabilities for integration with corporate ERP systems.
There are a number of benefits to this approach. It’s often less costly than retrofitting the corporate
ERP system to work for the entire business. A tier 2 solution may be simpler to implement and provide
subsidiaries with more flexibility to respond to changing business conditions. In addition, the two-
tiered approach may be better suited for organizations in high-growth mode. As Gartner puts it, large
organizations should “assess whether a two-tier ERP strategy would offer more business benefit than a
single-tier one, especially by modernizing small, potentially fast-growing business units.”
3. Digital Transformation: Digital transformation refers to integrating digital technology into all business
functions to improve daily operations. This approach can often boost revenue and competitiveness
while increasing employee productivity and improving customer service and communication.
Since an ERP suite typically touches most areas of a company, it’s a logical place to start to facilitate
this transformation. Indeed, Accenture’s 2020 ERP Trends Report found that three-quarters of U.K.
businesses are using cloud ERP as a gateway to modernization. Several of the trends highlighted
below—including the integration of ERP with IoT devices and the adoption of AI and advanced
analytics—can be considered part of this digital transformation.
4. Other Technology Integrated With ERP: While modern ERP is the main element in a company’s digital
transformation, it is only part of a bigger investment in technology. Companies are integrating their
business applications with other new technologies, including IoT, to improve core processes. For
example, retailers use warehouse management systems that collect data from mobile scanners and
smart conveyers to track the movement of goods within the warehouse. Some companies integrate ERP
with ecommerce to improve online order workflows, automatically triggering order fulfillment, updating
inventory levels and recording payment.
The year ahead will also see a greater connection between social media and ERP. By seeing the social
media activity of customers and prospects in one place, companies can develop a more complete
understanding of their audience that allows them to enhance their digital marketing strategies and the
customer experience. By integrating data from social media interactions with sales order history and
communication with customers, companies can gain more insights about the entire sales process and
experiment with new ways to target and sell.
5. Personalization: Historically, ERP platforms with complex scripting languages were difficult to customize
to the specialized needs of each business. But organizations can now take advantage of cloud ERP
377
PP-AIDA&CS Enterprise Resource Management
platforms designed for easier configuration, or what analysts call “low-code” platforms. There’s also a
growing range of ERP solutions tailored to suit the needs of specific industries.
As companies focus on delivering more personalized, relevant experiences to customers, they need
ERP systems that can accommodate those needs with features like highly customizable dashboards.
One emerging trend is the growing popularity of AI-based assistive and conversational user interfaces
such as chatbots, which can interpret user voice or text input and respond to questions using customer
and order information stored within the ERP.
6. AI-Powered Insights and Improvements: Artificial intelligence and machine learning capabilities
embedded into ERP systems work behind the scenes to help meet increased demand for personalization
and improve a broad range of business processes. While companies could add AI functionality to some
ERP systems in the past, more vendors now offer ERP software having built-in AI capabilities.
l More insights. As organizations gather more operational and customer data than ever before, they
look to AI to deliver valuable business insights based on that information. AI technologies scan
vast amounts of unstructured information, quickly identify patterns and predict various trends that
wouldn’t be possible to spot with manual number crunching alone.
l Improved processes. AI helps to automate and improve a whole range of processes. For example,
consider a manufacturer that adopts a just-in-time inventory strategy, which aims to deliver
components at the last possible moment to minimize inventory carrying costs. AI, in the form of
machine learning, can optimize the supply delivery and labor schedules to increase productivity
and lower costs. IFS’s 2019 study found that 40% of manufacturers planned to implement AI
for inventory planning and logistics, and 36% intended to use it for production scheduling and
customer relationship management.
7. Predictive Analytics: The hunger for AI-infused ERP highlights organizations’ increasing desire to mine
their operational and customer data for new and relevant insights that will increase the top and bottom
lines.
While it’s always been possible to analyze ERP data to reveal what happened in a business’s past,
the focus lately has been on using predictive analytics to uncover and address what is likely to
happen in the future. For example, software with machine learning capabilities can comb through
a maintenance company’s data about machine repairs to predict when breakdowns are likely to
occur. The organization can optimize maintenance schedules so it services or replaces parts right
before they cause problems.
8. Mobile ERP: ERP providers have offered mobile support for some time, and mobile apps are increasingly
becoming the norm. ERP solutions are evolving to provide on-the-go access to critical business data,
allowing employees to conduct both back-end and front-end tasks no matter where they are, from the
warehouse floor to a retail checkout terminal to an airport. Mobile ERP can also encourage collaboration
for dispersed workforces in different time zones.
Mobile ERP apps designed with a user-friendly interface can help users get work done when they’re
not in front of a computer. Employees can complete tasks like expense reporting, call logging and time
tracking, and they can view the status of critical workflows or approvals from their phones. Mobile ERP
offers real-time data and insights and provides overall benefits including always-on remote access,
improved productivity, faster and more accurate data capture and increased agility.
378
Enterprise Resource Management LESSON 14
LESSON ROUND-UP
l Enterprise Resource Planning (“ERP”) is a platform companies use to manage and integrate the
essential parts of their businesses.
l Enterprise resource planning (ERP) is business process management software that allows an
organization to use a system of integrated applications to manage the business and automate many
back-office functions related to technology, services and human resources.
l ERP software can integrate all of the processes needed to run a company.
l ERP solutions have evolved over the years, and many are now typically web-based applications that
users can access remotely.
l Some benefits of ERP include the free flow of communication between business areas, a single source
of information, and accurate, real-time data reporting.
l There are hundreds of ERP applications a company can choose from, and most can be customized.
l An ERP system can be ineffective if a company does not implement it carefully.
l ERP applications also allow the different departments to communicate and share information more
easily with the rest of the company.
l ERP applications can help a corporation become more self-aware by linking information about
production, finance, distribution, and human resources together.
l ERP has evolved over the years from traditional software models that made use of physical client
servers and manual entry systems to cloud-based software with remote, web-based access.
l The platform is generally maintained by the company that created it, with client companies renting
services provided by the platform.
l There are many advantages to implementing an Enterprise Resource Planning (ERP) software solution.
l Among countless other advantages, implementing ERP software can improve productivity, increase
efficiencies, decrease costs and streamline processes. Businesses employ enterprise resource
planning (ERP) for various reasons, such as expanding, reducing costs, and improving operations.
l In a real life, enterprise resource planning solutions consist of dozens of connected applications,
databases, modules, APIs etc.
l Each ERP software module is designed to fit a specific business function by automating and supporting
key processes and sharing business data that will help employees do their work.
l ERP software module can be designed to support best practices and standards for the function they
are supporting. For example, a finance and accounting module can provide built-in financial controls
and support for income tax laws compliance.
l A successful ERP project requires selecting an ERP solution, implement the solution, manage changes
and examine the practicality of the system.
l Most enterprises often jump into looking at ERP functions and features rather than examining the
strategy and business processes.
l Evaluating and selecting an ERP system can be a very complex process on the other hand, but it
should be a ‘fact-based’ process that will bring the enterprise to the point where comfortable & well-
informed decisions can be made.
379
PP-AIDA&CS Enterprise Resource Management
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. Write detailed note on ERP.
2. What are the advantages and disadvantages of ERP system? Discuss briefly.
3. What are future trends in ERP systems? Discuss any 4 in detail.
4. Write Case Study on Before ERP and After ERP Scenario of an organization.
5. Write a short note on ERP System Modules.
l Alexis Leon, “ERP Demystified”, Tata McGraw Hill, New Delhi, 2000
l Digital Notes on Enterprise Resource Planning, Department of Mechanical Engineering, Malla Reddy
College of Engineering and Technology. Available at https://mrcet.com/downloads/digital_notes/ME/
III%20year/ERP%20Complete%20Digital%20notes.pdf
l Jagan Nathan Vaman, ERP in Practice, Tata McGraw-Hill, 2008
l Alexis Leon, Enterprise Resource Planning, second edition, Tata McGraw-Hill, 2008
l ERP Modules and Integrations: Our Complete Field Guide, Stampli. Available at https://www.stampli.
com/blog/accounting/erp-modules-integrations/
l Enterprise Resource Planning (ERP), Tutorial Point. Available at https://www.tutorialspoint.com/
management_concepts/enterprise_resource_planning.htm#
l Joseph A Brady, Ellen F Monk, Bret Wagner, “Concepts in Enterprise Resource Planning”, Thompson
Course Technology, USA, 2001
l Kawal, Introduction to ERP, Geeksforgeeks. Available at https://www.geeksforgeeks.org/introduction-
to-erp/
l Vinod Kumar Grag and N.K. Venkitakrishnan, ERP- Concepts and Practice, Prentice Hall of India, 2nd
edition, 2006.
380
Lesson
Internet and Other Technologies
15
KEY CONCEPTS
nInternet n Internet Protocols n E-commerce n Supply Chain Management (SCM) n Customer Relationship
Management (CRM) n Payment Portals n Digital Currencies n M-Commerce n Bluetooth and Wi-Fi
Learning Objectives
To understand: The Customer Relationship Management
The concept of internet and internet The concepts of EFT and EDI
technologies About digital currencies and its various types
The different types of internet protocols The Block Chain Technology
The working of internet protocols The Payment Portal
About e-commerce and its stages of The concept of Mobile Commerce and its
development various types
The benefits and limitations associated with The difference between M-Commerce vs.
e-commerce E-Commerce
About Supply Chain Management The Future of Mobile Commerce
The distinction between Bluetooth and Wi-Fi
Lesson Outline
Internet Types of Digital Currencies
Applications of Internet Advantages and Disadvantages of Digital
Currencies
Major Types of Internet Application
Block Chain Technology
Internet Protocols
Transaction Process of Block Chain
Working of Internet Protocols Technology
Need of Protocols Payment Portal
Types of Internet Protocols E-Commerce Security- Mobile Commerce
E-commerce and its development Types of M-Commerce
Benefits and Limitations of E-Commerce Working of Mobile Commerce
Types of E-Commerce M-Commerce vs. E-Commerce
Supply Chain Management (SCM) Future of Mobile Commerce
Customer Relationship Management (CRM) Bluetooth and Wi-Fi
Electronic Data Interchange (EDI) Lesson Round-Up
Electronic Fund Transfers (EFT) Test Yourself
List of Further Readings
Major Features of Electronic Funds Transfer
List of Other References
Digital Currency
381
PP-AIDA&CS Internet and Other Technologies
In 1969, the Government of the United States of America used the internet as a network that could continue
to be functional even if some nods were destroyed, as long as information could pass through other nodes.1
At that point of time, the purpose of the US government for using the internet was to create a net that could
enable a network for ensuring the continuous working and functioning of the military node.2 The purpose of
information and communication technology was to introduce and allow universal communication between users
of computer and other electronic devices with enabled network at a global platform.3 Over the years, internet
has become an imperative mode of transferring and sharing of information at a global platform, which in turn,
also impacts various segments of human life. Business and commercial activities are particularly impacted by
developments in information and tele-communication technologies. Hence, rapid developments in information
and tele-communication technology have substantially changed the shape of business organizations and given
shape to various new technologies, including fibre optics, electronic data exchange, e-commerce4 and many
more alike. Hence, this chapter aims to provide an overview of the Internet, its related technologies and other
contemporary technologies.
APPLICATIONS OF INTERNET
Applications that can function or can be used only when connected to the internet are called Internet applications.
In other words, it can also be said that such applications are made to run from the Internet itself.
Because all the data of internet applications is stored on their servers, if you want to use these applications then
you must have an internet connection. So that through the internet your request goes to the server and in return
you get information. You can also exchange your information through these applications.
In any case, you need internet service to use the internet application. Without internet service, you cannot
access the information of these applications.
Additionally, to use internet applications, you also need a digital device with an internet connection, only
then you can use those applications. Examples of digital devices include smartphones, tablet PCs, laptops,
desktops, etc.
1. The internet began as ARPAnet, a U.S. Department of Defense project to create a nationwide computer network that would continue to
function even if a large portion of it were destroyed in a nuclear war or natural disaster. (April 30, 2012), http://www.centerspan.org/tutorial/
net.htm.
2. U.S. Government used internet for the first time in its practical use with their defense project in 1969.
3 Anthony Giddens, Runaway World: The Reith Lectures Revisited Lecture 1: (1999). (April 30, 2012),
http://news.bbc.co.uk/hi/english/static/events/reith_99/.
4. J.-H. Wu and T.-L. Hisa, Analysis of E-Commerce Innovation and Impact of Hypercube Model, Electronic Commerce Research and
Applications, Vol. 3, 389–404 (2004).
5. See, https://cs.lmu.edu/~ray/notes/inetapps/.
382
Internet and Other Technologies LESSON 15
www.quicklearncomputer.com
l Communication
l Job Search
l Online Shopping
l Web Browsing
l Stock Market Updates
l Travel
l Research
l E-Commerce
l Online Payments
l Social Networking
l E-banking
l Education
l Entertainment
6. Reproduced Pandey Avinash (2022) 10 Applications of Internet. What is Internet Applications. Quick Learn Computers.
383
PP-AIDA&CS Internet and Other Technologies
INTERNET PROTOCOLS7
Internet Protocols are a set of rules that governs the communication and exchange of data over the internet.
Both the sender and receiver should follow the same protocols in order to communicate the data. In order to
understand it better, let’s take an example of a language. Any language has its own set of vocabulary and
grammar which we need to know if we want to communicate in that language. Similarly, over the internet,
whenever we access a website or exchange some data with another device, then these processes are governed
by a set of rules called the internet protocols.
Note: Hardware refers to all the physical components of the computer system, including the devices
connected to it.
Software refers to a set of instructions, data or programs used to operate computers and execute specific
tasks.
Need of Protocols
It may be that the sender and receiver of data are parts of different networks, located in different parts of the
world having different data transfer rates. So, we need protocols to manage the flow control of data, and access
control of the link being shared in the communication channel. Suppose, there is a sender ‘X’ who has a data
transmission rate of 10 Mbps. And, there is a receiver ‘Y’ who has a data receiving rate of 5Mbps. Since the rate
of receiving the data is slow, some data will be lost during transmission. In order to avoid this, receiver Y needs
to inform sender X about the speed mismatch so that sender X can adjust its transmission rate. Similarly, the
access control decides the node which will access the link shared in the communication channel at a particular
instant in time. If not, the transmitted data will collide if many computers send data simultaneously through the
same link resulting in the corruption or loss of data.
What is IP Address?
An IP address stands for Internet Protocol address. IP address is a unique address that identifies a device over
the network. It is almost like a set of rules governing the structure of data sent over the Internet or through a local
network. An IP address helps the Internet to distinguish between different routers, computers, and websites.
It serves as a specific machine identifier in a specific network and helps to improve visual communication
between source and destination.
384
Internet and Other Technologies LESSON 15
385
PP-AIDA&CS Internet and Other Technologies
6. HTTP (Hyper Text Transfer Protocol): This protocol is used to transfer hypertexts over the internet
and it is defined by the ‘www’ (world wide web) for information transfer. This protocol defines how the
information needs to be formatted and transmitted. And, it also defines the various actions the web
browsers should take in response to the calls made to access a particular web page. Whenever a user
opens their web browser, the user will indirectly use HTTP as this is the protocol which is used to share
text, images, and other multimedia files on the World Wide Web. 8
Note: WWW refers to the world wide web, which is a collection of different websites around the
world, containing different information shared via local servers (or computers).
7. HTTPS (Hyper Text Transfer Protocol Secure): HTTPS is an extension of the Hypertext Transfer
Protocol (HTTP). It is used for secure communication over a computer network with the SSL/TLS protocol
for encryption and authentication. So, generally, a website has an HTTP protocol but if the website is
such that it receives sensitive information such as credit card details, debit card details, OTP, etc. then
it additionally requires installation of an SSL certificate to make the website more secure. Therefore,
before entering any sensitive information on a website, we should check if the link is HTTPS or not. If it
is not HTTPS, then it may not be secure enough to share sensitive information.
8. TELNET (Terminal Network): TELNET is a standard TCP/IP protocol used for virtual terminal service,
provided by the International Organization for Standards (ISO). This enables one local machine to
connect with another. The computer which is being connected is called a remote computer and the
connecting computer is called the local computer. TELNET operation enables the user to display
anything being performed on the remote computer on the local computer. This operates on the client/
server principle. The local computer uses the TELNET client program whereas the remote computer
uses the TELNET server program.
9. POP3 (Post Office Protocol 3): POP3 stands for Post Office Protocol version 3. It has two Message
Access Agents (MAAs) where one is client MAA (Message Access Agent) and another is server MAA
(Message Access Agent) for accessing the messages from the mailbox. This protocol enables the user
to retrieve and manage emails from the mailbox on the receiver mail server to the receiver’s computer.
This is implied between the receiver and the receiver mail server. It can also be called a one-way client-
server protocol. The Pop3 works on two ports, i.e. Port 110 and Port 995.
10. IPv4: The fourth and initially widely used version of the Internet Protocol is called IPv4 (Internet Protocol
version 4). It is the most popular version of the Internet Protocol and is in charge of distributing data
packets throughout the network. Maximum unique addresses for IPv4 are 4,294,967,296 (232), which
are possible due to the use of 32-bit addresses. The network address and the host address are the
two components of each address. The host address identifies a particular device within the network,
whereas the network address identifies the network to which the host belongs. In the “dotted decimal”
notation, which is the standard for IPv4 addresses, each octet (8 bits) of the address is represented by
its decimal value and separated by a dot (e.g. 192.168.1.1).
11. IPv6: The most recent version of the Internet Protocol i.e. IPv6, was created to address the IPv4 protocol’s
drawbacks. A maximum of 4.3 billion unique addresses are possible with IPv4’s 32-bit addresses.
8. Note: Hypertext refers to the special format of the text that can contain links to other texts.
386
Internet and Other Technologies LESSON 15
On the contrary, IPv6 uses 128-bit addresses, which enable a significantly greater number of unique
addresses. This is significant because IPv4 addresses were running out and there are an increasing
number of devices that require internet access. Additionally, IPv6 offers enhanced security features like
integrated authentication and encryption as well as better support for mobile devices. IPv6 support has
spread among websites and internet service providers, and it is expected to gradually replace IPv4 as
the main internet protocol.
12. ICMP: ICMP (Internet Control Message Protocol) is a network protocol that is used to send error
messages and operational information about network conditions. It is an integral part of the Internet
Protocol (IP) suite and is used to help diagnose and troubleshoot issues with network connectivity.
ICMP messages are typically generated by network devices, such as routers, in response to errors
or exceptional conditions encountered in forwarding a datagram. Some examples of ICMP messages
include:
l Echo Request and Echo Reply (ping)
l Destination Unreachable
l Time Exceeded
l Redirect
ICMP can also be used by network management tools to test the reachability of a host and measure the
round-trip time for packets to travel from the source to the destination and back. It should be noted that
ICMP is not a secure protocol, it can be used in some types of network attacks like DDoS amplification.
13. UDP: UDP (User Datagram Protocol) a connectionless communication protocol for transporting packets
across networks. Unlike TCP, it does not establish a reliable connection between devices before
transmitting data, and it does not guarantee that data packets will be received in the order they were
sent or that they will be received at all. Instead, UDP simply sends packets of data to a destination
without any error checking or flow control. UDP is typically used for real-time applications such as
streaming video and audio, online gaming, and VoIP (Voice over Internet Protocol), i.e. a technology
that allows you to make voice calls using a broadband Internet connection instead of a regular (or
analog) phone line.
UDP is faster than TCP because it has less overhead. It does not need to establish a connection, so it
can send data packets immediately. It also does not need to wait for confirmation that the data was
received before sending more, so it can transmit data at a higher rate.
14. IMAP: IMAP (Internet Message Access Protocol) is a protocol used for retrieving emails from a mail
server. It allows users to access and manage their emails on the server, rather than downloading them
to a local device. This means that the user can access their emails from multiple devices and the emails
will be synced across all devices. IMAP is more flexible than POP3 (Post Office Protocol version 3) as it
allows users to access and organize their emails on the server, and also allows multiple users to access
the same mailbox.
15. SSH: SSH (Secure Shell) is a protocol used for secure remote login and other secure network services.
It provides a secure and encrypted way to remotely access and manage servers, network devices,
and other computer systems. SSH uses public-key cryptography to authenticate the user and encrypt
the data being transmitted, making it much more secure than traditional remote login protocols such
as Telnet. SSH also allows for secure file transfers using the SCP (Secure Copy) and SFTP (Secure File
Transfer Protocol) protocols. It is widely used in Unix-based operating systems and is also available
for Windows. It is commonly used by system administrators, developers, and other technical users to
remotely access and manage servers and other network devices.
387
PP-AIDA&CS Internet and Other Technologies
16. Gopher: Gopher is a type of file retrieval protocol that provides downloadable files with some description
for easy management, retrieving, and searching of files. All the files are arranged on a remote computer
in a stratified manner. It is an old protocol and it is not used much nowadays.
E-COMMERCE9
E-commerce is a process used to distribute, buy, sell or market goods and services, and also transfer the funds
online through electronic communication and networks.10 It facilitates the conduct of commercial transactions
electronically at a global level with the help of technologies like internet, electronic data interchange and
electronic fund transfer. E-commerce is not only promoting easy access to products and services but also
ensures variety of benefits to the sections11, involved in the e-commerce transactions. Some of the major
advantages that e-commerce offers are (a) a large market, (b) extensive access to this large market, (c) easy
access to the wide-ranging market of e-commerce porch and alike. These overwhelming benefits of e-commerce
market are establishing and sprouting the popularity of e-commerce over the traditional forms of businesses
and commerce.
Development of E-commerce
Going back to history, it is important to note that both Electronic Data Interchange and Electronic Fund Transfer
were introduced in late 1970s. Introduction of these technologies allowed businesses to send commercial
documents like purchase orders, invoices, transactions payments, etc. electronically. In 1979, it was Michael
Aldrich who invented the concept of online shopping.12 In the early 1980s, Credit Cards, Automated Teller
Mechanism (ATM) and telephone banking were also developed and they instantly become popular as a form
of e-commerce. In 1981, UK launched first B2B13 online shopping with the introduction of Thomson Holidays.14
Thereafter, the beginning of 1990 has witnessed the inclusion of enterprise resource planning system,15 data
mining16 and data warehousing17 as other categories of e-commerce.
In 1990 only, Tim Berners-Lee invented the concept of World Wide Web, which has transformed the academic
telecommunication network into worldwide everyman everyday communication system called the internet.18
The development of World Wide Web has significantly transformed the use of the Internet. The development
9. Reproduced from Rajvanshi Gargi (2014), Online Privacy vis-à-vis Growth of E-Commerce: A Legal Perspective Study, PhD Thesis submitted
for the award of Doctor of Philosophy at Indian Institute of Technology, Kharagpur.
10. eCommerce , eBusiness, Marketing and Design Review; (Online) e-Commerce Optimization. (June 15, 2012), http://www.
ecommerceoptimization.com/ecommerce-introduction/
11. Sections here refer as the parties involved in e-commerce transactions. The major parties involved in the e-commerce are Buyers, Sellers
and Producers.
12. Ewaryst et al., Internet - Technical Development and Applications, Springer, 255 (2009); ISBN 978-3-642-05018-3. (June 15, 2012), http://
books.google.co.in/books/about/Internet.html?id=a9_NJIBC87gCandredir_esc=y
13. Business-to-business (B2B) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler,
or between a wholesaler and a retailer.
14. Thomson Holidays is a UK based travel operator and part of TUI Travel PLC.
15. Enterprise resource planning (ERP) systems integrate internal and external management information across an entire organization,
embracing finance/accounting, manufacturing, sales and service, customer relationship management, etc. ERP systems automate this
activity with an integrated software application. The purpose of ERP is to facilitate the flow of information between all business functions
inside the boundaries of the organization and manage the connections to outside stakeholders. See also, Bidgoli and Hossein, The Internet
Encyclopedia, John Wiley and Sons, Inc. Vol. 1, 707 (2004).
16. The overall goal of the data mining process is to extract knowledge from an existing data set and transform it into a human-understandable
structure for further use.
17. A data warehouse is a relational database that is designed for query and analysis rather than for transaction processing. It usually
contains historical data derived from transaction data, but it can include data from other sources. It separates analysis workload from
transaction workload and enables an organization to consolidate data from several sources.
18. Berners-Lee, Tim; Mark Fischetti, Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by its inventor.
Britain: Orion Business. (1999); ISBN 0-7528-2090-7.
388
Internet and Other Technologies LESSON 15
of web along with web browsers has opened the access of internet to any person equipped with essential
computer understanding, infrastructure and online connectivity.19
In 1994, Netscape was introduced, which provided a simple browser to its users to surf the internet and to
conduct online transactions secured by a new technology called Secure Sockets Layer.20 This concept of
secured online transactions has served as a basis for development and growth of e-commerce.21 In 1995, two of
the biggest companies ‘Amazon.com’ and ‘e-Bay.com’ entered the field of e-commerce.22 This gave a bounce
to B2C23 commerce. With the contribution of various companies and their presence on the web for the conduct
of online transactions, the era of e-commerce has finally ushered in.24
Note: B2C commerce or business to consumer commerce refers to a model where a business website is a
place where all the transactions take place directly between a business organization and a consumer.
SSL or Secure Sockets Layer is the industry standard when it comes to safe and secure online transactions
between websites and users. The SSL technology allows for an encrypted connection to take place between
a user's web browser and the web server of the website that the customer is browsing.
Fellenstein and Wood,25 estimated that in 1996, e-commerce transactions in US earned $707 million which
increased to $2.6 billion in 1997 and $5.8 billion in 1998. Though the period of 1998 to 2002 recorded a
perceptible fall in the use and growth of e-commerce transactions, yet e-commerce companies survived this
roll and again become successful with the beginning of 2002.26 According to Fraser,27 100 companies of U.K.
predicted in 2000 that 20% of their revenue would be generated from e-commerce transactions. US Department
of Commerce (2002 and 2003) estimated that total e-commerce revenues reached a $45.6 million for 2002 and
$54.9 billion for 2003.28 This trend shows the immense growth in e-commerce businesses.
Indian market of e-commerce is also not an exception. According to a report by IMRB, International and Internet
and Mobile Association of India29 (IAMAI), the e-commerce market in India was expected to be INR 31,598 crore
by the end of 2010 which is four times more than the market size of INR 8146 crore back in 2007. Forrester
Research Firm has estimated revenue of 1.6 billion US Dollar for Indian e-commerce market in 2012 which is
expected to grow at 8.8 billion US Dollar in 2016.30 ‘TECHINASIA’ through its report ‘Asian E-commerce Sites Net
19. Short Summary of the World Wide Web Project; Groups.google.com, August 6, 1991.
20. Kenney Martin and Curry James, E-commerce: Implication for Firm Strategy and Industry Configuration; E-conomy TM Paper 2, University
of California, Economy Project (1999). (June 15, 2012), http://brie.berkeley.edu/econ/publications/wp/ewp2.html.
21. Electronic Commerce, (Online), Reference for Business, Encyclopedia of Business, Eco-Ent. (2nd ed.). (June 15, 2012), http://www.
referenceforbusiness.com/encyclopedia/Eco-Ent/Electronic-Commerce.html.
22. See, Garg Pallavi Sharda, E-Tailng in India-Myths, Realities and Marketing Implications, International Journal of Research in Finance and
Marketing, Vol.1, Issue 1 (2011).
23. Business to Consumer is a transaction that occurs between a Company and a Consumer, as opposed to a transaction between companies.
The term also describes a company that provides goods or services to Consumers.
24. Kim, D.J. et al., A Trust-Based Consumer Decision-Making Model In Electronic Commerce: The Role of Trust, Perceived Risk, And Their
Antecedents, Decision Support Systems Vol. 44, 544-564 (2007).
25. Fellenstein, C. and Wood R., Exploring E-Commerce, Global E-Business and E-Societies. Prentice Hall (2000).
26. Cassidy, J. Dot.Com: The Greatest Story Ever Sold, London: Allen Lane; 292-293 (2002): Cassidy has mentioned that the ‘gold rush’ of
the late 1990s came to be known as the ‘dot-com bubble,’ and 2000 and 2001 saw the bursting of that bubble. From March 10 to April 14,
2000, the NASDAQ, the high-tech stock exchange, dropped 34.2%, and the Dow Jones Composite Internet Index dropped 53.6%. The stock
price for all the 20 leading Internet stocks dropped, including Amazon.com by 29.9%, eBay by 27.9%, Internet Capital by 72.1%, and VeriSign
by 59.2%.
27. Fraser, J. et al., The Strategic Challenge of Electronic Commerce, Supply Chain Management: An International Journal Vol. 5 No. 1, 7-14
(2000).
28. Johnson Carrie, A Report on The Growth of Multichannel Retailing; A Forrester Document: National Governor’s Association and the
National Conference of State Legislatures. (June 15, 2012), http://www.gfoa.org/downloads/0407MULTICHANNEL.pdf.
29. Internet and Mobile Association of India (IAMAI). (June 15, 2012), http://www.iamai.in/reports1.aspx.
30. Forrester Report on India to be fastest Growing Market in Asia-Pacific. (June 15, 2012), http://www.iamwire.com/2012/04/india-to-be-the-
fastest-growing-e-commerce-market-in-asia-pacific-market-set-to-grow-to-8-8-billion-by-2016/.
389
PP-AIDA&CS Internet and Other Technologies
$ 6.9 Billion in Past 3 years, But the Exits still Tiny (Stats)’ stated that though the e-commerce market in India
grew from 43 million US Dollars in 2010 to 138 million US Dollars in first quarter of 2011, but second quarter of
2011 evidenced a fall in e-commerce market and reached to 92 million US Dollars. In the last quarter of 2012,
the revenue generated by e-commerce in India 32 US Dollars, wherein second quarter of 2013 evidenced the
revenue of 137 million US Dollars in e-commerce in India.31
With the theatrical rise and fall of the internet companies, e-commerce has confirmed constant and improved
growth in revenues and sale. The development and experience of e-commerce transactions is significantly
promoting the advantages not only for the companies and consumers but also for the society as a whole.32 For
companies, e-commerce is improving efficiency, productivity, access to variety of information or data bases and
increase in revenues; for consumer, it is providing convenience, ease and 24*7 (24 hours and 7 days) access to
product and services; and for society, it is facilitating acceleration of economic growth and opportunities. Hence,
a balance in the need, facilitation and difficulties of all the stake-holders will support the growth of e-commerce.
390
Internet and Other Technologies LESSON 15
l Increased Sales and Profits: As e-commerce provides 24/7 access to products and services, it provides
ease to consumers to transact in e-commerce transactions, which leads to increased sales and profit to
e-commerce businesses.
l Improved Customer Information: Disclosure of accurate information like name, address, and credit or
debit card details, is a compulsory requirement for the completion of e-commerce transactions. Hence,
it allows e-commerce companies to collect and store consumers’ information, which can be used further
for improving their services and for marketing purposes.
l Economic Benefits: Running an e-commerce business is economical and cost-effective as it allows
businesses to participate in global market, which serves them a greater opportunity to receive revenues
at a global platform. Moreover, e-commerce does not demand operational costs like physical store
space, maintenance, insurance etc., leading to further savings in cost. All a company needs is an idea,
unique product and well-designed web storefront to reach consumers. A combination of these factors
provides e-commerce with economic adventure to start with higher margins of profit. Thus, e-commerce
transactions have proven to be supportive to growth of economy.
l Social Benefits: E-commerce serves a range of benefits to the society in the form of enhanced quality
of life by providing services with more convenience and satisfaction. For example, (i) for most of the
people, it enables them to work from home and to generate earnings and (ii) it connects people at a
global platform.
l Political Benefits: E-commerce allows public services like health services (i.e. on-line consultation
with doctors and nurses) on internet, filling taxes over internet, filling educational forms and extracting
educational guidelines over internet.
l Technological Benefits: Introduction of e-commerce in any society will allow people to enhance their
IT skills, internet literacy and promote advancement of new technologies through applications on
e-commerce.
Limitations of e-commerce can be enumerated as under:
Consumers’ Concern about Security and Privacy: Privacy is a critical issue in electronic commerce. E-commerce
websites store consumer information to make their online account, which facilitates buying, exchange and return
of items purchased on their websites. This information includes personal details like residential address, phone
numbers, debit and credit card details, etc. Sharing of such sensitive data raises privacy concerns amongst
the customers, who the consumers’ privacy concern over their information is supported by various studies and
surveys33 as well.
A Business Week/Harris Poll survey found that over 41% of the online shoppers were very concerned over the
use of their personal information. A study conducted by UK Cards Association in 2009 has revealed that fraud
losses on UK credit and debit cards caused a loss of 440 million euro to UK based consumers of electronic
transactions.34 Culnan has also argued that privacy concern is a critical reason, which prevents consumers to
adopt online transaction or to disclose their information in electronic transactions or to provide false information
in the electronic transactions.35
l Lack of Instant Gratification: A majority of consumers are satisfied with the quality and adequacy
of the goods only after they have examined the goods physically. This incentive is not available in
e-commerce; as goods can only be seen in virtual form at the time of purchase.
391
PP-AIDA&CS Internet and Other Technologies
l Lack of social aspect of Shopping: Many people like to socialize and they enjoy talking to sales staff,
to other shoppers, or to their friends and to take their inputs about the efficiency of product and
services while they are out for shopping. This retail therapy does not exist in online shopping to
some extent.
l Inconsistent Return Policies: Sometimes, consumers suffer on account of poor customer services and
return policies in online goods and services. This difficulty is not encountered in traditional physical
shopping.
l Start-up Costs: Creating a website suitable for an e-commerce undertaking is costly as well as time
consuming. There are three major costs involved in starting up of an e-commerce website, namely a)
purchasing and updating hardware, b) purchasing and updating software, c) employing a web-designer.
l Issues with Access: According to Statista, as of April 2023, there are 5.18 billion internet users worldwide,
which amounts to 64.6% of the global population36. As everyone is not having access to Internet; limited
access to internet may affect the development of e-commerce.
l Not suitable for all products: E-commerce is not suitable for some products like perishable goods, food
items, furniture37 etc.
l Increased Competition: With the increased access to internet and spreading of online markets,
e-commerce companies have to face increased level of competition on a global scale in a global
market.
l Social Limitations: In e-commerce businesses, as people have to interact electronically, this adversely
affects personal and social skills of human interactions. Apart from this, e-commerce may lead to social
division, as there are probable threats of increase in social divide between technical haves and have-
nots.
l Economic Limitations: E-commerce markets are quite competitive, leading to a number of economic
limitations, e.g. (i) successful companies of other states may earn revenues from the developing and
under developed countries, which may be detrimental to the economy of such countries; (ii) lack of
proper and adequate regulatory environment may be detrimental to information privacy of individuals
and therefore may slow down the development of e-commerce itself; (iii) in e-commerce businesses,
tradition of just-in-time manufacturing and procurement is adopted, hence this could shake the economy
in the times of crises38 as stocks are kept to the minimum requirement and deliveries are not instant
in all cases. Economic crisis may also hamper either the delivery of goods or payment of price on the
delivery of goods.
l Political Limitations: Ecommerce security threats have the potential to cause havoc in online trading.
Frauds, tax evasion, impersonation, debit and credit card frauds, eavesdropping and denial of
service attacks are some of the threats associated with online transactions. For example e-commerce
businesses may lead to the access of obscene material, misuse of individual’s information, theft of
financial information, entrapping of children, non-identification of parties etc., hence it creates a liability
on the state or industry to address the political and legal challenges arising out of such e-commerce
transactions.
l Technological Limitations: (i) Reliance on telecommunication infrastructure, power and IT skills may
nullify the benefits of e-commerce in developing countries where advanced telecommunication
392
Internet and Other Technologies LESSON 15
infrastructure, power and IT skills are unavailable, scare or underdeveloped as in developing countries,
(ii) the quick development of new technologies may result in wasted resources in the form of disposal
of old computers, hardware, software systems etc.
However, despite the various limitations, e-commerce has come to stay in present day business world.
Considering its various benefits, it has been accepted as a viable tool for successful business advances.39
The numerous advantages offered by e-commerce to businesses, consumers and society as a whole over the
traditional means of commerce is influencing the growth of e-commerce. According to the market research
reports and analysis by IBISWORLD, e-commerce and online auction arena grew 10.4% from 2007 to 2012, with
8.8% more growth expected annually through 2017.40
The growth of e-commerce is impacting the Indian commerce market as well. According to Grant Thornton,
e-commerce in India is expected to be worth US$ 188 billion by 2025 and with a turnover of US$ 50 billion
in 2020, India became the eighth-largest market for e-commerce, trailing France, and a position ahead of
Canada41. Along with the enormous benefits served by e-commerce to businesses, consumers and to society as
a whole,42 one of the major disadvantages of e-commerce is the probability of loss of information shared by the
customers and accessed in e-commerce transactions.
39. Yen C-H. and Lu H-P., Factors Influencing Online Auction Repurchase Intention, Internet Research, Vol. 18, No.1, 7-25 (2008).
40. See also, IBISWorld (June 15, 2012), http://www.ibisworld.com/search/default.aspx?st=e-commerce and Business Opportunities in
E-commerce, http://www.inc.com/best-industries-2012/judith-ohikuare/ecommerce.html.
41. Indian Brand Equity Foundation, E-commerce Industry in India, Available at: https://www.ibef.org/industry/ecommerce.
42. See, Ray Sarbapriya, Emerging Trends of E-commerce in India: Some Crucial Issues and Challenges, Computer Engineering and
Intelligent Systems, Vol. 2, No. 5 (2011).
43. Mahadevan B., Business Models for Internet based E-commerce: An Anatomy, Working paper, Indian Institute of Management, Bangalore.
See also, Timmers P., Business Models for Electronic Markets, Electronic Markets, Vol. 8, No. 2, 3-8 (1998).
44. e-Commerce Models. (May 20th, 2013), http://www.eservglobal.com/uploads/files/index.pdf.
393
PP-AIDA&CS Internet and Other Technologies
products offered for sale will be available in the catalogue maintained by eBay. Any individual who is
interested in purchasing those goods and services can visit the website and choose the product from
the website catalogue. The catalogue will give information about the product like price, availability,
discounts and other information which are essential for consumers to decide regarding the purchase
of product. Finally, when the consumer will decide to buy the product, he needs to place the order. For
placing the order, the consumer needs to specify his personal details like name, address of delivery
and credit/debit card information for completion of the transaction. This system involves business
organizations on one side and consumers on the other for the completion of business transactions.
By the very nature of conduct of business transactions, B2C model of e-commerce seems to be the
most fatal for the infringement of data privacy as enormous amounts of consumer information and
database is collected, stored and processed by the e-commerce businesses.45 Apart from it, B2C model
of e-commerce is more prone to security threats because individuals provide their personal information
and credit card information for the completion of transactions. In addition to it, consumers might have
concerns regarding their personal information and whether it has been secured or used effectively by
business organizations or not.46
(3) Consumer to Consumer (C2C) Model: The C2C model involves business transactions between
consumers. In such model, one consumer sells directly to another consumer. For example, www.olx.
in is one of the websites which allows consumers to advertise and sell their products online to another
consumer. Here, olx, as an auction website, brings the buyer and seller together to conduct business
transactions with a payment of fee by the seller of products.
(4) Consumer to Business (C2B) Model: The C2B is similar to B2C model of e-commerce. C2B model also
involves business transactions between consumers and a business organization. In C2B, consumer is
the seller and business organization is the buyer. For example in www.monster.com, individuals can
post their bio-data for the services they can offer and then any business organization interested in
deploying their service can contact individuals and can employ them accordingly.
Apart from the above business models of e-commerce, there are other e-commerce models as well
which comes under the category of e-governance like Government to Government (G2G), Government
to Consumer (G2C), Consumer to Government (C2G), Government to Business (G2B) and Business to
Government (B2G).
45. Elliot Steve, Electronic Commerce: B2C Strategies and Models, London, John Wiley and Sons Ltd. U.K. (2002).
46. Timmers P., Business Models for Electronic Markets, Electronic Markets, Vol. 8, No. 2, 3-8 (1998).
47. Fernando Jason (2022) Supply Chain Management (SCM): How it Works and Why It Is Important
394
Internet and Other Technologies LESSON 15
Note: Product Lifecycle Management (PLM) is the process of managing the entire lifecycle of a product,
right from its inception through the engineering, design and manufacture, as well as the service and delivery
of manufactured products. PLM integrates people, data, processes, and business systems and provides a
product information backbone for companies and their extended enterprises.
Productivity and efficiency improvements can go straight to the bottom line of a company. Good supply chain
management keeps companies out of the headlines and away from expensive recalls and lawsuits. In SCM, the
supply chain manager coordinates the logistics of all aspects of the supply chain which consists of the following
five parts:
l Planning: To get the best results from SCM, the process usually begins with planning to match supply
with customer and manufacturing demands. Firms must predict what their future needs will be and
act accordingly. This relates to raw materials needed during each stage of manufacturing, equipment
capacity and limitations, and staffing needs along with the SCM process. Large entities often rely on
ERP system modules to aggregate information and compile plans.
l Sourcing: Efficient SCM processes rely very heavily on strong relationships with suppliers. Sourcing
entails working with vendors to supply the raw materials needed throughout the manufacturing process.
A company may be able to plan and work with a supplier to source goods in advance. However, different
industries will have different sourcing requirements. In general, SCM sourcing includes ensuring:
l the raw materials meet the manufacturing specification needed for the production of goods.
l the prices paid for the goods are in line with market expectations.
l the vendor has the flexibility to deliver emergency materials due to unforeseen events.
l the vendor has a proven record of delivering goods on time and in good quality.
Supply chain management is especially critical when manufacturers are working with perishable
goods. When sourcing goods, firms should be mindful of lead time and how well a supplier can comply
with those needs.
l Manufacturing: At the heart of the supply chain management process, the company transforms raw
materials by using machinery, labor, or other external forces to make something new. This final product
is the ultimate goal of the manufacturing process, though it is not the final stage of supply chain
management.
The manufacturing process may be further divided into sub-tasks such as assembly, testing, inspection,
or packaging. During the manufacturing process, a firm must be mindful of waste or other controllable
factors that may cause deviations from original plans. For example, if a company is using more raw
materials than planned and sourced, due to a lack of employee training, the firm must rectify the issue
or revisit the earlier stages in SCM.
l Delivering: Once products are made and sales are finalized, a company must get the products into the
hands of its customers. The distribution process is often seen as a brand image contributor, as up until
this point, the customer has not yet interacted with the product. In strong SCM processes, a company
has robust logistic capabilities and delivery channels to ensure timely, safe, and inexpensive delivery
of products.
This includes having a backup or diversified distribution methods in case any mode of transportation is
temporarily rendered unusable. For example, how might a company’s delivery process be impacted by
record snowfall in distribution center areas.
395
PP-AIDA&CS Internet and Other Technologies
l Returning: The supply chain management process concludes with support for the product and customer
returns. It’s bad enough that a customer needs to return a product, and it’s even worse if its due to an
error on the company’s part. This return process is often called reverse logistics, and the company must
ensure it has the capabilities to receive returned products and correctly and promptly assign refunds
for returns received. Whether a company is performing a product recall or a customer is simply not
satisfied with the product, the transaction with the customer must be remedied.
Many consider customer returns as an interaction between the customer and the company. However,
a very important part of customer returns is the intercompany communication to identify defective
products, expired products, or non-conforming goods. Without addressing the underlying cause of a
customer return, the supply chain management process will have failed, and future returns will likely
persist.
396
Internet and Other Technologies LESSON 15
your company’s website, through the whole lead management process as they move through the sales
pipeline, and continues with their behaviors once they’ve become a customer.
Operational CRM systems typically provide automation features. Marketing automation, sales
automation, and service automation offload some of the work that your employees would otherwise
have to handle. This opens up the schedule of the employees for more creative and personal aspects
of their jobs—the stuff that needs a human touch. And it makes it much easier for growing companies to
continue to provide top-notch service to scale.
3. Analytical CRM systems: Analytical CRMs have the primary focus of helping in the analysis of customer
data, in order to gain important insights. Digital tools and platforms now make it easy to collect large
quantities of data. But data analysis—the step required to turn that data into something useful for your
company—is a difficult feat. In fact, estimates suggest that over half of the data collected by companies
never gets used.
397
PP-AIDA&CS Internet and Other Technologies
49. Reproduced from Adithyan (2023) Electronic Fund Transfer, Clear Tax.
398
Internet and Other Technologies LESSON 15
l To make an EFT payment, all you need is your bank information and the receiver’s bank information.
l You cannot stop an ETF payment after you’ve initiated it by clicking continue after entering your bank
details.
DIGITAL CURRENCY50
Digital currency is a form of currency that is available only in digital or electronic form. It is also called digital
money, electronic money, electronic currency, or cyber cash.
l Digital currencies are currencies that are only accessible with computers or mobile phones because
they only exist in electronic form.
l Typical digital currencies do not require intermediaries and are often the cheapest method for trading
currencies.
l All cryptocurrencies are digital currencies, but not all digital currencies are cryptocurrencies.
l Some of the advantages of digital currencies are that they enable seamless transfer of value and can
make transaction costs cheaper.
l Some of the disadvantages of digital currencies are that they can volatile to trade and are susceptible
to hacks.
Note: Cryptocurrency is a digital payment system that doesn't rely on banks to verify transactions.
It’s a peer-to-peer system that can enable anyone anywhere to send and receive payments. Instead
of being physical money carried around and exchanged in the real world, cryptocurrency payments
exist purely as digital entries to an online database describing specific transactions. When you transfer
cryptocurrency funds, the transactions are recorded in a public ledger. Cryptocurrency is stored in
digital wallets.
Digital currencies do not have physical attributes and are available only in digital form. Transactions involving
digital currencies are made using computers or electronic wallets connected to the internet or designated
networks. In contrast, physical currencies, such as banknotes and minted coins, are tangible, meaning they
have definite physical attributes and characteristics. Transactions involving such currencies are made possible
only when their holders have physical possession of these currencies.
Digital currencies have utility similar to physical currencies. They can be used to purchase goods and pay for
services. They can also find restricted use among certain online communities, such as gaming sites, gambling
portals, or social networks.
Digital currencies also enable instant transactions that can be seamlessly executed across borders. For instance,
it is possible for a person located in the United States to make payments in digital currency to a counterparty
residing in Singapore, provided they are both connected to the same network.
50. Reproduced from Frankefield Jake (2023) Digital Currency Types, Characteristics, Pros and Cons, Future Uses, Investopedia.
399
PP-AIDA&CS Internet and Other Technologies
l Cryptocurrencies: Cryptocurrencies are digital currencies that use cryptography to secure and verify
transactions in a network. Cryptography is also used to manage and control the creation of such
currencies. Bitcoin and Ethereum are examples of cryptocurrencies. Depending on the jurisdiction,
cryptocurrencies may or may not be regulated. Cryptocurrencies are considered virtual currencies
because they are unregulated and exist only in digital form.
l Virtual Currencies: Virtual currencies are unregulated digital currencies controlled by developers or a
founding organization consisting of various stakeholders involved in the process. Virtual currencies can
also be algorithmically controlled by a defined network protocol. An example of a virtual currency is a
gaming network token whose economics is defined and controlled by developers.
l Decentralized
l Privacy
l Hacking Potential
l Volatile Value
l Limited Acceptance
l Irreversibility
400
Internet and Other Technologies LESSON 15
Pros Cons
Note: Non-Fungible Token (NFT) is a unique digital identifier that is recorded on a blockchain, and is used to
certify ownership and authenticity. It cannot be copied, substituted, or subdivided.
Decentralized Finance (DeFi) is an umbrella term for a variety of financial applications in cryptocurrency or
blockchain geared toward disrupting financial intermediaries.
l Blockchain is a type of shared database that differs from a typical database in the way it stores
information; blockchains store data in blocks linked together via cryptography.
l Different types of information can be stored on a blockchain, but the most common use for transactions
has been as a ledger.
l In Bitcoin’s case, blockchain is decentralized so that no single person or group has control—instead, all
users collectively retain control.
l Decentralized blockchains are immutable, which means that the data entered is irreversible. For Bitcoin,
transactions are permanently recorded and viewable to anyone.
Transaction Process
Transactions follow a specific process, depending on the blockchain they are taking place on. For example, on
Bitcoin’s blockchain, if you initiate a transaction using your cryptocurrency wallet—the application that provides
an interface for the blockchain—it starts a sequence of events.
401
PP-AIDA&CS Internet and Other Technologies
In Bitcoin, your transaction is sent to a memory pool, where it is stored and queued until a miner or validator
picks it up. Once it is entered into a block and the block fills up with transactions, it is closed and encrypted
using an encryption algorithm. Then, the mining begins.
Source: Investopedia
The entire network works simultaneously, trying to “solve” the hash. Each one generates a random hash except
for the “nonce,” short for number used once.
Every miner starts with a nonce of zero, which is appended to their randomly-generated hash. If that number
isn’t equal to or less than the target hash, a value of one is added to the nonce, and a new block hash is
generated. This continues until a miner generates a valid hash, winning the race and receiving the reward.
Once a block is closed, a transaction is complete. However, the block is not considered to be confirmed until
five other blocks have been validated. Confirmation takes the network about one hour to complete because
it averages just under 10 minutes per block (the first block with your transaction and five following blocks
multiplied by 10 equals about 60 minutes).
Not all blockchains follow this process. For instance, the Ethereum network randomly chooses one validator
from all users with ether staked to validate blocks, which are then confirmed by the network. This is much faster
and less energy intensive than Bitcoin’s process.
PAYMENT PORTAL51
A payment gateway is a technology used by merchants to accept debit or credit card purchases from customers.
The term includes not only the physical card-reading devices found in brick-and-mortar retail stores but also
the payment processing portals found in online stores. However, brick-and-mortar payment gateways in recent
years have begun accepting phone-based payments using QR codes or Near Field Communication (NFC)
technology.
51. Reproduced from Fernando Jason (2021) What is a Payment Gateway? Definition, How It Works and Example, Investopedia
402
Internet and Other Technologies LESSON 15
l Payment gateways are the consumer-facing interfaces used to collect payment information.
l In physical stores, payment gateways consist of the point of sale (POS) terminals used to accept credit
card information by card or by smartphone.
l In online stores, payment gateways are the “checkout” portals used to enter credit card information or
credentials for services such as PayPal.
l Payment gateways are distinct from payment processors, which use customer information to collect
payments on behalf of the merchant.
l There are also payment gateways to facilitate payment in cryptocurrencies, such as Bitcoin.
403
PP-AIDA&CS Internet and Other Technologies
Types of M-commerce
M-commerce is categorized based on the following three basic functions:
l Mobile shopping enables customers to buy a product using a mobile device with an application such
as Amazon or a web app. A subcategory of mobile shopping is app commerce, which is a transaction
that takes place over a native app.
l Mobile banking is online banking designed for handheld technology. It enables customers to access
accounts and brokerage services, conduct financial transactions, pay bills and make stock trades. This
is typically done through a secure, dedicated app provided by the banking institution. Mobile banking
services may use SMS or chatbots and other conversational app platforms to send out alerts and
track account activities. For example, the WhatsApp chatbot lets customers view their account balance,
transfer funds, review loans and conduct other transactions in real time through WhatsApp.
l Mobile payments are an alternative to traditional payment methods, such as cash, check, credit and
debit cards. They enable users to buy products in person using a mobile device. Digital wallets, such
as Apple Pay, let customers buy products without swiping a card or paying with cash. Mobile payment
apps, such as PayPal, Venmo and Xoom serve the same purpose and are popular options. Mobile
consumers also use QR codes to pay for things on their mobile phones. With mobile payments, users
send money directly to the recipient’s cell phone number or bank account.
404
Internet and Other Technologies LESSON 15
l Location tracking: Many e-commerce apps make use of location tracking capabilities to pitch users’
opportunities based on their location. However, the location tracking capability of e-commerce is
limited when it is used with a non-mobile device. For example, the location of an e-commerce shopper
is tracked with their IP address. While the IP address provides a broad region of the user’s location, it
is not capable of identifying the exact location, which might affect the targeted advertising strategies
of a business. M-commerce apps, on the other hand, can track locations using Wi-Fi and GPS-based
technologies that enable location-specific content and personalized recommendations. For instance,
a provider can send push notifications offering personalized discounts that target certain customers as
they walk past a specific store in a mall.
l Security: Credit cards are still commonly used for non-mobile e-commerce payments. They are
considered riskier than other online payment methods, even with security measures, such as
multifactor authentication. Most data breaches and identity thefts happen because of credit card
misuse. M-commerce closes some security gaps through the addition of measures such as biometric
authentication, mobile wallets, quick response or QR codes and even cryptocurrencies.
l Reachability and convenience: M-commerce makes it easier to reach a target audience. With mobile
apps, businesses can reach more people and make their buying experience easier and faster.
405
PP-AIDA&CS Internet and Other Technologies
l AI, chatbots and shopping assistants: Powered by AI, chatbots are becoming essential e-commerce
tools. They help shoppers around the clock with product recommendations, purchase completion,
customer support and other tasks. According to a Grand View Research report, the global AI chatbot
market is expected to reach $3.99 billion by 2030. Shoppers are becoming more comfortable with
chatbots as they have become accustomed to chatting with their friends and family over chat apps,
such as WhatsApp, Facebook Messenger and Telegram.
l Mobile ticketing: Gone are the days when users had to wait in long lines to buy movie or concert
tickets. With mobile ticketing, users can buy and receive tickets through their smartphones. Mobile
ticketing also eliminates the need to print the tickets as users receive them on their phones in a text
format with a barcode that gets scanned at events.
Bluetooth Wi-Fi
It requires Bluetooth adapter on all devices for It requires wireless adapter on all devices and
connectivity. wireless router for connectivity.
406
Internet and Other Technologies LESSON 15
The security of bluetooth is less in comparison to Wi- It provides better security than bluetooth.
Fi.
Bluetooth is less flexible means in this limited users Wi-Fi supports large number of users.
are supported.
The radio signal range of bluetooth is ten meters. In Wi-FI, transmission range is hundred meters.
Bluetooth frequency ranges from 2.400 GHz to 2.483 WiFi frequency ranges from 2.4GHz to 5 GHz.
GHz.
Bluetooth demands a bluetooth setting or adapter on WiFi demands a wireless router to set up the
all devices to set up connectivity. connectivity and adapter on the device.
WiFi demands a wireless router to set up the In WiFi, modulation technique is OFDM (Orthogonal
connectivity and adapter on the device. Frequency Division Multiplexing) and QAM
(Quadrature Amplitude Modulation).
LESSON ROUND-UP
l Internet Protocols are a set of rules that governs the communication and exchange of data over the
internet. Both the sender and receiver should follow the same protocols in order to communicate the
data.
l IP address is a unique address that identifies a device over the network.
l Electronic commerce, or e-commerce refers to buying and selling goods and services over the internet.
l Business models of e-commerce can be classified into the following four models: (1) Business to Business
(B2B) (2) Business to Consumer (B2C) (3) Consumer to Consumer (C2C) (4) Consumer to Business (C2B).
l Supply Chain Management (SCM) is the management of the flow of goods, data, and finances related
to a product or service, right from the procurement of raw materials to the delivery of the product at its
final destination.
l Customer Relationship Management (CRM) is a technology for managing all your company’s
relationships and interactions with customers and potential customers.
407
PP-AIDA&CS Internet and Other Technologies
l A payment gateway is a technology used by merchants to accept debit or credit card purchases from
customers.
l M-commerce (mobile commerce) is the buying and selling of goods and services through wireless
handheld devices such as smartphones and tablets. M-commerce is a form of e-commerce that enables
users to access online shopping platforms without the use of a desktop computer.
l Bluetooth, developed in the late 1990s, is a technology designed to enable short-range wireless
communication between electronic devices, such as between a laptop and a smartphone or between
a computer and a television.
l Wi-Fi is similar to Bluetooth in that it also uses radio waves for high-speed data transfer over short
distances without the need for a wire connection. Wi-Fi works by breaking a signal into pieces and
transmitting those fragments over multiple radio frequencies.
TEST YOURSELF
(These are meant for recapitulation only. Answer to these questions are not to be submitted for evaluation.)
1. Enlist and briefly discuss the various internet protocols.
2. Write a brief note on blockchain technology.
3. Discuss the categories of CRM systems.
4. Discuss the pros and cons of digital currencies.
5. What are the benefits and limitations of e-commerce?
6. Discuss the C2C model.
7. Write a short note on:
a. Payment Gateway
b. EDI
c. UDP
d. TELNET
e. PPP
f. EFT
408
Internet and Other Technologies LESSON 15
l Understanding the Internet: A Clear Guide to Internet Technologies by Keith Sutherland (published by
Routledge).
l Web Programming and Internet Technologies, 2nd Edition by Scobey (Released September 2016,
Published by Jones & Bartlett Learning).
l Internet Technology and Web Design by Dr. R.K. Jain (Published by Khanna Book Publishing Company)
l Digital Currency Types, Characteristics, Pros and Cons, Future Uses, Investopedia.
l Supply Chain Management (SCM): How it Works and Why It Is Important Fernando Jason (2022).
l Elliot Steve, Electronic Commerce: B2C Strategies and Models, London, John Wiley and Sons Ltd. U.K.
(2002).
l Timmers P., Business Models for Electronic Markets, Electronic Markets, Vol. 8, No. 2, 3-8 (1998).
l Ray Sarbapriya, Emerging Trends of E-commerce in India: Some Crucial Issues and Challenges,
Computer Engineering and Intelligent Systems, Vol. 2, No. 5 (2011).
l Mahadevan B., Business Models for Internet based E-commerce: An Anatomy, Working paper, Indian
Institute of Management, Bangalore.
l Timmers P., Business Models for Electronic Markets, Electronic Markets, Vol. 8, No. 2, 3-8 (1998).
l Johnson Carrie, A Report on The Growth of Multichannel Retailing; A Forrester Document: National
Governor’s Association and the National Conference of State Legislatures. (June 15, 2012), http://www.
gfoa.org/downloads/0407MULTICHANNEL.pdf.
l Internet and Mobile Association of India (IAMAI). (June 15, 2012), http://www.iamai.in/reports1.aspx.
l Forrester Report on India to be fastest Growing Market in Asia-Pacific. (June 15, 2012), http://www.
iamwire.com/2012/04/india-to-be-the-fastest-growing-e-commerce-market-in-asia-pacific-market-set-
to-grow-to-8-8-billion-by-2016/.
l Asian E-commerce Sites Net $ 6.9 Billion in Past 3 years, But the Exits still Tiny (Stats); TECHINASIS,
(Mar. 13th, 2014) http://www.techinasia.com/asia-ecommerce-investments-and-exits-2010-to-2013/
l A Report on Bringing e-commerce benefits to Consumers, by European Commission, The
European Parliament, (2011). (June 15, 2012), http://ec.europa.eu/internal_market/ecommerce/docs/
communication2012/SEC2011_1640_en.pdf.
409
PP-AIDA&CS Internet and Other Technologies
410
WARNING
Regulation 27 of the Company Secretaries Regulations, 1982
In the event of any misconduct by a registered student or a candidate enrolled for any examination
conducted by the Institute, the Council or any Committee formed by the Council in this regard, may
suo-moto or on receipt of a complaint, if it is satisfied that, the misconduct is proved after such investigation
as it may deem necessary and after giving such student or candidate an opportunity of being heard,
suspend or debar him from appearing in any one or more examinations, cancel his examination result,
or registration as a student, or debar him from re-registration as a student, or take such action as may be
deemed fit.
It may be noted that according to regulation 2(ia) of the Company Secretaries Regulations, 1982, ‘misconduct’
in relation to a registered student or a candidate enrolled for any examination conducted by the Institute
means behaviour in disorderly manner in relation to the Institute or in or around an examination centre or
premises, or breach of any provision of the Act, rule, regulation, notification, condition, guideline, direction,
advisory, circular of the Institute, or adoption of malpractices with regard to postal or oral tuition or resorting
to or attempting to resort to unfair means in connection with writing of any examination conducted by the
Institute, or tampering with the Institute’s record or database, writing or sharing information about the
Institute on public forums, social networking or any print or electronic media which is defamatory or any
other act which may harm, damage, hamper or challenge the secrecy, decorum or sanctity of examination
or training or any policy of the Institute.
411
PP-AIDA&CS Test Paper
Professional PROGRAMME
ARTIFICIAL INTELLIGENCE, DATA ANALYTICS AND
CYBER SECURITY – LAWS & PRACTICE
Group 1 l Elective PAPER 4.4
(This test paper is for practice and self-study only and not to be sent to the Institute)
412
Test Paper
password. Two challenge questions had to be answered for transactions over Rs.10,000. The owner
was notified that an ACH transfer of Rs. 1,00,000 was initiated by an unknown source. They contacted
the bank and identified that in just one-week cybercriminals had made six transfers from the company
bank accounts, totaling Rs. 5,50,000. Cybercriminals were able to install malware onto the company’s
computers, using a keylogger to capture the banking credentials.
One of their employees had opened an email from what they thought was a materials supplier but was
instead a malicious email laced with malware from an imposter account. How this malware impacted
the banking transactions of the company?
(5 Marks)
(ii) One group of cyber attackers transferred Rs. 10,00,000 from one of the Indian bank to another foreign
bank situated in London. The criminals have hacked into the bank’s computer system network through
the use of some information they acquired from the keylogger programs.
What do you understand by keylogger. What type of keylogger used in the above scenario.
(5 Marks)
(iii) A new start-up SME (Small-Medium Enterprise) based in Singapore with an E-government model has
recently noticed anomalies in its accounting and product records. It has undertaken an initial check
of system log files, and there are several suspicious entries and IP addresses with a large amount
of data being sent outside the company firewall. They have also recently received several customer
complaints saying that there is often a strange message displayed during order processing, and they
are often re-directed to a payment page that does not look legitimate.
What do you understand by cybersecurity forensics and how would you like to have cybersecurity
forensics for the given scenario?
(5 Marks)
(iv) Mr. Amar was working in a BPO, that was handling the business of a multinational bank. During the
course of his work he had obtained Personal Identification Numbers (PIN) and other confidential
information about the bank’s customers. Using these Mr. Amar and his accomplices, through
different cyber cafes, transferred huge amount of money from the accounts of different customers
to fake accounts.
How are you going to reduce your risk of online banking specific in the above scenario?
(5 Marks)
Question No. 3
(i) Mr. Akash is running one small business with his family. Their employees do the online transactions
by logged in with both company and user-specific IDs and password. The net banking facility of their
bank won’t allow any transaction without giving answers to two challenge questions for transactions
over Rs.1,000. They receive few messages of debit form their company accounts which were initiated by
an unknown source. They contacted the bank and identified that in just one-week cybercriminals had
made ten transfers from the company bank accounts for Rs. 4,50,000. Cybercriminals had installed the
malware onto the company’s computers, using a keylogger to capture the banking credentials.
One of their employees received an email from an unknown sender about winning a lottery price of
$1,00,000 and he opened that email on his office laptop which he used for net banking transactions.
That email was malicious email laced with malware from an imposter account. What precautions one
should have while reading email received from an unknown sender?
(5 Marks)
413
PP-AIDA&CS Test Paper
(ii) ACH (Automated Clearing House) is run by an organisation called Nacha (previously NACHA - National
Automated Clearing House Association) and may also be referred to as the ACH network or ACH scheme.
Payment processing via the ACH network has existed since the 1970s. ACH moved financial transactions
worth more than Rs.72.6 trillion in 2021, an increase of over 17 percent from the previous year.
What do you understand by Automated Clearing House (ACH) transfers.
(5 Marks)
(iii) A staff member in advisory practice opened a file attached to an email received one morning. It turned
out the attachment contained a ‘worm’ that infected not only the staff member’s computer, but it also
spread to all other computers in the practice network. This malware caused all computers in the
office to shut down. The adviser needed to use the platform software that day to ensure his clients
participated in a Corporate Action that was closing the following day. With the help from their Business
Development Manager, the office worked through the issue, so they were able to log into the platform
software to complete this critical work from a home laptop that hadn’t been infected with the virus.
Define malware and how you would like to save your system through malware in the above scenario?
(5 Marks)
(iv) Technological advances have great societal benefits and make it easier for people to access information,
and to collaborate with their communities. They also expose users to risks such as cybercrime, identity
theft or misuse of personal data. Software companies share a responsibility to design and operate
products and services in a manner that both helps protect customers from these harms and promotes
respect for fundamental rights. And software companies share, with many other stakeholders, a
collective responsibility to help make the Internet more reliable and trustworthy.
How are you going to improve the security aspects in the above scenario?
(5 Marks)
Question No. 4
(i) Imagine a scenario where you are visiting some websites and one of them seems to be a little slow. You
might blame their servers to improve their scalability as they might be experiencing a lot of user traffic
on their site. Most of the sites already take this issue into account beforehand. Chances are, they might
be a victim of what is known as a DDoS attack.
What type of DDoS (Distributed Denial of Service) used in the above scenario?
(5 Marks)
(ii) The online threat landscape continues to evolve at an accelerating pace with hackers launching more
distributed denial of service attacks than ever before, taking aim at new targets, and creating new
botnets. The demand for solutions for a wide range of business needs and the rollout of 5G technologies
has accelerated the proliferation of Internet of Things (IoT) around the world, creating a huge pool of
unsuspecting and under protected new recruits for botnet armies used to launch attacks on massive
scales. DDoS attacks are expected to continue to increase in number and complexity as botnets and
inexpensive DDoS-as-a-service platforms proliferate.
Based on the above scenario differentiate the DoS and DDoS attack.
(5 Marks)
(iii) Mr. B want to start a new business of trading of readymade garments. He wants to set up his office in
his home. He approached you to get knowledge of hardware and software required to set up his small
414
Test Paper
office at home. Assume you are computer hardware and software specialist and advise him as per his
requirements.
(5 Marks)
(iv) ABC Hospital is top ranked hospital out of 10 pediatric specialty hospitals, with about 25,000 inpatient
admissions each year and 5,28,000 patients’ visits scheduled annually through 200 plus specialized
clinical programs. One fine day their computer systems were stopped working and the entire network
go down. Later on, it came to their knowledge that the hackers entered in to their server and the entire
data of patients was stolen.
Now hospital want to know that what remedies for such cyber-attack on their server are available for
an organization and under which law?
(5 Marks)
Question No. 5
(i) Analytics is the discovery and communication of meaningful patterns in data. Especially, valuable
in areas rich with recorded information, analytics relies on the simultaneous application of statistics,
computer programming, and operation research to qualify performance. Analytics often favors data
visualization to communicate insight. In a nutshell, analytics is the scientific process of transforming
data into insight for making better decisions. Data Analytics aims to get actionable insights resulting
in smarter decisions and better business outcomes. It is critical to design and built a data warehouse
or Business Intelligence (BI) architecture that provides a flexible, multi-faceted analytical ecosystem,
optimized for efficient ingestion and analysis of large and diverse data sets.
What is Data Analytics and Business Intelligence?
(5 Marks)
(ii) The banking systems need reporting systems and improve the data warehouse architecture to achieve
a smooth and consistent workflow. The challenge was to develop and integrate a data warehouse, to
implement a liquidity risk management system in cooperation with the European Bank for Reconstruction
and Development. The final goal was to get a “golden source” and develop the main analytical and
reporting dashboards.
Define data warehouse architecture for the above scenario?
(5 Marks)
(iii) Company X is in retail business that wants to improve its sales. They have collected data on their sales
over the past year, including information on the products that were sold, the location of the stores, and
the demographics of the customers. The data analytics team at Company X is asked to analyze this
data to identify trends and patterns that can inform the company’s sales strategy.
What are the different approach of Data Analytics?
(5 Marks)
(iv) Let’s say you work for a social media company that has just done a launch in a new city. Looking at
weekly metrics, you see a slow decrease in the average number of comments per user from January
to March in this city. The company has been consistently growing new users in the city from January to
March.
What are some reasons why the average number of comments per user would be decreasing and what
metrics would you look into?
(5 Marks)
415
PP-AIDA&CS
416