Online network has empowered global
connectivity and economic growth but where is the peace with hole in the pocket
due to cyber crime intensity after latest wanna cry including ransomware
malicious virtual system attack.
Fastest solution through cyber technology
appears best but is it on the other end a trap? Is it easy to take to crime for
everyone? Answer is definitely ‘NO’. Logistically if it is possible for
everyone to do crime - be it cyber or other then hardly there would have been
lawmakers and victims.
Big question is who protects the innocence of
the innocent? In Northeast, India especially how well versed people are in
system protection rules who are processing online network through computer or
laptop or mobile? It is a technical matter which even pronounced sales
engineers of showroom won’t reveal details or guide security measure.
Non-technical literate to illiterate are prone to vulnerability of malicious
online attack.
Assam CID officials arrested Daipayan Das, 30,
from Morigaon on accusation of posting pictures and phone numbers of several
girls including some anchors of a local satellite TV channel, as call girls by
creating a Facebook page. This accusation case against Daipayan Das for
misguiding and blackening a person’s identity in public was registered under
Sections 66A and 67A of IT Act, 2000.
Potency of growing cyber crime could be
estimated from seven years back activities of Das to make attempt in cracking
IIT sever codes of Guwahati just for fickle personal purpose to defame his love
interest by creating a fake profile of her on top social media.
This NIT Jaipur bachelor's degree electrical
engineering student Das had first conceived criminal concept by creating a fake
Facebook profile page on the interested girl during his study in Guwahati IIT
according to Assam CID cyber crime.
In another 2013 cyber defamation case on 7th
Nov in Assam was created through fake page article post with lynching remark by
highlighting 43 BC annual 'Assam Rape Festival’ concept that lead to state wide
agitation after viral spread through social media.
On this sensitive regional issue the CID of
Assam Police had initiated suo motu investigations for creating public offence
by tarnishing state’s image. In this investigation process CID additional
superintendent of police Nirmal Baishya who was in charge of this cyber crime
had exposed Uganda source involvement with U.S., Houston web host.
According to cyber crime cell Kolkata usually
there are various crimes conducted through online process like virus
dissemination, denial of service attack(DoS), cyber stalking, hacking, software
piracy, phishing and bank card fraudulence.
At this vulnerable point unaware user visiting
the sites with malicious duplicate links becomes victim when they click to the
link for information. The cyber security personnel can track sources through
server logging.
Server logging enables cyber security person
to track the soft copy of the defaced web page from its hard copy in case of
deface complain. Criminal track could be derived from the soft
copy of compromised data stored in the victim’s server.
As per to Global Jurisdiction the Information
Technology Act of India could empower the CIDs (Criminal Investigation
Departments) of any states to open up multiple Cyber Crime Cells to act upon
the lodged cyber crime complaint
Advanced process to access cyber solution is
research lab where forensic reports are availed according to Kolkata cyber
crime branch of India.
But why labs for cyber crime tracking as cyber
attacker could not harm physically? Reason simply because the cyber criminal
can be potent in its attack by using sophisticated technology to attack
virtually by debiting money from the account and defacing victim in social
media circuit.
Cyber Labs Empowers:
- To develop cyber crime investigation skills.
- To update on latest cyber crime techniques.
- To process hard disk cloning in few minutes.
Such lab is yet to be launched in Assam
according to Nirmal Baishya, Dy.SP(CID) though Assam government has already
sanctioned fund for installation of the latest forensic lab in Guwahati capital
city. Before proceeding into major
forensic lab set up in various economic centres of the state like Jorhat,
Tezpur, Dibrugarh and others.
For validation of one’s standpoint, a cyber
victim before lodging a complaint need to produce any valid information or documents.
Usually one is inquired on possible suspect who dares to operate on the system,
attack prone factors that relates to hacking, time of attack and suspect of
possible system in the computer network zone and numbers of affected systems.
On the query how the general public apart from
organizations with cyber security support could be prepared for cyber attack, Dy.SP(CID),
Assam replied “Gadget friendly people should not avert security measures as
prescribed in the system before processing online network. Advanced version
gadgets with online facilities enable software like the OS of the system or
internet support software with higher intruder protection options. The options
should be enabled before using the system for online operation. Any pop ups or
mail threads will be prevented from harming the system function.”
Ethical hackers of prominent institutions has
to say on the contrary that despite system’s defense features a hacker can
still process their intrusion and steal information. But only if the user
clicks the fake link or fabricated thread with company’s name you are associated
with. Especially bank sectors where on to the sent fake link the hackers will
add words analytically like ‘to secure your money or for further furnish of
information to secure your bank account.’ At this point the user becomes
vulnerable to cyber trap and makes the major fault by clicking the link.
Assam CID Additional SP, K.K. Baishya on the query as to how
to prevent hackers from computer access added, “Only reliable sources one
should take information and make downloads. Pay careful attention to system’s
firewall instruction to resist unauthorized activity. Reliable virus scanner like
quick heal and other reliable programs should be installed and maintain weekly update
of the scanning version as signaled by the software with internet
accessibility.”
Users not sensitive to possible hackers’
attack make the major fault by storing confidential information like financial
account numbers, confidential personal details and personal identity documents
etc., in their system. It is advised to transfer the confidential details in
higher capacity portable storage drive.
It’s time cyber security need to enhance its
technological integrity to root out cyber crime as its illegal activities has
taken to such degrading extent that by using user’s ISP account can do
scandalous job like share of dirty video, audios and information to an unknown
party.
NEIC Analytic Report : SUMI
No comments:
Post a Comment
Your highlight can be precious enough to make a change in the present system for better progress of the nation and so make a step to comment.