Computer Crime Research Center


Techies educated in cyber crime

Date: February 18, 2008
By: Asheesh Kumar Shukla

IF YOU are to become the next generation manager, then you need to become more technology-savvy. This consensus emerged at the conclusion of an interactive seminar on ‘Issues and challenges on Internet security,’ organised by the Lal Bahadur Shastri Institute Of Management and Development Studies (LBSIMDS) at Naveen Bhawan, U.P Housing and Development Board.

The future honchos studying at various management colleges were educated by some of the technocrats who sailed them through the vast world of Internet, its pros and cons and the ways and means to protect oneself against cyber crimes. Hackers are concentrating on intellectual hacking and not on the financial sector.

Jayant Krishna, regional head, Tata Consultancy Services (TCS), in his inaugural address, explained the various threats like data tampering, data theft, virus and worm that obtain and also the relevant solutions like the Internet securities and anti-viruses.

“The data on the Internet stays only for a few seconds and leaves the system as soon as possible and is dependent upon the RAM. The danger lies when much of information in the form of web content is downloaded on the system,” said HM Srivastava, former director, KNIIT, Kanpur. He also emphasised that India should now come up with production of nano-amplifiers which are still imported from companies like Sony, Intel, etc.

“As soon as you log into ‘’, you are logged into its Indian domain and are automatically redirected to ‘’. It retrieves your information as soon as you click on the domain. Is it not hacking?” asked Sanjeev Batra, one of the students present over there. Answering the question himself, he said the portal had the legal right to redirect to the Indian server for ease of operations. He also asserted that cyber crime cannot be stopped but may be prevented. It can never be foolproof, yet we need to try to make it much more secure.
Original article

Add comment  Email to a Friend

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo