How to Deal with Cyber Crime?
TNI Bureau: Cyber crime is a major concern these days. Since many prefer to access the information through websites, blogs, and emails, the criminal activities like hacking should not be tolerated. In an era of internet and technology, people need to be more updated and informed. But the cyber crime should be stopped and people involved in such negative activities should be punished.
Cyber crime is the criminal activity involving information technology infrastructure, including illegal or unauthorized access, illegal interception by technical means of non-public transmissions of computer data, data interference including unauthorized damaging, deletion, deterioration, alteration or suppression of computer data, systems interference through inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data, misuse of devices, forgery and electronic fraud.
Cyber crime can be dealt broadly in two ways. Firstly, the user can adopt certain technical measures or he can complain to the concerned authority for action.
In India, one can lodge a complaint to the Cyber Crime Investigation Cell. It is a wing of Mumbai Police to deal with Cyber crimes and to enforce provisions of India’s Information Technology Law, namely, The Information Technology Act, 2000, and various cyber crime related provisions of criminal laws, including the Indian Penal Code.
Cyber Crime Investigation Cell is a part of Crime Branch, Criminal Investigation Department of the Mumbai Police.
However, Cyber crime can be technically dealt through the available countermeasures such as Firewalls, which is considered as a strong measure of defense in securing a computer network by setting Access Control Lists (ACLs), which can determine the services and traffic that can pass through the check point.
Secondly, Antivirus can be used to prevent propagation of malicious code. Heuristics such as file analysis and file emulation are also used to identify and remove malicious programs.
Thirdly Virus definitions should be regularly updated in addition to applying operating system hotfixes, service packs, and patches to secure the computer being attacked by virus entering online.
Also, Cryptography techniques can be employed to encrypt information using an algorithm to mask information in storage or transit.
Encryption can also be employed on the file level using encryption protocols like Data Encryption Standard (DES), Triple Data Encryption Algorithm (3DES), or Advanced Encryption Standard (AES) to ensure security of information in storage.
Again, network vulnerability testing performed by technicians or automated programs can be used to test devices.
Users can also adopt physical preventions as a measure of safeguard, such as locks, card access keys, or biometric devices can be used to prevent criminals from gaining physical access to a machine on a network.
Even, a strong password is also strongly advisable for protection both for access to a computer system and the computer’s BIOS to restrain the cyber-criminals from physical access to a machine.