Cyber Crimes in Banking Sector
Cyber Crimes in Banking Sector
Cyber Crimes in Banking Sector
CHAPTER 1
INTRODUCTION TO CYBER CRIME
:-
CHAPTER -2
CYBER CRIMES IN BANKS
3
Banks Frauds
Computer Fraud
Banks are the most Favorites destination of hackers. As AN Roy, commissioner of police,
Mumbai, avers, Hacking a website or writing a programmed that will spread virus on
computer will not earn money. By hacking website of a bank or stealing a credit card Pin, a
street smart program can, besides enfettering himself, cause a lot of dangerous to banks and
their customers alike.
BANK FRAUDS :
Fraud by Insiders.
Fraud by Others.
FRAUD BY INSIDERS
Rough trader
Fraudulent loans
Wire transfer fraud
Forged or fraudulent documents
Uninsured deposits
Theft of identity
Demand draft fraud
5
1. Rogue traders
A rogue trader is a trader at a financial institution who engages in unauthorized trading to
recoup the loss he incurred in earlier trades. Out of fear and desperation, he manipulates the
internal controls to circumvent detection to buy more time.
Unfortunately, unauthorized trading activities invariably produce more losses due to time
constraints; most rogue traders are discovered at an early stage with losses ranging from $1
million to $100 million, but a very few working out of institutions with extremely lax
controls were not discovered until the loss had reached well over a billion dollars. The size of
the loss is a reflection of the laxity in controls instituted at the firm and not the trader's greed.
Contrary to the public perception, rogue traders do not have criminal intent to defraud his
employer to enrich himself; he is merely trying to recoup the loss to make his firm whole and
salvage his employment.
2. Fraudulent loans
One way to remove money from a bank is to take out a loan, a practice bankers would be
more than willing to encourage if they knew that the money will be repaid in full with
interest. A fraudulent loan, however, is one in which the borrower is a business entity
controlled by a dishonest bank officer or an accomplice; the "borrower" then declares
bankruptcy or vanishes and the money is gone. The borrower may even be a non-existent
entity and the loan merely an artifice to conceal a theft of a large sum of money from the
bank. This can also seen as a component within mortgage fraud (Bell, 2010)
5. Uninsured deposits
A bank soliciting public deposits may be uninsured or not licensed to operate at all. The
objective is usually to solicit for deposits to this uninsured "bank", although some may also
sell stock representing ownership of the "bank". Sometimes the names appear very official or
very similar to those of legitimate banks.
Regular DD. Since they are insiders, they know the coding and punching of a demand draft.
Such fraudulent demand drafts are usually drawn payable at a distant city without debiting an
Account. The draft is cashed at the payable branch. The fraud is discovered only when the
bank's head office does the branch-wise reconciliation, which normally take six months, by
which time the money is gone.
FRAUDS BY OUTSIDERS
2. Cheque kiting :
Cheque kiting exploits a system in which, when a cheque is deposited to a bank account, the
money is made available immediately even though it is not removed from the account on
which the cheque is drawn until the cheque actually clears.
4. Accounting frauds :
In order to hide serious financial problems, some businesses have been known to use
fraudulent bookkeeping to overstate sales and income, inflate the worth of the company's
9
6. Booster cheques
A booster cheque is a fraudulent or bad cheque used to make a payment to a credit card
account in order to "bust out" or raise the amount of available credit on otherwise-legitimate
credit cards. The amount of the cheque is credited to the card account by the bank as soon as
the payment is made, even though the cheque has not yet cleared. Before the bad cheque is
discovered, the perpetrator goes on a spending spree or obtains cash advances until the
newly-"raised" available limit on the card is reached. The original cheque then bounces, but
by then it is already too late.
10
CHAPTER- 3
REASONS OF CYBER CRIMES
11
1. Capacity to store data in comparatively small space:The computer has a unique characteristic of storing data in a very small space. This allows for
much easier access or removal of information through either physical or virtual media.
12
2. Easy to access:The problems encountered in guarding a computer system from unauthorized access are that
there is every possibility of unauthorized access not due to human error but due to the
complex technology. By secretly implanted a logic bomb, key loggers that can steal access
codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and
bypass firewalls can be utilized to get past many security systems.
3. ComplexThe computers work on operating systems and these operating systems in turn are composed
of millions of lines of code. The human mind is fallible and it is not possible that there might
not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate
into the computer system using often more sophisticated means than originally anticipated by
the systems engineers.
4. Negligence: Negligence is very closely connected with human conduct. It is therefore very probable
that while protecting the computer system there might be any negligence, which in turn
provides a cyber criminal to gain access and control over the computer system. This
negligence is usually a property of under resourced IT security provisions and the
improvement of security barriers within software packages and network structures could lead
to improved security. Banks should work on improving awareness of the different threats that
currently exist, including e-mail fraud, phishing and malware.
13
14
2. Organized hackers
These kinds of hackers are mostly Organized together to fulfill certain objective. The reason
may be to fulfill their political bias, fundamentalism, etc. The Pakistanis are said to be one of
the best quality hackers in the world. They mainly target the Indian government sites with the
purpose to fulfill their political objectives. Further the NASA as well as the Microsoft sites is
always under attack by the hackers.
4. Discontented employees
This group include those people who have been either sacked by their employer or are
dissatisfied with their employer. To avenge they normally hack the system of their employee.
CHAPTER 4
TYPES OF CYBER CRIME
15
ATM Frauds
Credit card Frauds
Phishing
Identity Theft
Hacking
Electronic Fund Transfer Fraud.
ATM frauds
16
The traditional and ancient society was devoid of any monetary instruments and the entire
exchange of goods and merchandise was managed by the barter system. The use of monetary
instruments as a unit of exchange replaced the barter system and money in various
denominations was used as the sole purchasing power.
The traditional monetary instruments from a paper and metal based currency toplastic money
are in the form of credit cards, debit cards, etc. This has resulted in the increasing use of ATM
all over the world. The use of ATM is not only safe but is also convenient. This safety and
convenience, unfortunately, has an evil side as well that do not originate from the use of plastic
money rather by the misuse of the same. This evil side is reflected in the form of
That is a global problem. The use of plastic money is increasing day by day for payment of
shopping bills, electricity bills, school fees, phone bills, insurance premium,
travelling bills
and even petrol bills. The world at large is struggling to increase the convenience and safety
on the one hand and to reduce it misuse.
17
ATM fraud is on the rise, Law enforcement officials say, because thrives are becoming more
and more sophisticated. Criminal have become virus clever a finding new ways to access
your funds so consumer needs to pay careful attention to their bank statements in ceases
therere an authorized withdrawals because its more likely that someone has access to your
bank account information.
18
Some tech savvy thieves are placing ATM card skimming devices over the real card readers.
They will also place a tiny camera somewhere on the ATM machine so that the information of
the screen is recorded as well as your hand punching in your PIN numbers. All of this is often
transmitted to the thieves who are often sitting in a nearby car. They now have everything
they need to empty your account of its fraud. This kind of scam has been reported in just
about every major city in the world and people lose millions of dollars a year this way. Some
of the card skimmers and cameras may be easy to detect but some of them take a trained eye
and are only discovered when the ATMs is serviced by a professional. If you notice anything
out of the ordinary when using an ATM to withdraw funds you might consider trying another
machine and report your suspicions to the authorities.
19
A personal identification number (PIN, pronounced "pin"; often redundantly PIN number) is
a numeric password shared between a user and a system that can be used to authenticate the
user to the system. Typically, the user is required to provide a non-confidential user identifier
Or token (the user ID) and a confidential PIN to gain access to the system. Upon receiving
the user ID and PIN, the system looks up the PIN based upon the user ID and compares the
looked-up PIN with the received PIN. The user is granted access only when the number
entered matches with the number stored in the system.
Researchers say they have discovered a fundamental weakness in the system that banks use to
keep debit card pin codes undermine the entire debit card system. Using the methods outlined
by the researchers, a hacker could siphon of Thousands of PIN codes and compromises
hundred of banks. Criminals could them print phony debit cards and simultaneously
withdraw vast amounts of cash using ATMs around the world.
20
CASE STUDY
India's first Atm card fraud
The Chennai City Police have busted a global posse included in cyber crime, with the capture
of Deepak Prem Manwani (22), who was discovered in the act while softening into an ATM
21
22
23
24
25
Identity theft
Identity theft can be divided into two broad categories: application fraud and
account takeover.
Application fraud
Application fraud takes place when a person uses stolen or fake documents to open an
account in another person's name. Criminals may steal documents such as utility bills and
bank statements to build up useful personal information. Alternatively, they may create fake
documents. With this information, they could open a credit card account or Loan account in
the victim's name, and then fully draw it.
Account takeover
Account takeover takes place when a person takes over another person's account, first by
gathering personal information about the intended victim, and then contacting their card
issuer while impersonating the genuine cardholder, and asking for mail to be redirected to a
new address. The criminal then reports the card lost and asks for a replacement card to be
sent. They may then set up a new PIN. They are then free to use the card until the rightful
cardholder discovers the deception when he or she tries to use their own card, by which time
the account would be drained.
26
Skimming:
Skimming is the theft of payment card information used in an otherwise legitimate
transaction. The thief can procure a victim's card number using basic methods such as
Photocopying receipts or more advanced methods such as using a
small electronic device (skimmer) to swipe and store hundreds of
victims card numbers. Common scenarios for skimming are
restaurants or bars where the skimmer has possession of the victim's
payment card out of their immediate view. The thief may also use a
small keypad to unobtrusively transcribe the 3 or 4 digits Card Security
Code, which is not present on the magnetic strip. Call centers are
another area where skimming can easily occur. Skimming can also
occur at merchants such as gas stations when a third-party cardreading device is installed either outside or inside a fuel dispenser or
other card-swiping terminal. This device allows a thief to capture a
customers card information, including their PIN, with each card swipe.
27
Credit card fraud prevention when dealing with credit card customers
face-to-face
Ask for and check other identification, such as a drivers license or other photo ID.
Check to see if the ID has been altered in any way as a person trying to use a
stolen credit card may also have stolen or fake ID.
Examine the signature on the card. If the signature on the credit card is smeared, it
could be that the credit card is stolen and the person has changed the signature to his
or her own.
Compare signatures. Besides comparing the signature on the credit card with the
persons signature on the credit card slip, compare the signatures as well to those on
any other ID presented.
Have another look at the cards signature panel. It should show a repetitive colour
design of the MasterCard or Visa name. Altered signature panels (those that are
discolored, glued, painted, erased, or covered with white tape) are an indication of
credit card fraud.
Check the credit cards embossing. Ghost images of other numbers behind theembo
ssing are a tip-off that the card has been re-embossed. The hologram may be
damaged. (The holograms on credit cards that have not been tampered with will show
clear, three-dimensional images that appear to move when the card is tilted.)
28
Check the presented card with recent lists of stolen and invalid credit card numbers.
Call for authorization of the credit card remembering to take both the credit card
and the sales draft with you. That way if the customer runs away while youre making
the call, you still have the credit card. Ask for a Code 10 if you have reason to
suspect a possible credit card fraud, such as a possible counterfeit or stolen card.
Destroy all carbon copies of the credit card transaction, to ensure that no one can steal
the credit card information and help prevent future credit card fraud. Its also very
important to be sure that your staff is educated about credit card fraud.
PHISHING
29
Meaning of Phishing :
Phishing is the attempt to acquire sensitive information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money), often for malicious reasons, by
masquerading as a trustworthy entity in an electronic communication. The word is a
neologism created as a homophone of phishing due to the similarity of using fake bait in an
attempt to catch a victim. Communications purporting to be from popular social web sites,
auction sites, banks, online payment processors or IT administrators are commonly used to lure
unsuspecting victims. Phishing emails may contain links to websites that are infected
with malware. Phishing is typically carried out by email spoofing or instant messaging and it
often directs users to enter details at a fake website whose look and feel are almost identical
To the legitimate one. Phishing is an example of social engineering techniques used to
deceive users, and exploits the poor usability of current web security technologies. Attempts
to deal with the growing number of reported phishing incidents include legislation, user
training, public awareness, and technical security measures.
30
31
Dont click on any links in e-mails, and if you do end up clicking, dont enter any
sensitive information. If you get an e-mail from a person or institution you trust
seeking information, call up the helpline or any number that you know belongs to that
institution and verify.
Dont be taken in by e-mails that threaten to shut down your account if you do not
supply the information or promises of lottery winnings. These are usually faked.
If you are not sure about the site, try entering the wrong password. A fraudulent site
on the other hand will accept it.
If you think have fallen victim to a phishing attack immediately contact your
financial institution over the phone.
A good practice is to have different user names and passwords for different sites.
If you suspect a mail to be suspicious, forward it to the customer service E-mail for
the bank or institution in question.
Avoid filling out forms in e-mail message that ask for personal/financial privacy act
protected information.
Consider installing a web browser tool bar to help protect you from unknown
phishing fraud websites.
34
35
Your bills dont arrive on time. This could mean an identity thief has taken over your
credit card account and changed your billing address
36
You receive calls or letters about purchases you did not make
You notice charges on your financial account or billing statement that you did not make
You may also receive a call from your credit card company asking if you made any
outstanding charges or large purchases at an unusual location. This would be a tip- off
that your information has been taken even though your physical card wasnt.
HACKING
"Hacking" is a crime, which means an unauthorized access made by a person to cracking the
systems or an attempt to bypass the security mechanisms, by hacking the banking sites or
accounts of the customers.
If such crime is proved then for such hacking offence the accuse is punished under IT Act, for
imprisonment, which may extend to three years or with fine, which may be extended to five
lakh rupees or both. Hacking offence is considered as a cognizable offence, it also a bail able
offence.
Types of HACKERS
Hackers can be broken down in several ways. You can classify hackers based on their skills,
on their chosen specialty or a combination of both. This section described the various types of
hackers and provides an indication of classification by reviewing guppta, Laliberqate &
Kleviskys (2000) three tired system. Each new technology that is developed generates a new
specialization and new terms are created to describe these individuals.
Some of them term that is most common are:
1. Cracker
37
Raymond, author of The New Hacker's Dictionary, advocates that members of the computer
underground should be called crackers.
According to Ralph D. Clifford, a cracker or cracking is to "gain unauthorized access to a
computer in order to commit another crime such as destroying information contained in that
system". These subgroups may also be defined by the legal status of their activities.
2. Phreaker
Phreaking is a slang term coined to describe the activity of a culture of people who study,
experiment with, or explore telecommunication systems, such as equipment and systems
connected to public telephone networks. The term phreak is a sensational spelling of the
word freak with the ph- from phone, and may also refer to the use of various
audio frequencies to manipulate a phone system. Phreak, phreaker, or phone phreak are
names used for and by individuals who participate in phreaking. Phreaking consisted of
techniques to evade the long-distance charges. This evasion was illegal; the crime was called
"toll fraud.
3. Script kiddies
38
2. Software Piracy
Theft of software through the illegal copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the original. Retail revenue losses worldwide are
ever increasing due to this crime. It can be done in various ways- End user copying, hard disk
loading, Counterfeiting, Illegal downloads from the internet etc
39
CHAPTER -6
PREVENTION OF CYBER CRIME.
40
Fraud is a billion-dollar business and it is increasing every year. The PwC global economic
crime survey of 2009 suggests that close to 30 percent of companies worldwide have reported
being victims of fraud in the past year. Fraud involves one or more persons who intentionally
Act secretly to deprive another of something of value, for their own benefit. Fraud is as old as
humanity itself and can take an unlimited variety of different forms. However, in recent
years, the development of new technologies has also provided further ways in which
criminals may commit fraud. In addition to that, business reengineering, reorganization or
downsizing may weaken or eliminate control, while new information systems may present
additional
Traditional methods of data analysis have long been used to detect fraud. They require
complex and time-consuming investigations that deal with different domains of knowledge
like financial, economics, business practices and law. Fraud often consists of many instances
or incidents involving repeated transgressions using the same method. Fraud instances can be
similar in content and appearance but usually are not identical.
The first industries to use data analysis techniques to prevent fraud were the telephone
companies, the insurance companies and the banks (Decker 1998). One early example of
successful implementation of data analysis techniques in the banking industry is the FICO
Falcon fraud assessment system, which is based on a neural network shell.
Retail industries also suffer from fraud at POS. Some supermarkets have started to make use
of digitized closed-circuit television (CCTV) together with POS data of most susceptible
transactions to fraud.
Internet transactions have recently raised big concerns, with some research showing that
internet transaction fraud is 12 times higher than in-store fraud.
Fraud that involves cell phones, insurance claims, tax return claims, credit card transactions
etc. represent significant problems for governments and businesses, but yet detecting and
preventing fraud is not a simple task.
41
a computer in general: for example, One l de Guzman, the computer programmer charged
with purportedly writing the I LOVE YOU computer worm, was ultimately not
prosecuted by Philippine authorities due to a lack of legal basis for him to be charged
under existing Philippine laws at the time of his arrest.
The initial draft of the law started in 2002 from the former Information Technology and e
Commerce Council (ITECC) Legal and Regulatory Committee chaired by Atty.
Reactions
The new Act received mixed reactions from several sectors upon its enactment,
particularly
with
how
its
provisions
could
potentially
affect
freedom
of
The local business process outsourcing industry has received the new law well, citing an
increase in the confidence of investors due to measures for the protection of electronic
devices and online data. Media organizations and legal institutions though have criticized
the Act for extending the definition of libel as defined in the Revised Penal Code of the
Philippines, which has been criticized by international organizations as being
outdated: the United Nations for one has remarked that the current definition of libel as
defined in the Revised Penal Code is inconsistent with the International Covenant on
Civil and Political Rights, and therefore violates the respect of freedom of expression.
Local media and journalist groups which are opposed to it. The Centre for Law and
Democracy also published a detailed analysis criticizing the law from a freedom of
expression perspective.
43
Always avoid sending any photograph online particularly to strangers and chat friends
as there have been incidents of misuse of the photographs.
Never enter your credit card number to any site that is not secured, to prevent its
misuse.
Always keep a watch on the sites that your children are accessing to prevent any
kind of harassment or depravation in children
Always use latest and updated Antivirus software to guard against virus attacks.
To prevent loss of data due to virus attacks, always keep back up of your data.
It is advisable to use a security program that gives control over the cookies and send
information back to the site, as leaving the cookies unguarded might prove fatal.
Website owners should watch traffic and check any irregularity on the site. Putting host-based
intrusion detection devices on servers will serve the purpose. Capacity of human mind is
profound. It is not possible to eliminate cyber crime from the cyber space. It is quite possible
to check them. History is the witness that no legislation has
Succeeded in totally eliminating crime from the globe. The only possible step is to make
people aware of their rights and duties and to guard ourselves so that crime has no effect on
us.
44
INTRODUCTION
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a
tool or a target or both Cyber crimes can involve criminal activities that are traditional in
nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the
Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes
45
it
is
in
the
form
of
electronic
records.
In view of the growth in transactions and communications carried out through electronic
records, the Act seeks to empower government departments to accept filing, creating and
retention of official documents in the digital format. The Act has also proposed a legal
framework for the authentication and origin of electronic records / communications through
digital signature.
From the perspective of e-commerce in India, the IT Act 2000 and its provisions
contain many positive aspects. Firstly, the implications of these provisions for the ebusinesses would be that email would now be a valid and legal form of
communication in our country that can be duly produced and approved in a court of
law.
Companies shall now be able to carry out electronic commerce using the legal
The Act throws open the doors for the entry of corporate companies in the business of
being Certifying Authorities for issuing Digital Signatures Certificates.
46
The Act now allows Government to issue notification on the web thus heralding egovernance.
The Act enables the companies to file any form, application or any other document
with any office, authority, body or agency owned or controlled by the appropriate
Government in electronic form by means of such electronic form as may be
prescribed by the appropriate Government.
The IT Act also addresses the important issues of security, which are so critical to the
success of electronic transactions.
The Act has given a legal definition to the concept of secure digital signatures that
would be required to have been passed through a system of a security procedure, as
stipulated by the Government at a later date.
Under the IT Act, 2000, it shall now be possible for corporate to have a statutory remedy in
case if anyone breaks into their computer systems or network and causes damages or copies
data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs.
1 Crore.
This Act aims to provide the legal infrastructure for e-commerce in India. And the
cyber laws have a major impact for e-businesses and the new economy in India. So, it
is important to understand what are the various perspectives of the IT Act, 2000 and
what it offers.
The Information Technology Act, 2000 also aims to provide for the legal framework
so that legal sanctity is accorded to all electronic records and other activities carried
47
Chapter-II of the Act specifically stipulates that any subscriber may authenticate an
electronic record by affixing his digital signature. It further states that any person can
verify an electronic record by use of a public key of the subscriber.
Chapter-III of the Act details about Electronic Governance and provides inter alia
amongst others that where any law provides that information or any other matter shall
be in writing or in the typewritten or printed form, then, notwithstanding anything
contained in such law, such requirement shall be deemed to have been satisfied if such
information or matter is rendered or made available in an electronic form; and
accessible so as to be usable for a subsequent reference. The said chapter also details
the legal recognition of Digital Signatures.
Chapter-IV of the said Act gives a scheme for Regulation of Certifying Authorities.
The Act envisages a Controller of Certifying Authorities who shall perform the
function of exercising supervision over the activities of the Certifying Authorities as
also laying down standards and conditions governing the Certifying Authorities as
also specifying the various forms and content of Digital Signature Certificates.
The Act recognizes the need for recognizing foreign Certifying Authorities and it
further details the various provisions for the issue of license to issue Digital Signature
Certificates.
Chapter-VII of the Act details about the scheme of things relating to Digital Signature
Certificates. The duties of subscribers are also enshrined in the said Act.
Chapter-IX of the said Act talks about penalties and adjudication for various offences.
The penalties for damage to computer, computer systems etc. has been fixed as
48
Chapter-X of the Act talks of the establishment of the Cyber Regulations Appellate
Tribunal, which shall be an appellate body where appeals against the orders passed by
the Adjudicating Officers, shall be preferred.
Chapter-XI of the Act talks about various offences and the said offences shall be
investigated only by a Police Officer not below the rank of the Deputy Superintendent
of Police. These offences include tampering with computer source documents,
publishing of information, which is obscene in electronic form, and hacking.
The Act also provides for the constitution of the Cyber Regulations Advisory
Committee, which shall advice the government as regards any rules, or for any other
purpose connected with the said act. The said Act also proposes to amend the Indian
Penal Code, 1860, the Indian Evidence Act, 1872, The Bankers' Books Evidence Act,
1891, The Reserve Bank of India Act, 1934 to make them in tune with the provisions
of the IT Act.
CONCLUSION
49
from
innovative frauds, either the environment itself changes or new technology emerges. This
helps criminals to find new areas to commit the fraud. Computer forensics has developed as
an indispensable tool for law enforcement. But in the digital world, as in the physical world
the goals of law enforcement are balanced with the goals of maintaining personal liberty and
privacy.
Jurisdiction over cyber crimes should be standardized around the globe to make swift action
possible against terrorist whose activities are endearing security worldwide. The National
Institute of justice, technical working group digital evidence are some of the key organization
involved in research. The ATM fraud is not the sole problem of banks alone. It is a big threat
and it requires a
co-ordinated and cooperative action on the part of the bank, customers and the law
enforcement machinery. The ATM frauds not only cause financial loss to banks but they also
undermine customers' confidence in the use of ATMs. This would deter a greater use of ATM
for monetary transactions. It is therefore in the interest of banks to prevent ATM frauds. There
is
thus
needto take precautionary and insurance measures that give greater "protection" to the ATMs,
particularly those located in less secure areas.
Traditional systems like credit cards had some security features built into them to prevent
such crime but issue of e-money by unregulated institutions may have one. Preventing cyber
money laundering is an uphill task which needs to be tackled at different levels. This has
to be fought on three planes, first by banks/ financial institutions, second by
nation states and finally through international efforts. The regulatory framework must also
take into account all the related issues like development of e-money, right to
privacy of individual. International law and international co-operation will go a long way
in this regard. Capacity of human mind is unfathomable. It is not possible to eliminate cyber
crime from the cyber space. It is quite possible to check them. History is the witness that no
Legislation has succeeded in totally eliminating crime from the globe. The only possible step
is to make people aware of their rights and duties (to report crime as a collective
duty towards the society) and further making the application of the laws more stringent
to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all
50
NAME OF BOOKS
AUTHORS NAME
NAGPAL R.
CYBER CRIME
DUGGAL PAWAN
KUMAR
THE
VINODBATTLE
CYBER CRIME
BIBLIOGRAPHY
51
WIBLIOGRAPHY
52
http;//www.hdfcbank.com/abouts/security/emeal_security.htm.
http;//www.navi.org/pati/pati_cybercrime-dce.03htm.
http;//www.legalserviceindia.com/article/1262-cyber-crimes-&generalprincipals.html
http;//www.mouthshut.com/review/avoiding_credit-card_fraud-20736-1.html
53
ANNEXURE
Abbreviation
54
ATM
CVV
IFCC
HSM
EFT
ERP
GUI
NFMS
AMS
TSP
IRS
URL
THANK YOU
55