Home       Top Rated       Submit Article     Advanced Search     FAQ       Contact Us       Lawyers in India       Law Forum     RSS Feeds     

Register your Copyright Online

We offer copyright registration right from your desktop click here for details.

Latest Articles | Articles 2014 | Articles 2013 | Articles 2012 | Articles 2011 | Articles 2010 | Articles 2009 | Articles 2008 | Articles 2007 | Articles 2006 | Articles 2000-05

Search On:Laws in IndiaLawyers Search

Mutual Consent Divorce in Delhi
We provide fast, cost effective and Hassle free solution.
Contact us at Ph no: 9650499965 (Divorce Law Firm Delhi)
File Caveat in Supreme Court
Contact Ph no: +9650499965

Main Categories
 Accident Law
 Animal Laws
 Aviation Law
 Bangladesh Law
 Banking and Finance laws
 Case Laws
 Civil Laws
 Company Law
 Constitutional Law
 Consumer laws
 Contracts laws
 Criminal law
 Drug laws
 Dubai laws
 Educational laws
 Employment / Labour laws
 Environmental Law
 family law
 Gay laws and Third Gender
 Human Rights laws
 Immigration laws
 Insurance / Accident Claim
 Intellectual Property
 International Law
 Juvenile Laws
 Law - lawyers & legal Profession
 Legal Aid and Lok Adalat
 Legal outsourcing
 Media laws
 Medico legal
 Real estate laws
 Right To Information
 Tax Laws
 Torts Law
 Woman Issues
 Workplace Equality & Non-Discrimination
 Yet Another Category

More Options
 Most read articles
 Most rated articles

Subscribe now and receive free articles and updates instantly.


Published : September 14, 2010 | Author : nikhilb09
Category : Cyber Law | Total Views : 11457 | Rating :

Nikhil Borana Studying in Gujarat National Law University.

Cyber Crime - Issues Threats and Management

Book Review
Cyber Crime – Issue threats and management is a masterwork by Atul Jain. Atul Jain has been a brilliant student in engineering from Delhi and Nagpur Universities. His two volume work deals with a variety of subjects related to Cyber Crime. In volume 1, he speaks of subjects like nature, tactics, chronologies, consequences of cyber crime, global effort to combat cyber crime etc. This book offers a persuasive study of the damaging potential of cyber attacks on almost all aspects of human endeavor. It also describes the actions that need to be taken to control the threats from cyber attacks.

In volume 1 named ‘Managing Cyber crime to Cyber warfare’ the author commence his 1st chapter ‘Nature and Consequences of Cyber Crime’ by explaining about what is crime and has been in the past and then relates to the world of internet that how Cyber crime has emerged as a new field in the crime. He states that though computers and internet have created phenomenal possibilities to undertake many human problems, but they have a dark side in the sense that they are the cause of cyber crimes and raises issues relating to time period, jurisdiction, privacy and anonymity. Cybercrime presents before the nations of the world a concern by many international organizations, the most important being the problems relating to the law enforcement and encounters in applying the existing law. The author, in depth, talks of range of cybercrime activities covering scenarios like hacking, fraud, gambling, child pornography, cyber terrorism etc.

Now the author describes about the tactics and various offences relating to cyber crime. The author has categorized cyber offences into four types which are network-related, data-related, access-related and computer-related and elaborates about each of them. Offences related to e-mails are very frequent in today’s times and the author has also thrown light on this issue which bears contemporary significance. It is commendable to note that the author has described the each and every aspect of the various offences thoroughly. The author further mentions about the problem in recording the statistics of the cyber crime as well as difficult to quantify the loss of access or services to users and consequent damage, the loss of valuable data and the loss of revenue from site operations and lack of technical knowledge in the society regarding cyber crime. Further problems arise with mass victimization caused by offences such as virus propagation, because the numbers of victims are simply too large to identify and count, and because such programs can continue creating victims long after the offenders have been caught and punished.

In his chapter ‘Chronology of Cyber crimes’ the author has dealt with the history of cybercrimes with significant real life examples of cybercrimes starting from the 1960s and continuing till 2001 and so on. This helps the reader in getting a fine idea about the emerging trend of cybercrimes that have been taking place in the world .Some of the brilliant examples given by the author in his book include the Melissa virus which took advantage of a flaw in the widely used document designing software Microsoft Word and damaged computers and the computer virus named ‘I love you’ which spread in the year 2000 affecting thousands of corporate websites causing companies to shut down their email systems to stop its spread.

The author emphasizes on the cyber terrorism, its impact which goes deeper into the economic and social fabric of our life. He believes that humans shall continue to enjoy the benefits of the internet but at the same time they need to be aware of the dangers and pervasive drawback of cyber crime. The author’s view that cyber crimes are inevitable indeed appears to be true considering the chronological examples of cyber crimes stated in this very book that have been occurring since long ago. According to the author, there is need to protect important information from being leaked. Dealing with cyber crimes is much more compound than before because in the networked world, the new generation of vandals and data thugs does not need to have physical contact with the victim. Providing security against cyber-crimes must be balanced so as not to cause inconvenience to the user as the author says with the reasoning that human nature is such that people will look for shortcuts to complex the processes.

Providing much of information about guidelines to safe computing, the author has dealt with privacy issues including that related to e-mails and has elaborately talked about the measures to protect the computer systems against cyber crimes. The saying that ‘prevention is better than cure’ being true still does not apply to cases where the harm has somehow been done and the question to be answered in such a case is ‘what is to be done next to deal with the problematic situation? ’. In this book though, the author has not only talked of the prevention but has also dealt with the aspect of the aftermath by stating techniques and plans to respond to a security incident in different scenarios that commonly occur when cybercrimes are used to target organizations. The author has dedicated many pages of his book on the chapter dealing with cyber security and this fact not only highlights the importance of the topic of cyber security dealt by the author but also is an evidence of the author’s sincere effort in trying to make the reader understand the importance of cyber security.

The author has stated that to fight cybercrime, proper legislation would have to lie in two distinct areas- national legislation to cover issues of internal responsibility and liability, and international legislation relating the inter-state aspects of jurisdiction, ownership, responsibility and liability and has elaborated on both of the categories. The account given by the author not only gives knowledge to the reader about global efforts against cybercrime but also helps in understanding as to what difficulties are being faced by the nations of the world in fighting cyber-crime, what is the reason for such difficulties and upto what extent has the effort to combat cyber crime been a success.

The author, in the last chapter of this book, has talked about managing cyber crime where he has stated the recommendations given by the Information Security Permanent Monitoring Panel that was established in 2001 in the framework of Planetary Emergencies. In September 2002, these recommendations had been submitted to the Secretary General of the UN, the President of the General Assembly and the Presidents of the relevant Main committees. The author hereby has raised important questions such as ‘Why should the UN have the Leading Role in intergovernmental activities on Cyberspace?’, ‘Why a law of Cyberspace?’ and ‘How comprehensive a consensus is needed?’ and has ornately discussed on each of them.

This book attempts to provide a greater understanding and awareness of the world of information insecurity and the impending natures of cyber-threats through the identification of the problem, potential solutions, and the development of an action plan. The book attempts to highlight the techniques that cyber-criminals are likely to use as their primary means of communication in the current state of the technology, such as untraceable emails, encryption, and digital compression.

This book is a useful and an interesting book to read for people who want to gather in-depth knowledge about cyber crime as it gives a good idea of what cybercrime is, how is cybercrime different from ordinary crimes, why is cybercrime difficult to tackle, what tactics do cyber offenders use, what are the consequences of cybercrime, what has been done by the world’s nations to tackle cybercrime, what are the cyber crime laws around the world and throws light on several other relevant aspects.

Though, this book is interesting and is written in easy language, however, at some places, a reader who is a ‘complete’ layman in terms of computers and other related technology having no knowledge about the same may find this book complex because of the use of technical terms.

Book: Cyber Crime- Issue Threats and Management: Volume 1-‘Managing Cyber Crime to Cyber Warfare’
Author: Mr. Atul Jain
Publisher: Isha Books, Delhi.
Edition: 2005
ISBN No.: 81-8205-107-X

Authors contact info - articles The  author can be reached at: nikhilborana@legalserviceindia.com

1 2 3 4 5
Rate this article!     Poor

Most viewed articles in Cyber Law category
• Offences & Penalties under the IT Act, 2000
• Issue of Jurisdiction in Combating Cyber Crimes: Issues and Challenges Pornography and Indian Jurisdiction
• Online Copyright Infringement & Liability of Search Engines
• Cyber Torts
• Email Privacy & Anti-spam Law
• Software Licensing Agreement
• Electronic Signature: Legal and Technical aspect
• White Collar Crimes - cyber crimes
• Prevention of Cyber Crime
• Cyber Forensics & Electronic Evidences: Challenges In Enforcement & Their Admissibility
• Historical Perspective of Terrorism & Cyber Terrorism
• Telecommunication laws in India and its drawbacks
• Cyber Crime - Issues Threats and Management
• Cyber Terrorism - Quick glance
• Keyword Trademark Infringement - A Countrywise Analysis
• Perspective of Information Technology
Most recent articles in Cyber Law category
• Jurisdictional Challenges in Online Transactions
• E-Evidence in India
• Cyber Jurisprudence An Internalisation In Indian Matrix
• A study of Formation and challenges of electronic contract in cyberspace
• Electronic Signature: Legal and Technical aspect
• Proposed Amendments Affecting Transmission Service Provider
• Cybersquatting and Domain Names
• Right to Privacy and Social Networking Websites
• Data Privacy And Cyber Security Policies Shaping The Legal Outsourcing Landscapes In India
• Telecommunication laws in India and its drawbacks
• A Clarion Call To BPOs In India
• Social Media Governance In India
• Prevention of Cyber Crime
• Issue of Jurisdiction in Combating Cyber Crimes: Issues and Challenges Pornography and Indian Jurisdiction
• Cyber Crime: Default in success of conviction due to lack of jurisdiction
• Cyber Offences - A Technological Termite

Article Comments

there are no comments...

Please login or register a new free account.

Random Pick
Corporate Social Responsibility (CSR) is one of the heated concepts in today’s world. It is what business does over and above the statutory requirement for the benefit of the society

» Total Articles
» Total Authors
» Total Views
» Total categories

Law Forum

Legal Articles

Lawyers in India- Click on a link below for legal Services

lawyers in Chennai
lawyers in Bangalore
lawyers in Hyderabad
lawyers in Cochin
lawyers in Pondicherry
lawyers in Guwahati
lawyers in Nashik

lawyers in Jaipur
lawyers in New Delhi
lawyers in Dimapur
lawyers in Agra
Noida lawyers
lawyers in Siliguri

For Mutual consent Divorce in Delhi

Ph no: 9650499965
For online Copyright Registration

Ph no: 9891244487
Law Articles

lawyers in Delhi
lawyers in Chandigarh
lawyers in Allahabad
lawyers in Lucknow
lawyers in Jodhpur
Faridabad lawyers

lawyers in Mumbai
lawyers in Pune
lawyers in Nagpur
lawyers in Ahmedabad
lawyers in Surat
Ghaziabad lawyers

lawyers in Kolkata
lawyers in Janjgir
lawyers in Rajkot
lawyers in Indore
lawyers in Ludhiana
Gurgaon lawyers


India's Most Trusted Online law library
Legal Services India is Copyrighted under the Registrar of Copyright Act ( Govt of India) © 2000-2017
 ISBN No: 978-81-928510-1-3