A Study on Cyber Crime and Data Breach Management

 

Er. Ayush Guha, S.K. Indurkar

Institute of Management, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh, India.

*Corresponding Author E-mail: er.ayushguha@gmail.com

 

ABSTRACT:

Cyber-criminal have made lot of damage to individual as well as organizations even the government and private sector are facing the problem in the field of cyber security, several laws and method has been introduced to prevent cyber crime and number of awareness program has been run by the government as well as the private organizations. The paper describe about the common Areas where the number of attacks has been made and the increased rate in data breach as well as the classes of hackers and types of attack they are using for various cyber-crime such as financial fraud, cyber bullying, phishing and remote access is another major attacks we also discuss about prevention mechanism.

 

KEYWORDS: Cyber Crime, Hacking Attacks, Financial Fraud, Cyber Criminal, Phishing Attack, Web Security, Email Bombing, Remote Access Trojan (RAT), Remote Computing, Data Breach, Data Breach Management.

 


I. INTRODUCTION:

The cyber-crime is Today cyber-crime has a lot of damage due to individual as well as organizations even the governments and private sector both are facing the problem in the field of cyber security several laws and method has been introduced to prevent cyber-crime and number of awareness program has been done by the government as well as the private organizations. The paper describe about the common Areas where the number of attacks has been made as well as the classes of hackers and types of attack they are using for various cyber-crime such as financial fraud cyber bullying phishing remote access another major attacks and prevention mechanism. Now a day's number of internet users are increased day by day similarly number of attacks are also increasing due to the lack of awareness about the cyber security among the people. In this study well discuss the current cyberspace challenges. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term hacker may refer to anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes. A hacker may, for example, steal information to hurt people via identity theft, damage or bring down systems and, often, hold those systems hostage to collect ransom.

 

II. CLASSES OF HACKERS:

A.   Black Hat Hackers:

Individual with the extraordinary computer skills restoring to malicious or destructive activities and also known as cracker.

The mean of objective of black hat hacker is to perform illegal activities such as performing criminal activities cyber bullying, financial attack, hacking devices, breaking down the security of networks for monetary benefits.

B.    Gray Hat Hacker:

Individual who work both offensively and defensively at various time. This are the type of hackers who worked in the both domains security as well as the attack depending upon the requirement.

According to one definition of a grey-hat hacker, when they discover a vulnerability, instead of telling the vendor how the exploit works, they may offer to repair it for a small fee. When one successfully gains illegal access to a system or network, they may suggest to the system administrator that one of their friends be hired to fix the problem; however, this practice has been declining due to the increasing willingness of businesses to prosecute. - source Wikipedia

C.   White Hat Hacker:

Individuals professional hacking skills and using them for defensive purpose they are also known as Security analyst.

The mean objective of white hat hacker is to find the solution of current cyber security problem as well as developing Technologies to prevent cyber-crime they are also contributing developing cyber security policies.

D.   Script Kiddy

An unskilled hacker who compromise system by running script tools and software developed by a real hacker.

Script kiddy's are the hackers who get the basic knowledge about the hacking and implementing those without knowing the security risk. The main objective of this type of hacker is to find vulnerabilities and exporting them.

E.    Cyber Terrorist

Individual with wide range of skills motive by religious of political belief to create Fear by large scale disruption of computer network.

The mean objective of this type of hackers is to promote their individual objectives for religious or political view with the help of Cyberspace and spreading the terrorism.

F.    Suicide Hacker

Individual who aim to bring down critical infrastructure for a cause and not worried about facing jail terms or any other kind of punishment.

The mean objective of suicide hackers is to perform the task by any means they are not worried about the result caused due to their criminal activities they are just focusing on committing the crime to fulfill their individual, religious and political views.

G.   State Sponsored Hacker:

Individual employed by the government to penetrate and gain top security information to damage information system of a government

They are the type of hackers who are usually employed by the government to increase quality of their security systems as well as prevent cyber-attack.

H.   Hacktivist:

Individual who promote a political agenda by hacking especially bye defacing or disabling website.

This are the type of hacker who are mainly hired by political agencies to fulfill their objectives with the help of hacking.

I.      CYBER CRIME:

Cyber-crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber-crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber-crimes when the illegal activities are committed through the use of a computer and the Internet.

 

II.   TYPES OF CYBER CRIME IN INDIA:

India is also one of the countries facing the cyber security problem as well as dealing with cybercrime in India the number of Cyber-attack has popular the most common attacks are phishing cyber bullying financial fraud website hacking defacement and mobile hacking.

A.   Phishing Attack:

Phishing is one of the common attack which are used by the hackers this attack hackers creator a clone of any e genuine website or application and sharing those with the victim.

The victim due to the lack of awareness can't understand that it's not an original website he or she may share there credential on those applications and hackers can easily cant access of their accounts.

 

B.    Cyber bullying Attack:

Cyber bullying or cyber harassment is a form of bullying or harassment using electronic means. Cyber bullying and cyber harassment are also known as online bullying. It has become increasingly common, especially among teenagers. [1] Cyber bullying is when someone, typically teens, bully or harass others on the internet, particularly on social media sites.

 

Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e. hate speech) - Source Wikipedia

 

C.   Financial Fraud Attack:

This attack includes all types of attacks that are used by the hackers to perform financial fraud include the hacking of bank accounts mobile wallets or any financial resources without the permission of the uses.

It is one of the most popular attack in India number of tricks and techniques are used by the hackers to perform financial fraud the most common techniques in this type of attacks is calling the victim and pretending them the hacker is the manager of their bank and need to update their accounts for that we may require the personal information such as credit card number bank account number OTP and other personal information.

 

D.   Mobile Hacking Attack:

Mobile hacking attacks are one of the common attacks which are used by hacker now days in this attack hacker share a malicious application with victim or share a link to download the malicious application once the victim install the application on their mobile devices hacker can get all the access of the mobile data accounts and others personal information.

This information includes the access of camera file system Operating System and other credentials. A 77% rise in the number of cybercrime case was observed in 2017 as compared to 2016 as per the report of NCRB. Due to the lack of awareness number of cyber criminals are taking advantages and committing the cyber-crime.

 

E.    Remote access Trojan Attack:

A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment.

 

III.CYBER CRIME RATE:

According to the report of Gemalto in 2018 every second 214 attacks, very minutes 12, 865 attacks, every hour 7, 71, 909 attacks and every day 17, 525, 816 attacks are being faced by the world.

 

In this report India rank 11 on the index of attacks, the main area of cyber-attack in India are attack on financial services, mobile hacking, social media account hacking and other attacks like cyber bullying, sharing personal content on social media or porn sites.

 

 

Source: https://safenet.gemalto.com/uploadedImages/resources/Infographics/Data_Protectio n/breach-level-index-infographic-h1-2018-v4.jpg

 

A.   Data breach:

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and also data spill.

 

In 2018 according to report of Gemalto maximum number of attacks were made on India is 11% of overall attack in the word. As Reference to this report the number of attacks that are 3, 68, 848, 997.88.

The key area where the attack is made are health care, Government, retail, financial, Education, Social Media, Retail, Industrial and other sectors.

 

This attacks include the mass attack is on financial services that is 14% of the overall attack which is 51, 638, 859.7032 in a year 2018 similarly on the 6% on the government sector that 22130939.87 in the year 2018 that is nearly 1 attack in every 2 second some of them are reported and some are not reported. This attack may cover the data leak and the other security comptonization.

 

 

Source: https://safenet.gemalto.com/uploadedImages/resources/Infographics/Data_Protec tion/breach-level-index-infographic-h1-2018-v4.jpg

 

B.    Security Mechanism need to implemented:

The awareness is the key factor that is missing in now a day's people are not aware with the security of their digital device they are focusing on the use of new technological services but not implementing the security services on their devices. The Proper training and guidance is important for the prevention of cyber-crime as well as data breach.

 

Fig: Data Breach 2013-2015                                                                     Fig: Data Breach 2018

Fig: Data Breach 2018 India

 

The Major steps to be taken in management of cyber-crime and data breach are :

1.     Running Awareness Program

2.     Providing Training to the people as well as enforcement agencies.

3.     Audting the security system and consulting with the cyber experts.

4.     Adopting the new technology for the prevention of cyber-crime.

5.     Creating and updating the law & policies as per the crime trend

6.     Minimizing or eliminating the use of out dated technologies.

7.     To secure the mobile devices the user must use the antivirus.

8.     Upading the system and implementing security patches.

9.     Making a centralized system for the complaint against the cyber-crime.

10.  Implimenting the cyber security study at root level or in school and collages.

11.  Reviewing the cyber security system in every 30 days and updating them.

12.  Reduse the use of open Wi-Fi and unsecure network.

13.  Developing a cell for the awareness and training in each educational institution.

14.  Promoting the cyber security policies.

15.  Use of strong password and updating them in every 30 days to prevent from cyber-crime.

16.  Always use the financial services on trusted networks.

17.  Reporting the financial fraud as soon as it acknowledged by the user.

18. Monitoring the activity log on social media.

19. Do Not share your password with anyone. 20.Use Phishing detection tools on your browser.

21. Enforcement agencies must consult with expert and if needed must take help of private agencies.

21.  Do not share your bank registered mobile number for public contact so as to avoid SIM cloned fraud.

22.  Use the genuine sources for the installation of services.

23.  Do not use pirated software or cracked software. 24.Avoid use of login of social media account in cyber cafe.

25.Distoy your mobile device rather than selling it due to this criminal can recover personal your data from those devices.

 

IV. CONCLUSION:

From the study made it has been found that cyber-attack is increasing day by day due to the lack of security awareness among the people. if we are adopting a new technology, we must adopt the security risk as well as the security mechanism to prevent cyber-crime. The crime rate is increased in 2018 approximately 5.784 times more than the data breach in 2013-2015.

 

Criminals are taking advantage of those people who are not aware with security risk involve while using Technology. The timely training and awareness program must be conducted to reduce the rate of crime in cyberspace. It's also important to make the law against cyber-crime and providing the proper training to the enforcement agencies in accordance with the new threats. To reduce the security breach we must focus on auditing of security system and must consult with the cyber expert before adapting the new technology.

 

V. REFERENCES:

1.      https://en.wikipedia.org/wiki/Grey_hat.

2.      https://www.webopedia.com/TERM/C/cyber_crime.html.

3.      https://www.britannica.com/topic/cybercrime/Identity-theft-and- invasion-of-privacy.

4.      https://searchsecurity.techtarget.com/definition/hacker.

5.      en.wikipedia.org/wiki/Phishing.

6.      International Journal of Web Technology ISSN: 2278-2389.

7.      https://www.thehindu.com/news/national/decoding-ncrb- report/article29775632.ece

8.      https://safenet.gemalto.com/resources/data-protection/breach-level- index-2018-h1/

9.      https://www.researchgate.net/publication/280488873_Cyber_crime_C lassification_and_Characteristics

10.   EC- Council Ethical hacking and Countermeasures v9, Courseware Volume 1

 

 

Received on 21.05.2020   Accepted on 17.06.2020              

ŠA&V Publications all right reserved

Research J. Engineering and Tech. 2020;11(2):113-117.

DOI: 10.5958/2321-581X.2020.00020.3