0% found this document useful (0 votes)
100 views43 pages

Cyber Security Unit - 5

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views43 pages

Cyber Security Unit - 5

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

UNIT - V

Privacy Issues:

Basic Data Privacy Concepts: Fundamental Concepts

What are the fundamentals of data privacy?

The fundamentals of data privacy include data confidentiality, data security,


limitation in data collection and use, transparency in data usage, and
compliance with the appropriate data privacy laws. Organizations should use
security best practices when protecting sensitive data.

Overview on Data Privacy

“No one shall be subjected to arbitrary interference with his privacy, family,
home or correspondence, nor to attacks upon his honor and reputation.
Everyone has the right to the protection of the law against such interference or
attacks. - Universal Declaration of Human Rights

“Everyone has the right to respect for his private and family life, his home and
his correspondence. -European Convention for the Protection of Human Rights
and Fundamental freedoms

“The confidentiality of records that could identify subjects should be protected,


respecting the privacy and confidentiality rules in accordance with applicable
regulatory requirement.

Introduction Why is Personal Data Protection important?


It is an Universal Human Right
Possible damages to the business and the image of a company
Important financial & Discrimination
Identity theft and Fraud
Legal consequences
Important risks for the data subjects
Important fines
Inability to perform research
individual risks for non- compliance

• Data privacy refers to the standards surrounding protection of personal data.


• Personal data can be defined as any information that can lead to identification,
either directly or indirectly, of a research subject; e.g. Subject names, initials,
addresses, and genetic information.
How privacy protection gave to research subjects ?
• Protocol review and approval by an Institutional Review Board (IRB)
• Right to informed consent
• Right of the subject to withdraw consent and have no further data
collected
• Right to notice of disclosure
• Confidential collection and submission of data

Who are responsible? Primarily Site management or clinical monitoring


team are responsible for subject data privacy;

However, Data Management Personnel should be acquainted with


common issues related to data privacy and should follow regulatory and
organizational guidelines to ensure the privacy of research subjects.

All personnel involved in handling (directly or indirectly) of Personal


identifiable information (PII) must be trained on data privacy concepts &
issues; company policy; regulatory agency policy and applicable local,
state, federal, and international laws.
Data Privacy Attacks

Data Privacy: Cyber security refers to the measures taken to protect


a computer or computer system against unauthorized access from a hacker. On
its most basic level, data privacy is a consumer's understanding of their rights
as to how their personal information is collected, used, stored and shared.
What is data linking and profiling?

Data profiling is the process of examining the data available from an existing
information source (e.g. a database or a file) and collecting statistics or informative
summaries about that data. ... Assess the risk involved in integrating data in new
applications, including the challenges of joins.

What is meant by data profiling?

Data profiling is the process of reviewing source data, understanding structure,


content and interrelationships, and identifying potential for data projects.

Introduction:
Today is world of heterogeneity.

We have different technologies.

We operate on different platforms.

We have large amount of data being generated

everyday in all sorts of organizations and

Enterprises.

And we do have problems with data.

Problems

Duplicated , inconsistent

, ambiguous, incomplete.

So there is a need to collect data in one

place and clean up the data.

Why data quality matters?

Good data is your most valuable asset, and

bad data can seriously harm your


business and credibility…

1.What have you missed?

2.When things go wrong.

3.Making confident decisions.

What is data quality?


Data quality is a perception or an assessment of data’s fitness
to serve its purpose in a given context.
It is described by several dimensions like
•Correctness / Accuracy : Accuracy of data is the degree to
which the captured data correctly describes the real world
entity.
•Consistency: This is about the single version of truth.
Consistency means data throughout the enterprise
should be sync with each other.
Completeness: It is the extent to which
the expected attributes of data are
provided.
•Timeliness: Right data to the right person
at the right time is important for business.
•Metadata: Data about data.
Maintenance of data quality:
Data quality results from the process of going through the data and scrubbing it,
standardizing it, and de duplicating records, as well as doing some of the data
enrichment.

Maintain complete data.

2. Clean up your data by standardizing it using rules.

3. Use fancy algorithms to detect duplicates. Eg: ICS

and Informatics Computer System.

4. Avoid entry of duplicate leads and contacts.

5. Merge existing duplicate records.

6. Use roles for security.

Data Profiling:
Context:
In process of data warehouse design, many database professionals face
situations like:
1. Several data inconsistencies in source, like missing records or NULL values.
2. Or, column they chose to be the primary key column is
not unique throughout the table.
3. Or, schema design is not coherent to the end user
requirement.
4. Or, any other concern with the data, that must have been
fixed right at the beginning.

To fix such data quality issues would mean


making changes in ETL data flow
packages., cleaning the identified
inconsistencies etc.
This in turn will lead to a lot of re-work to be done.Re-work
will mean added costs to the company, both in terms of time
and effort.
So, what one would do in such a case?

Solution:
Instead of a solution to the problem, it would be
better to catch it right at the start before it
becomes a problem.
After all “PREVENTION IS BETTER THAN
CURE”.
Hence data profiling software came to the
rescue.

What is data profiling ?


It is the process of statistically examining and analyzing
the content in a data source, and hence collecting
information about the data. It consists of techniques
used to analyze the data

we have for accuracy and


completeness.
Data profiling helps us make a
thorough assessment
1.Data profiling helps us make a thorough assessment of data quality.
2. It assists the discovery of anomalies in data.
3. It helps us understand content, structure, relationships, etc. about the data
in the data source we are analyzing.
4.It helps us know whether the existing data can be applied to other areas or
purposes.
5. It helps us understand the various issues/challenges we may face in a
database project much before the actual work begins. This enables us to make
early decisions and act accordingly.
6. It is also used to assess and validate metadata.

When and how to conduct data profiling?

Generally, data profiling is conducted in two


ways:
1.Writing SQL queries on sample data extracts
put into a database.
2.Using data profiling tools.

When to conduct Data Profiling?


-> At the discovery/requirements
gathering phase
-> Just before the dimensional modeling
process
-> During ETL package design.
How to conduct Data Profiling?
Data profiling involves statistical analysis of the
data at source and the data being loaded, as well
as analysis of
metadata.

These statistics may be used for various analysis


purposes. Common examples of analyses to be
done are:
Data quality: Analyze the quality of data at
the data source.
NULL values: Look out for the number of
NULL values in an attribute.
Candidate keys: Analysis of the extent to
which certain columns are distinct will give
developer useful information w. r. t. selection
of candidate keys.
Primary key selection: To check whether the
candidate key column does not violate the
basic requirements of not having NULL values
or duplicate values.
Empty string values: A string column may contain
NULL or even empty sting values that may create
problems later.
String length: An analysis of largest and shortest
possible length as well as the average string length of a
sting-type
column can help us decide what data type would be
most suitable for the said column.
Identification of cardinality: The cardinality
relationships are important for inner and outer join
considerations
with regard to several BI tools.
Data format: Sometimes, the format in which certain
data is written in some columns may or may not be user-
friendly.

Common Data Profiling Software:


Most of the data-integration/analysis soft-wares
have data profiling built into them. Alternatively,
various independent data profiling tools are also
available. Some popular ones are:
• Trillium Enterprise Data quality
• Datiris Profiler
• Talend Data Profiler
• IBM Infosphere Information Analyzer
• SSIS Data Profiling Task
• Oracle Warehouse Builder.
privacy policies and their specifications:

A privacy policy is a document contained on a website that explains how a website or


organization will collect, store, protect, and utilize personal information provided by its users.

Personal information can be anything that can be used to identify an individual, not limited to the
person's name, address, date of birth, marital status, contact information, ID issue, and expiry
date, financial records, credit information, medical history, where one travels, and intentions to
acquire goods and services.[2] In the case of a business, it is often a statement that declares a
party's policy on how it collects, stores, and releases personal information it collects. It informs
the client what specific information is collected, and whether it is kept confidential, shared with
partners, or sold to other firms or enterprises.[3] Privacy policies typically represent a broader,
more generalized treatment, as opposed to data use statements, which tend to be more detailed
and specific.

The exact contents of a certain privacy policy will depend upon the applicable law and may need
to address requirements across geographical boundaries and legal jurisdictions. Most countries
have their own legislation and guidelines of who is covered, what information can be collected,
and what it can be used for. In general, data protection laws in Europe cover the private sector,
as well as the public sector. Their privacy laws apply not only to government operations but also
to private enterprises and commercial transactions.

This Privacy Policy applies only to data collected through the Site and not any other data
collection or processing including, without limitation, data we may collect offline or data
collection practices of other web pages to which we link, or though websites, products or
services that do not display a direct link to this Privacy Policy.

Types of Data and Collection Methods

Data you submit. When you request information, subscribe to or order a product
or service, register as a user, respond to an online survey or otherwise actively
send us data, we usually collect data such as your name, email address, mailing
address, telephone number, and certain information related to your the business
you represent. In connection with chargeable services,

we will also collect payment information (e.g., credit card number and related
verification information), phone number, and billing and shipping addresses.
We some time partner with other organizations. When we do, we may present
you with the option to share your email and personal information with the
partner organization and to opt-in to their program. In each such instance, you
will know what data we collect through the site, because you actively submit it.

Information we automatically collect. As part of the standard operation of the


Site, we may collect information from your computer or mobile device,
including but not limited to your Browser type, operating system, IP address
and the domain name from which you accessed the site, and if you are accessing
our site with your mobile device, type of mobile device.
In addition, we may collect information about how you use our Site, such as the
date and time you visit the Site, the areas or pages of the Site that you visit, the
amount of time you spend viewing the Site, the number of times you return to
the Site and other click-stream data.

Cookies. We may use cookies, web beacons or similar technologies to collect


the information described above. A cookie is a small text file that may be stored
on the hard drive of your computer or device when you access the site. We may
also use cookies to:

(1) provide you with customized content or offers on the site;


(2) monitor site usage;
(3) remember you when you return to the site; and
(4) conduct research to improve our content and services.

We may also allow third parties such as web analytics partners, advertisers, data
processors, marketers, shippers, product logisticians, customer service
personnel, advocacy and outreach personnel, or ad networks to set or access
their cookies or web beacons (also referred to as 1x1 pixel.gifs or action tags)
on the site. For example, we may use third party advertising companies to serve
ads on our behalf across the Internet or to display ads for other companies on
our site.

These third-party advertising companies employ cookies and web beacons to


measure and improve the effectiveness of ads for their clients, including us. To
do so, these companies may use information about your visits to our site and
other websites.

This information may include: date/time of banner ad shown, their cookie, and
the first three octets of the IP address. This anonymous information can also be
used for online preference marketing purposes. These third parties may use
information about your visits to this and other websites in order to provide ads
about goods and services of interest to you. If you would like more information
about this practice and to know your choices about not having this information
used, click here.

You are free to decline cookies, but by doing so, you may not be able to use
certain features on the site or take full advantage of all of our offerings. Check
the “Help” menu of your browser to learn how to change your cookie
preferences.

Use of Personal Data


We use the data we collect for the following general purposes:
To respond to the request that you sent us such as your request for information, or your
request
to subscribe to a service or purchase a product;
To administer, protect and improve our Site and our systems;
To better understand the preferences of our Site visitors;
To identify server problems;
To compile aggregated statistics about Site usage;
To help personalize your experience of our Site;
To improve our products and services and other internal business purposes;
To provide you with information about our technologies, product or service releases, news,
and other communications;
To the extent permitted by applicable law, we may combine the various types of data that we
collect, and;
Any other use we describe at the point where we collect the data
We may also use or disclose personal information if required to do so by law or in the good-
faith belief that such action is necessary to (a) conform to applicable law or comply with legal
process served on us or the Site; (b) protect and defend our rights, property, the Site or our
users, and (c) act under emergency circumstances to protect the personal safety of Parallel,
our affiliates, agents, Site users, or the public.

Parallel does not sell or otherwise disclose your personal information outside of our
organization without your explicit permission. However, if you become a registered Site user,
some information on our membership lists, such as your name and mailing address, may be
exchanged with other organizations. Members may opt-out of such membership list
exchanges by following the opt-out procedures described below.

Opting-Out

If you no longer wish to receive communications from Parallel, you may email us at
[email protected] or click on the “unsubscribe” link at the bottom of any email sent
to you by Parallel. You should know that opting-out or unsubscribing from our site does not
delete your personal information from our system, which may exist in backup or disaster-
recovery files.

Even if you opt-out, we may continue to contact you via email for administrative or
informational purposes, including follow-up messages regarding the administration of your
account, renewal of your membership, contests you have entered or other transactions you
have undertaken.

Security

Parallel uses industry accepted data collection and encryption methodologies in an attempt to
ensure the secure collection and transmission of sensitive user information. While we try our
best to safeguard your personal information once we receive it, no transmission of data over
the Internet or any other public network can be guaranteed to be 100% secure.

IP Addresses
An Internet Protocol (IP) address is a number that is automatically assigned to your computer
by your Internet service provider whenever you access the Internet. This number may be the
same each time you access the Internet, or it may change. Like other Internet sites, Parallel
uses IP addresses to collect aggregate information about numbers of visitors and Site usage.
The address is logged on our server when your computer requests information from Parallel.
You IP address is not linked to your personal information so you can access our site
anonymously. Parallel reserves the right, in rare instances, to use IP addresses to identify
individuals who threaten our site, service, or users.

Notice to California Residents


We are in compliance with the California Online Privacy Protection Act; we will not
distribute your personal information to outside parties without your consent. Residents of the
State of California have the right to request a list of all third parties to which a company
conducting business in California has disclosed personal information during the preceding
year for direct marketing purposes. Alternatively, the law provides that if the company has a
privacy policy that gives either an opt-out or opt-in choice for use of your personal
information by third parties for marketing purposes, the company may instead provide you
with information on how to exercise this choice.

Parallel qualifies for this alternative option. It has a comprehensive privacy policy and
provides you with details on how you may either opt-out or opt-in to the use of your personal
information by third parties for direct marketing purposes. We are not required, therefore, to
maintain or disclose a list of the third parties that received your personal information for
marketing purposes during the preceding year.

Children’s Privacy

The Site is intended for adults. We do not intentionally or knowingly collect personally
identifiable information from children under the age of 13. We request that children under
the age of 13 not submit any information on the Site.

Other Websites

This Privacy Policy applies only as long as you remain on the Site. Once you leave the Site,
we have no control over your privacy or security issues even if you reached the other site by
clicking on a link within the Site.

Contacting Us

If you suspect that we have handled your personal information in a manner that doesn't
comply with the Privacy Policy, please contact us by e-mailing [email protected].

Amendments

We reserve the right to change this Privacy Policy from time to time and in our sole
discretion. We reserve the right to change, modify, add or remove portions of this Privacy
Policy at any time, but will alert you that changes have been made by indicating on the
Privacy Policy the date it was last updated. When you visit the Site, you are accepting the
current version of this Privacy Policy as posted on the Site at that time. We recommend that
users revisit this Privacy Policy on occasion to learn of any changes.

privacy policy languages:

Privacy policy languages were designed to express the privacy controls that both
organizations and users want to express. Most of the privacy policy languages were
designed for specific purposes with specific features and characteristics.
privacy in
PRIVACY IN DIFFERENT DOMAINS- MEDICAL, FINANCIAL:

Privacy is the fair and authorized processing and access of personal information. ...
Information Security is that the use of logical, technical, administrative, physical safeguards
to ensure the confidentiality, integrity, and availability of the data is maintained.
Cybercrime: Examples and Mini-Cases

Official Website of Maharashtra Government Hacked


The official website of the Maharashtra government was allegedly hacked, forcing the state
Information Technology department to lodge a formal complaint with the city police on
Tuesday. The website was hacked for the second time in the past two weeks, the fourth
since July. The previous attack took place on September 5.

Joint Commissioner of Police (Crime) Rakesh Maria said that access to the
website, www.maharashtra.gov.in , had been blocked for a while. "It had some Arabic
content posted on it by the hacker. The IT department has lodged an FIR with the police and
we will try and trace the culprit," said Maria. It is suspected that the same group of
international hackers was behind all the four attacks.

The site was hacked into late on Monday night by a person or a group calling itself
"coolhacker" who had left an imprint of a hand on the website. The state’s information and
technology department came to know of the hacking Tuesday morning and immediately
blocked all access to the website.

State officials maintained that no data had been lost and no serious damage had been
inflicted on the website, which is updated daily with information on various government
regulations and decisions, and supports links to all government departments. The hacker
could only manage to damage the homepage. However, restoration work is in progress.

The state government website is hosted on a VSNL server. In the month of August, 345
Indian websites — ending with .in, .co.in and edu.in — were defaced by hackers. Nearly
2,700 Indian websites have been hacked since January.

Maharashtra CID website hacked, defaced


The official website of the Maharashtra Criminal Investigation Department (CID)
was hacked by unknown parties on Friday. It was later restored, and an inquiry has
been initiated.
According to Cyber police officials, the incident came to light in the early hours of
Friday, when the homepage of the CID website – mahacid.gov.in – was found
defaced. The message left by the hackers on the home page referred to the recent
violence against Muslims in Delhi and issued a “warning” to the Narendra Modi
government.

A group identifying itself as 'Legion' claimed responsibility for the


hacking. However, it is not clear whether this is the same group that had in
2016 hacked several Twitter accounts, including that of Congress party
president Rahul Gandhi, and posted offensive content from his handle.

The defacement included a picture of a man on a horse bearing a flag with


the caption, “The government of Imam Mahdi”.
The message under the picture said, “In India, families of Muslims killed
by Hindu mobs. Hundreds of Muslim families lost their relatives say the
Modi government is to blame for a rise in anti-Muslim rhetoric in India.
The riots, which erupted on the day US President Donald Trump arrived in
India for a state visit, lasted three days, killing more than 45 people ,
mostly Muslim, and injuring at least 150 others (sic).”
The message was followed by a warning to the government of India,
which said, “We are warning you Indian police and Modi government,
stop hurting people of Muslims. Muslims are everywhere. Feel the power
of Muslim brotherhood. Imam Mahdi is coming soon.”
Officials said Imam Mahdi might refer to Muhammad Mahdi Akhef, a
leader with Egypt's Muslim Brotherhood, who died in September 2017. He
was imprisoned following a coup in Egypt in 2013, and died in prison.
“This does not seem to be the handiwork of the same group that earlier
hacked popular Indian Twitter accounts as in an earlier interview, the
Legion had hinted that they were based in eastern Europe. They have also
said that they have no particular political affiliation. The specific mention
of Delhi violence gives rise to the suspicion that this is done by someone
closer home. Efforts are under way to trace the hack,” a Cyber police
officer said.

Indian Banks Lose Millions of Rupees

Indian banks reported a total loss of about Rs 70,000 crore due to frauds
during the last three fiscals up to March 2018, the Rajya Sabha was
informed today.
The extent of loss in fraud cases reported by scheduled commercial banks
(SCBs) for 2015-16, 2016-17 and 2017-18 was Rs 16,409 crore, Rs 16,652
crore and Rs 36,694 crore, respectively, Minister of State for Finance Shiv
Pratap Shukla said in a written reply quoting RBI data.
The minister said that data of frauds is as per the year of reporting and not
the year of occurrence of fraud or sanction of loan, letter of undertaking,
which may might be of an earlier period.
The minister also informed the House that gross advances by SCBs
increased from Rs 25.03 lakh crore as on March 31, 2008, to Rs 68.75 lakh
crore on March 31, 2014.
As regards the stressed assets in the banking system, Shukla said the
spurt was due to aggressive lending practices, wilful default, loan frauds,
corruption in some cases and economic slowdown.
Replying to another question, he said as per RBI data, there were 139
borrowers with aggregate gross NPAs of more than Rs 1,000 crore.
Parliament Attack

Pune City Police Bust Nigerian Racket


The city police on Friday busted an international phishing racket with the arrest of
six persons, including five Nigerian nationals, who allegedly hacked bank accounts
of more than 100 people.
Two laptops, three internet data cards, six ATM cards, six mobile phones,
20 SIM cards, a car and three Nigerian passports were recovered from the
arrested persons -- Sunny Uche Uzoma (35), Michael Animba (27),
Onyegbuna Udochukwu (35), Nwazonobi Amaeze Obed (40) and Tinuola
Yussuf Olatunji (37), all Nigerians along with Prabhu Jayadeep Patvari
(23) from Mumbai.

The gang was also wanted by the police in Delhi, Mumbai, Tamil Nadu
and Gujarat, Hyderabad Police Commissioner Anurag Sharma told media
persons here on Friday.

Explaining the modus operandi, Mr. Sharma said accomplices of the


Nigerians in India would come to a city and enter into a rental agreement
with property owners. Using fake documents they would apply for a
landline phone connection and after getting the phone bill, they would use
it to open a savings bank accounts.

The gang members would later apply for a trade licence from the Labour
Department. After getting the trade licence, they would open current
accounts. With the help of their associates in India, the gang would send
emails containing fake bank pages to lakhs of people. “Many fell into the
trap and sent their online banking details,” Mr. Sharma said.

The gang then used to accesses the bank details of customers. The
Nigerians would target accounts having huge cash and pass on the details
to their accomplices in India who would transfer the funds using fake ID to
the accounts created earlier fraudulently.
After deducting their commission, the accomplices here would transfer the
remaining amount to the Nigerian nationals who would buy clothes and
return to their country by ship. “Connivance of a few officials coupled
with superficial checking by bank officials, labour department and service
providers is leading to this problem,” the Commissioner said.
The accused, Prabhu Jayadeep Patvari, managed to secure 154 SIM cards
in three months and the gang was also able to open 38 accounts
fraudulently in the city.
The police also managed to stop money transfer of Rs.61 lakh by alerting a
nationalised bank but the gang managed to withdraw Rs.5 lakh using a
cheque.
The fraud came to light when branch manager of Sanghvi Corporation,
Kailash Nath Seth, complained to the police that Rs.5 lakh was
fraudulently transferred to a Kanpur PNB account. He gave two phone
numbers from which an unidentified person claiming to be a bank
employee took a password from him. With this information, the police first
caught Patvari and later the five others.

E-MAIL SPOOFING INSTANCES

Waking up to the threat of email spoofing after six companies fell prey to
scamsters in the span of a week, the cyber police station at Bandra-Kurla
Complex has issued an advisory to top executives of corporate companies to
be careful when they receive mails requesting funds.

In email spoofing, scamsters create mail ids similar to their target company’s
domain name, and send a mail, generally to the CFO, in the name of one of its
top executives seeking money urgently. If the company’s domain name is
rampaints.com, they might register a domain name rampa1nts.com, says
advocate and cyber expert Prashant Mali.

About 50% of these six companies have lost lakhs of rupees, if not crores. “In
a majority of the cases, the CFOs were targeted. The mails were sent in the
name of MDs or CEOs asking for immediate fund transfer through RTGS
or NEFT to their personal account (by giving the scamster’s account number),”
a cyber police officer said.

In almost all cases, the CFOs did not verify the mail. “The sender’s mail id
looked similar to the company’s domain, so they thought it was a mail from
their top executives,” said the officer.

Investigators said the mails were sent the same day that the domains were
created so that the scamsters earned fast buck before the domain was
suspended.

The Indian Case of online Gambling


Online gambling (sometimes clandestinely referred to as “online gaming”
depending on the percentage of skill involved across the “skill” vs “chance” gamut
but more on that later...) is basically the wagering of money on the internet. It’s the
usual betting scene involving poker, casinos and sports...but conducted online.
Gambling is a popular pastime in India, notwithstanding the legalese surrounding
it. Add to this the robust mobile-first internet economy and virtually universal
smartphone usage, and it might seem unsurprising that as much as 40% of Indian
internet users have expressed interest in online gambling. In terms of number of e-
gamblers per capita, India could very well soon surpass the UK, which is currently
the global betting tsar. Some offshore e-betting platforms like Dafabet, for
instance, have special sections just for Indian punters. Others, like m88, have Hindi
tele-support to help address players’ concerns.
So, online gambling is increasingly popular in an increasingly digitised country
where gambling in general has long been a popular hobby. What, then, explains
Google pulling down Paytm's fantasy sports app from the Play Store? Or online
casinos finding payment methods getting blocked? Or some states moving to ban
gambling altogether?
An Indian Case of Intellectual Property Crime:

The international trade in counterfeit products represents up to 2.5 % of world trade,


or as much as EUR 338 billion, according to 2013 data. Put in perspective, this is the
equivalent of Austria’s GDP, or the combined GDP of Ireland and the Czech
Republic.

The impact of counterfeiting is particularly high in the European Union, where


counterfeit and pirated products make up to 5 % of imports, or as much as EUR 85
billion.
IMPACT

Infringements of intellectual property rights reduce the revenues of the affected


businesses. The resulting adverse social and economic effects include the loss of
jobs and livelihoods.

There are also other costs. As counterfeit goods are produced without regard to EU
health and safety standards, they may be dangerous for consumers.

Government revenue is also affected by counterfeiting and piracy, which can stifle
investment and innovation, hinder economic growth and reduce the creation of
wealth.

In addition, the criminal groups involved in intellectual property crime often use the
profits to finance other illegal activities.
Financial Frauds in Cyber Domain.

Globally it is been observed the more and more cyber crimes are being committed
for financial motives rather than for revenge or fun. ... Financial Frauds include
Credit card frauds, Debit card frauds, Internet banking frauds, Mobile
banking frauds, Insurance frauds, Computer manipulation, Accounting scams etc

You might also like