Today’s society is facing a new menace. This evil has its origin from the growing dependence of computers in our day today lives. Good afternoon respected judges.... My topic for today is “Detection of Cyber Crime”.
The term 'cyber crime' has not been defined in any Statute or Act. A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both”. These acts committed are punishable by the IT Act.
Cyber Crimes - Three Categories: 1. Against Property – Financial crimes – cheating on-line – illegal funds transfer & spoofing i.e. creating fake websites. 2. Against Persons – On-line harassment, Cyber Stalking, Obscenity, Pornography, Identity thefts. 3. Against Nations – Cyber Terrorism – stealing of critical & sensitive information of a country. Cyber crime is known to change the face of crime for it is more lucrative and harder to detect. In order to detect cyber crime some techniques are used, which i shall now elaborate on.
Typical electronic crimes are detected by using 1 or more of the following techniques:- 1. Tripwires 2. Configuration checking tools 3. Honey pots 4. Anomaly detection systems 5. O/S commands
Starting with TRIP WIRES, they are s/w programmes that take snapshots of key system characteristics, which can be used to detect critical file changes. Trip wires help in the detection of cyber crime because most hackers make modifications when they install backdoor entry points or alter file systems and directory characteristics unknowingly while snooping.
The 2nd technique is CONFIGURATION CHECKING these are tools that are also known as vulnerability assessment tools. These are s/w programmes used to detect crimes from non-secure systems. Configuration checking can be used as a tool and also can provide evidence for a cyber crime.
The