Escolar Documentos
Profissional Documentos
Cultura Documentos
Mr. V. D. Parode
Mr. Y. C. Dige
Dr. S. K. Patil
Research Scholar,
Solapur University, Solapur,
Maharashtra, India 413225
Assistant Professor,
SICS(MCA), Pandharpur,
Maharashtra, India 413304
Assistant Professor,
SICS(MCA), Pandharpur,
Maharashtra, India 413304
Associate Professor,
BPSCC,Barshi,
Maharashtra, India
dattatraya.jadhav30@gmail.com
vdparode@gmail.com
yogeshdige@gmail.com
I.
INTRODUCTION
Police records in Maharashtra do not have any complaint
about computer crime and there are no other official news
about cyber crime rates in Maharashtra. Does this mean that
e users in Maharashtra have not been victims or perpetrators
of e crimes? Informal and insufficient reports about
computer crime in India and in Maharashtra particularly result
in a mistaken belief that those crimes do not feature there.
This leave without decision makers, politician and other
stakeholders very important information that could be
demoralized for better preparation and decision-making.
Maharashtra is a developed state in India with a population of
near about 10 crores population, 38% of which live in urban
areas[1]. Information and Communications Technology
(ICTs) are generally becoming very popular with
telecommunications companies configuring email and e
services on almost all mobile phones.
The cyberspace is the fundamental world that Internet users
inhabit when they are online. It has been defined by Joseph
Migga Kizza [2] as the concept of a surroundings made up of
unseen information. When computer users log onto the
Internet, they are able to perform various tasks and services
like browsing the World Wide Web, chatting with fellow
cyber citizens, transferring files from one computer to another,
remote logging to another computer, sending electronic mail,
conducting e-commerce, video conferencing and more.
The lots of functionalities and independence of use while in
the cyberspace brings an equal ease of committing immoral
acts and crimes. Cyberspace crimes are the crimes that are
dedicated at the same time as in the cyberspace. They
978-81-909376-6-5 2013IEEE
Page 330
123065
47032
23682
10863
3597
1605
982
340
124
57
17
5
III.
INFORMATION ANTHOLOGY
Information from Internet users in Maharashtra was
collected and analyzed using SPSS. The aim was to
investigate if they had been perpetuators or victims of cyber
crime and if so, where they reported the incidents. The
instruments used during the study included a web-based
survey, telephone interviews, e-mail statements, face-to-face
interviews, case studies and questionnaires.
A. Questionnaires
A set of questionnaires was distributed to a sample of 1000
regular users in the districts of Solapur, Pune, Sangli,
Kolhapur, Satara, and Mumbai. The questionnaire survey
queried incidents like virus attacks, SPAM, Internet fraud,
intellectual property infringement, hacking, identity theft,
child pornography and child trafficking/ missing children. Of
these 1000 questionnaires that were distributed, 500 act in
response positively and were analyzed. The participants
consisted of students, researchers, the business community,
community workers, law enforcement officers and lecturers.
The sample space consisted of the following institutions:
Solapur University, Shivaji University, University of Pune,
University of Mumbai, Sinhgad Institutes Pune Campus,
Sinhgad Institute Lonawala Campus, Sinhgad Institutes
Solapur, Pandharpur and Sangola Campus, Cyber Cell Office
(Pune Region), Crime department Pune, MIT Campus Pune,
Symbiosis Pune, SIBER Kolhapur, DY Patil Pune and
Kolhapur Cmpus, Walchand College of Engineering, Sangli,
Government College of Engineering, Karad, Walchand
Institue of Technology, Solapur, SVERIs College of
Engineering, Pandharpur, VJTI Mumbai, media houses,
several Net cafe and others.
B. Interviews
Interviews with police officers were conducted in order to
shed more light upon the non-existent cyber crime record. The
interviews were conducted with Deputy Commissioner of
978-81-909376-6-5 2013IEEE
Page 331
V.
CURRENT STUDY
The current study is designed as a illustrate study. Its
purpose was to provide a more up to date prospective on what
computer forensics researchers and practitioners experience
was major issues facing the discipline[4,7]. The findings from
the study will be used to determine plan and policy and
technique for addressing these issues, and to focus research
and funding efforts.
A. Method
1. Participants
The respondents in the study were researchers, students,
academics, and private/ public sector practitioners in the area
of computer forensics (N = 60). As the study asks for
unidentified responses to the survey question, no respondent
demographics were available. Participation in the study was
completely voluntary and no incentives were provided[5].
2. Procedure
978-81-909376-6-5 2013IEEE
Page 332
B. Results
1. Descriptive Analysis
The data were examined using descriptive statistic
analysis. The data were initially grouped into ten high order
categories. These categories were: tools, theory,
education/certification/standards, data acquisition, encryption,
evidence correlation, technologies, legal justice system,
funding, and other[5]. Each respondents answers were placed
into one of the ten categories. If two or more of a respondents
answers were of the same category, they were combined and
scored as a single item in that category (e.g., DES, AES, RSA,
Encryption - scored as encryption). A frequency analysis
indicated that the category of education was the most
frequently reported category (18%), and once the category
other was factored out, funding was the least reported (4%)
[1,4,9] (observe the Table 1). Chart 1 shows the relative
frequencies of each of the reported categories.
VI.
SUGGESTION
The researcher believes that prevention is best solution to
curbing the increasing number security violations on the net.
However, it may not be feasible to prevent all incidents, and
978-81-909376-6-5 2013IEEE
Page 333
A. Sensitization
There is need for setting up a public facility (preferably
with a presence on the internet) where victims can report
incidences. The public need a lot of sensitization and training
on what computer crimes are, in which forms they can
manifest, how to detect them, what to do after detection and
how to prevent and minimize them. The Police should also
endeavor to build trust and confidence in the population by
using the media and otherwise, so that more such incidents
are reported to them for proper and unified record keeping.
B. Internet sort out
Countries implementing Internet filtering at client, Internet
Service Provider (ISP) and government levels would prevent
access to illegal websites like those promoting concepts like
drug use, gambling, immorality, pornography, bomb making
recipes, terrorism and the like. Legislative organs can
mandate a body to filter all incoming web traffic before it is
accessed by Internet users in that country and block away
websites that pose security threats to the users. Internet
Service Providers are also in position to protect their clients
against most cyber attacks like distributed denial of service
attacks, email spoofing, SPAM and the like if they were only
allowed to do it.
C. Guideline of Net Cafes
A crime committed in a public facility like an internet cafe
will be very hard to detect and identification of the culprit
impossible. Setting up policies like supervision of children or
always logging onto system resources using the unique
identifiers (like smart cards, passports or national identity
cards) as usernames will simplify process of tracking the
culprits.
D. Modification of Laws
Performing global cyber laws that deal with harmonization
and standardization of computer crime would bring us closer
to attaining total justice to cybercrime victims. Although a
number of states have performed cyber laws and have
punished criminals within their jurisdiction, they are
dominated by the developed sates such as Maharashtra,
Karnataka, Gujarat. Most developing states like Bihar,
Madhya Pradesh, Punjab have not yet perform e-laws and
we recommend that they urgently incorporate them into the
Laws of the land. Harsh punishments should be given to
defaulters so that people fear to commit these acts and
victims motivated to report them. This would prevent
escalation of cases and further loss of money, time, data and
equipment.
E. International Co-operation and Further Research
States should actively work together and strengthen
research activities that will explore new techniques and
procedures that will combat the rate at which cyber crime
spreads and the ease at which they can be conducted.
978-81-909376-6-5 2013IEEE
VII.
CONCLUSION
Cyber crime is soundless but general even in the
developing and developed states like Maharashtra. Cyber
crime examples are mainly talk about publicly and the
victims suffer in calm, while the perpetrators continually hide
under the invisibility of the cyber world. As much as 67% of
Internet users in Maharashtra have suffered losses caused by
Internet crimes. Furthermore, 17% have confessed to having
beginning cyber crimes. It is hard to convict cyber criminals
because of two major reasons. Firstly, few states have
performed e-laws and the existing ones are not enough in
criminal cause because of jurisdiction difference especially
when the investigation go beyond borders. Secondly, get hold
of proof of computer crime that would stand in courts of law
is lacking in many states since the field of computer forensics
is still relatively new and lacks enough text and knowledge.
Cyber crime is a serious threat to the security of cybercitizens
and all states of India should take it seriously.
Although the findings of the current study are of interest,
caution must be taken when making any sweeping
generalizations. The fact that the N size was only 60, while
sufficient for statistical analysis, reduces the confidence in
generalizing the results to the larger computer forensics
population. Future research should sample a larger number of
respondents, collect detailed demographics information and
look at not only identifying issues, but also obtain feedback
on methods for addressing these issues.
REFERENCES
[1]The
World
Fact
Book
(2005)
Available:
http://www.cia.gov/cia/publications/factbook/geos/ug.html, May 2005.
[2]Joseph Migga Kizza, Ethical and Social Issues in the Information Age,
Second Edition, Springer, 2003.
[3] Boda Mash, International Law and Cyber crime Paper presented at a
seminar on Cyber Liability, 25 - 26th November 2002, Pune, India.
[4] InterGOV International, International Web statistics report 2002,
Available:
http://www.intergov.org/public
information/general
information/latest web stats.html. Accessed in January 2005.
[5] Sophos Anti Virus Company, War of the worms: Netsky-P tops list of
year's worst virus outbreaks, 2004 Press Release Available:
http://www.sophos.com/pressoffice/pressrel/uk/20041208yeartopten.html
[6] IC3 2004 Internet Fraud - Crime Report, National White Collar Crime
Center (NW3C), 2005. Available:
http://www.ifccfbi.gov/strategy/2004_IC3Report.pdf
[7] All net Available: http://www.all.net/CID/Threat/Threat22.html,
February 2004
[8]Asian School of Cyber Laws Available at: http://www.asianlaws.org,
May 2004
[9]The Internet Service Unit Available at http://www.isu.net.sa/index.htm,
March 2004
[10]Jonathan Zittrain and Benjamin Edelman, Berkman, Documentation of
Internet Filtering in Saudi Arabia Berkman Center for Internet at Harvard
Law School, Available:http://cyber.law.harvard.edu/filtering/saudiarabia/
[11]Ssemujju Ibrahim Nganda & Halima Abdallah, Interpol pursues
Zzimwe fraud case, The Weekly Observer, 13th January 2005.
[12]Davis Weddi and Steven Candia Porn web site sells Maharashtrans,
Sunday Vision Newspaper, 24th July, 2005.
[13]The Valencian Newspaper Internet Kimansulo targets Maharashtrans,
23rd July 2005. Available:
http://www.thevincentian.com/forum/forum_posts.asp?TID=43&PN=0&TP
N=29
[14] Kevin Mandia, Chris Prosise, and Matt Pepe, IncidentResponse and
Computer Forensics, McGraw-Hill Osborne Media, 2 edition, 2003.
Page 334
[26] A case for forensic tools in Cross Domain data transfers of SANS
institutes InfoSec reading room.
[27] An Explanation of Computer Forensic by judd Robbins
[28] Cyber Forensic : A field manual for collecting examining and
preventing evidence of computer crimes by Albert J Marcella.
[29] Issues in Forensics by Sonia Bui, Michelle enyeart
[30] Michael Kunz and Patrick Wilson (2004) Computer Crime and
Computer Fraud, University of Maryland, Department of Criminology and
Criminal Justice.
[31] Horcheng Wai-2002 Research in Computer Forensic Thesis
[32] Computer Forensic, Cyber Crime and steganography.
[33] Warren and Jay G. Heiser Computer Forensic : Incident Response
Essentials. Addison Wesley, Boston 2001.
[34] The role of Digital Forensic in Cyber Command and Control by
Heather M. B. Dussault, Chet J. Maciag.
[35] A Digital Forensic investigation model for business organization by
Jock Forrester and Barry Irwin.
[36] Risk of Live Digital Forensic Analysis (2006) By B D Carrier
[37] Dr. Farooq Ahmed Cyber Law in India law on Internet.
[38] Cyber Law & Cyber Crimes Information Technology Act, 2000
with New IT rules, 2011 By Advocate Prashant Mali Snow White Pub.
Authors Biography:
D. S. Jadhav was born in India, Maharashtra, in 1979. He received the BCA, MCA, MBA degrees from Shivaji University, Kolhapur (MS), University of
Pune (MS) and Sikkim Manipal University respectively. He is registered student for PhD (2010) as a Research Scholar, from Solapur University, Solapur.
From 2008-2010 he was worked as lecturer Smt. K. W. College, Sangli. From 2010 to 2012 he was worked as Asst. Professor at Bharat Ratna Indira Gandhi
College of Engineering, Solapur (MS) and Sinhgad Institute of Computer Sciences, Pandharpur(MS) respectively. He has published more than 25 papers in
International and National journals and conference Proceedings. He is member of various National & International Professional Bodies and member of
Editorial / Reviewer of various International Journals. His research interest includes Cyber Crime, Cyber / Computer Forensic, Information Security.
V. D. Parode was born in India, Maharashtra, in 1984. He received the BSc, MCA degrees from Amravati University, Amravati (MS), University of Pune
respectively. He is registered student for PhD(2011) from Bharthiar University, Coimbatore. From 2009 2010 he worked as lecturer IMS College, Warud
and from 2010 to till date he is working as Asst. Professor at Sinhgad Institute of Computer Sciences, Pandharpur(MS). He has published more than 6 papers
in International & National journals and conference Proceedings. His research interest includes Information Security and Information Privacy.
Y.C. Dige was born in India, Maharashtra, in 1982. He received the BCS, MCA degrees from Shivaji University, Kolhapur (MS).He worked as Sr. software
Engineer and having 3.5 years of experience in industry. From 2012 to till date he is working as Asst. Professor at Sinhgad Institute of Computer Sciences,
Pandharpur(MS). He has published more than 4 papers in International & National journals and conference Proceedings. His research interest includes
Information and Communication Technology.
Dr. S. K. Patil was born in India, Maharashtra, in 1962. He received PhD from, Swami Ramanand Tirth Marathwada University, Nanded. He worked as
Lecturer, Assistant Professor & now he is working as Associate Professor & Head of Department at BPSCC, Barshi, (MS). He has published more than 40
papers in International and National journals and conference Proceedings. He is member of various National & International Professional Bodies and member
of Editorial / Reviewer of various International Journals. His research interest includes Traditional Law, Cyber Crime, Cyber / Computer Forensic,
Information Security, Commerce & Management.
978-81-909376-6-5 2013IEEE
Page 335