Page 145 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 145

E-Commerce and E-Business



                          It identifies patterns in intruder activity and works with other security organizations to resolve major
                          security issues. It also publishes many advisories, guidelines, and best practices to promote awareness
                          about security among the cyber community.
                          11.3.2   Functions of CERT-In
                          Under Section 70-B (4), as  inserted by the recent Information Technology (Amendment) Act, 2008,
                          CERT-In has been designated to serve as the national agency to perform the following functions in the
                          area of cyber security:
                          1.  Collection, analysis, and dissemination of information on cyber incidents.

                          2.  Forecast and alerts of cyber security incidents.
                          3.  Emergency measures for handling cyber security incidents.
                          4.  Coordination of cyber incidents response activities.
                          5.  Issue guidelines, advisories, vulnerability notes, and whitepapers relating to information security
                              practices, procedures, prevention, response, and reporting of cyber incidents.

                          For carrying out the activities, the CERT-In has been  vested with authority to give directions to the
                          service providers, intermediaries, data centers, and any other person.
                          11.4   Summary

                          •   A cyber threat is an intended or unintended illegal activity that could lead to unpredictable,
                              unintended, and adverse consequences on a cyberspace resource.
                          •   Cyber attacks can be categorized as network based and executable based attacks.
                          •   Executable based attack happens when a  program  is executed on the target computer system
                              through either of the following - virus, Trojan, worm, and spam.
                          •   Cyber attacks are commonly directed towards economic and financial institutions.
                          •   The first recorded cybercrime took place in the year 1820.
                          •   Proper reporting of cybercrimes helps the policy makers to know about the trends and to allocate
                              resources to adequately tackle newer crimes.
                          •   Governments should engage academic institutions to educate the common man about the dangers
                              of cybercrime.
                          •   Indian Computer Emergency Response Team (CERT-In) is a government-mandated information
                              technology (IT) security organization that is responsible for handling computer security incidents,
                              reports on vulnerabilities. It also promotes effective IT security practices throughout the country.

                          11.5   Keywords
                          Computer Vandalism: Computer vandalism is a program that performs malicious functions such as
                          extracting a user's password, other data, or erasing the hard disk.
                          Defamation: It is a false communication that harms the reputation of an individual, business, product,
                          group, government, or nation.  The claim may be expressly stated or implied to be factual.
                          Self-replicating: It is the ability to produce copies of itself.
                          Spyware: Software installed unintentionally, that intercepts personal data and transmits the information
                          to a third-party for commercial gain.
                          11.6   Self Assessment

                          1.  State whether the following statements are true or false:
                              (a)  Virus attacks modify normal program in order to perform fraudulent activities in addition to
                                  the usual function of the program.




                          138                  LOVELY PROFESSIONAL UNIVERSITY
   140   141   142   143   144   145   146   147   148   149   150