Because, Cyber Crime usually has an impact on three things close to us – Identity,
Privacy and Finances. A unique feature of cybercrime is that the consequences aren’t
‘visible’ instantaneously as with other forms of crimes like murder, burglary, kidnapping,
etc. Also, the time interval between the occurrence of the crime and the victim’s
realization can sometimes be so long as to eliminate all possibilities of collecting
A very common form of Internet fraud is the distribution of rogue security software.
Internet services can be used to present fraudulent solicitations to prospective
victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud
to financial institutions or to others connected with the scheme.
Identity theft is a form of stealing someone's identity in which someone pretends
to be someone else by assuming that person's identity, typically in order to access
resources or obtain credit and other benefits in that person's name. Identity theft
occurs when someone uses your personally identifying information, like your name,
user id or credit card number, without your permission, to commit fraud or other
Phishing refers to the process of imitating legitimate companies in emails or creating
fake Web sites designed to look like a legitimate Web site in order to entice users
to share their passwords, credit card numbers, and other personal information. The
perpetrator then uses the information to steal the target's identity or to sell
that identity to others. Users need to be educated not to give away personal information
in response to an unsolicited email.
The phrase "Man-in-the-Middle Attack" is used to describe a computer attack during
which the cybercriminal funnels communication between a consumer and a legitimate
organization through a fake Web site. In these attacks, neither the consumer nor
the organization is aware that the communication is being illegally monitored. The
criminal is, in effect, in the middle of a transaction between the consumer and
his or her bank, credit-card Company, or retailer.
The man-in-the-middle server electronically “eavesdrops” on every keystroke, giving
the criminal username, password, and account information. They employ Spyware and
other Malware that when loaded on the consumer’s computer redirects the Web browser
to the fake site. The most technically competent manipulate the real Web site so
that visitors are directed to the fake site.
Digital Signature Certificates (DSC) is considered to be one of the strongest tools
to Cyber Security.
DSC uses a very complex algorithm to generate a pair of asymmetric keys – Public
and Private Key, wherein the private key is held securely by the user and public
key is available publicly. When a user appends DSC to an electronic document or
electronic transaction, the private key hashes the content of the document or transaction
and uses the private information of the user in the private key to sign the document
or transaction and this document or transaction is encrypted at the signor’s end.
This signed document or transaction is verified with the corresponding public key
and decrypted by the authorized person.
If you feel that you are the victim of a cybercrime, as per the amendments to the
Information Technology Act 2000, the minimum rank of investigation of cybercrimes
is POLICE INSPECTOR and any jurisdictional police station can register and investigate.
e-Mudhra Authentication Server is a pluggable server with strong access control
to online applications and maintains records of transactions. e-MAS offers a list
of features like effective authentication, integrity, non-repudiation , hence most
suited for applications which require high level security. Read
e-Mudhra Web Signer, an online form signing solution can be easily integrated into
the existing workflow. The solution supports the signing of Text, Image, XML and
PDF forms. The solutions can be customized according to the needs of the clients
enabling them to reap maximum output out of the implemented solution.
The e-F16 is an application developed to help companies avoid the cumbersome process
of physically printing and Signing & Distributing the Form 16s, and transition to
a greener way of e-mailing Digitally-Signed Form 16S into employees' mailboxes.
ePDFSigner is a desktop application that makes it easy to use digital signatures,
and strong encryption on business documents. By using ePDFSigner, anyone can easily
sign or protect a business document. These might be internal or external financial,
HR, legal, sales and marketing, support services, compliance, R&D, or consultancy
documents. Read more