Social Sciences
Social Sciences General
File | Description | Size | Format | |
---|---|---|---|---|
Attached File | 525.33 kB | Adobe PDF | ||
536.44 kB | Adobe PDF | |||
1.72 MB | Adobe PDF | |||
480.02 kB | Adobe PDF | |||
520.63 kB | Adobe PDF | |||
287.91 kB | Adobe PDF | |||
182.44 kB | Adobe PDF | |||
2.05 MB | Adobe PDF | |||
393.74 kB | Adobe PDF | |||
303.56 kB | Adobe PDF | |||
239.33 kB | Adobe PDF |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser .
Enter the email address you signed up with and we'll email you a reset link.
Defence and Diplomacy
Dr. E. Dilipraj
Rishabh Upadhyay
The paper studies the initiatives taken by the Government of India, Private Organization, Think Tank,etc within the Indian sub domain in order to strengthen the Security and Privacy of the country.
Ritu Srivastava
Lennon Chang
Saroj K Rath
There is near no literature available about India’s cyber security activities. Because of this absence and despite India’s grand standing in the cyber world, India is not included in the tightest intelligence sharing circles of big-powers like the US and Britain. Debates, discussions, analysis and simulation of cyber security in the public domain are not only essential but also unavoidable to build a robust digital India. This volume is an endeavor to gather the scattered and tickling pieces and provide a platform to channelize the untapped potential. Indian Infosec Consortium is dedicated to enrich India’s cyber security policy debate and offer first-of-itskind glimpse into the secret world of Asia’s cyber space. This volume would excite readers on many accounts. Firstly, it provides information about the people who are working in this field. The compilation is accommodating the senior-most of government functionaries while giving space to the youngest cyber professional at the same stage. The participants, who contributed to this volume belong to diverse back-ground which offer stiff competition among the participants to test their cyber prowess. The assemblage of the gist or abstract of papers presented at the Ground Zero Summit 2014 is the only authoritative text that offer tremendous amount of information to cyberenthusiasts, who in turn would, track and visualize changes in the digital world and prepare themselves for future challenges. With these words, Indian Infosec Consortium is dedicating this volume to its esteem readers.
Air Power Journal
Dr. E. Dilipraj , Ramnath Reghunadhan
Adam Ali.Zare hudaib
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
Emmanuel S Dandaura
Proceedings of the INTERNATIONAL CONFERENCE ON "CYBERSPACE GOVERNANCE:The Imperative For National & Economic Security"
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) ijarcet
Cyber security is a information technology. Securing information has become one of the biggest challenges nowadays. Whenever we think about cyber security the first thing we remember is 'Cyber Crime' which is been increasing day by day. The cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security and its types. To the world of computer technology, governments, police and intelligence units are acting toward the issue closely. Different strategies are put into action. The main goal is to educate the people in the world and to expose the idea that it is not safe anymore to navigate in the cyber world without any of security. This paper discuss about techniques used in cyber security.
Valarie Findlay
Cyber-threats can range from minor electronic crimes to more sophisticated fraud and the infiltration and compromise of systems, networks and supply chains causing significant damage and harm. Cyber-threats are actioned by more than terrorists; actors who engage in cyber-threat activities and events vary from individuals, corporations involved in industrial espionage, criminals and criminal enterprises, terrorists and terrorist organizations and even nation states; recent reports indicate that Russian forces hacked a U.S. surveillance drone flying over the Crimea region of Ukraine in March 2014 by allegedly severing the connection between the drone and its operator using an undisclosed, complex radio-electronic technology, resulting in its interception. These asymmetrical characteristics are distinctly different than that of conventional threats, requiring specialized, “cutting edge” skills to prevent, detect, respond and recover. The Internet has added a level of ambiguity and comp...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Chandrakant Chellani
Jawad Hussain Awan
IOSR Journals
Kent Zamora
Prabinda Joshee
Dr.Debarati Halder,Ph.D
David OMAND
Susan Nepal
The Atlantic Times- Special Edition of the Security Times for 50th Munich Security Conference
Victoria Kupsch
Alexandra Kulikova , Oleg Demidov
Nurlan Karimov
Lennon Chang , Lena Y. Zhong
Mahima Rai , HL Mandoria
Nikola Zlatanov
Diana Pysarenko
Richard "Pete" Hunt
Dr. Jennifer R Henrichsen , Joanne Lisosky
Gabi Siboni
Lumuli Gwakisa
Stefano Manacorda
Matthew Nordmoe
Self-Published
Michael Nycyk
Ikenga Oraegbunam
Kavali Suresh
Law, Privacy and Surveillance in Canada in the Post-Snowden Era
Steve Hewitt
Christopher Laing
debalina ghoshal
Chevening Fellowship Paper
Adv Prashant Mali, Ph.D.
Rita Bonello
Indian Journal of Law and Legal Research, 4(01), pp. 1391-1411. https://doi-ds.org/doilink/02.2022-31571548/IJLLR/V4/I1/A132
21 Pages Posted: 28 Mar 2022
NMIMS, School of Law, Hyderabad
Date Written: March 3, 2022
The world has progressed in terms of communication, particularly since the introduction of the Internet. The rise of cybercrime, often known as e-crimes (electronic crimes), is a major challenge confronting today's society. As a result, cybercrime poses a threat to nations, companies, and individuals all across the world. It has expanded to many parts of the globe, and millions of individuals have become victims of cybercrime. Given the serious nature of e-crime, as well as its worldwide character and repercussions, it is evident that a common understanding of such criminal conduct is required to successfully combat it. The definitions, types, and incursions of e-crime are all covered in this study. It has also focused on India's anti-e-crime legislation.
Keywords: Cyber Law
Suggested Citation: Suggested Citation
Nmims, school of law, hyderabad ( email ).
Plot no.B4, Green Industrial Park Polepally SEZ, TSIIC Jadcherla Mahbubnagar, Dist, OH Telangana 509301 India
Paper statistics, related ejournals, cyberspace law ejournal.
Subscribe to this fee journal for more curated articles on this topic
India law ejournal.
Products and Services
Master your goals. innovate. we'll tackle threats..
Get powerful security across all your networks, cloud, endpoints, and email to protect everything that matters, from anywhere.
More connected users and devices creates more complexity. Cisco Security Cloud makes security easier for IT and safer for everyone anywhere security meets the network.
Protect your organization across a multicloud environment, while simplifying security operations, improving scalability, and driving data-informed outcomes, powered by Cisco Talos.
Create a seamless experience that frustrates attackers, not users, by granting access from any device, anywhere, and adding more proactive security controls.
Improve ROI by consolidating vendors, reducing complexity and integrating your security.
Unified, end-to-end protection maximizes value, minimizes risk, and closes security gaps everywhere to defend against evolving threats. Protect access, apps, and innovation across your network to secure your future.
Better visibility and actionable insights across networks, clouds, endpoints, and email allows users to respond confidently to the most sophisticated threats at machine scale.
Cisco hypershield.
A new groundbreaking security architecture that makes hyperscaler technology accessible to enterprises of all sizes and delivers AI-native security for modern data centers and cloud.
A converged cybersecurity solution, grounded in zero trust, that radically reduces risk and delights both end users and IT staff by safely connecting anything to anywhere.
Detect the most sophisticated threats sooner across all vectors and prioritize by impact for faster responses.
Gain multidirectional protection across clouds to stop inbound attacks, data exfiltration, and lateral movement.
Secure applications and enable frictionless access with strong MFA and more. Establish user and device trust, gain visibility into devices, and enable secure access to all apps.
Simplify highly secure network access control with software-defined access and automation.
Get secure access to any application, on any device, from anywhere. Defend against threats targeting users and deliver seamless access for hybrid work.
Secure your apps and data with a powerful, flexible framework for a hybrid and multicloud world.
Secure your business by investigating, prioritizing, and resolving incidents through unified defense and contextual insights from data-backed, AI-powered security.
Global partnerships fight to end child exploitation together.
"Marriott has long championed human rights and human trafficking awareness. Combating CSAM is an important extension of that work. The IWF provided the level of rigor we needed in a URL list, and Cisco's security technology provided the means to easily apply it."
Abbe Horswill, Director, Human Rights and Social Impact
Company: Marriott International
"From securing stadiums, broadcasts, and fans to protecting the largest live sporting event in America, the right tools and the right team are key in making sure things run smoothly, avoiding disruptions to the game, and safeguarding the data and devices that make mission-critical gameday operations possible."
Cisco Security Enterprise Agreement
Experience security software buying flexibility with one easy-to-manage agreement.
Services for security
Get more from your investments and enable constant vigilance to protect your organization.
Sharpen your security insights
Set your vision to a more secure future with Cisco Cybersecurity Viewpoints. With specialized content from podcasts to industry news, you'll walk away with a deeper understanding of the trends, research, and topics in our rapidly changing world.
IMAGES
COMMENTS
This research paper includes a summary of Indian cyber laws, lists the various types of cyber security and cyber-attacks; sheds insight on India's current situation of cyber security.
"Analysis Of National Cyber Security Policy Of India 2013 (NCSP-2013) And Indian Cyber Security Infrastructure". Centre Of Excellence For Cyber Security Research And Development In India (CECSRDI). 21 November 2014.
Abstract and Figures This research paper aims to provide a comprehensive analysis of the current state of cybersecurity in India. The study begins by establishing a clear understanding of ...
National Cyber Security Policy 2013 is an official document published by MeitY, that. includes the roadmap of cyber security and framing a secure cyber ecosystem. throughout the country. It is a ...
s rising rapidly in India. Developing economies such as India face unique cybercrime risks. This paper examines cybercrime and cybersecurity in India. The literature on which this paper draws is diverse, encompassing the work of economists, criminologists, institutionalists and international relations theorists. We develop a framework that delineates the relationships of formal and informal ...
Cyber Security in India: In-Depth ignificant catalysts for the country's economic growth, and as an integral part of the country's business and governance. The sector is positively influencing the lives of Indian citizens through direct or indirect co
The suggested study paper intends to go thorough cybersecurity standards for India. The presentation will begin by giving a general review of India's current cybersecurity environment and analysing the numerous risks and difficulties the nation is now...
Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies .It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber security.
Abstract. With the second-largest Internet user base and a leading Information and Communications Technology industry, India has quickly adopted digital technologies to emerge as a major actor in the global cyberspace. This thrust on digital and information technologies is accompanied by a rapid expansion of cyberthreats such as malware attacks ...
Types of cyber security and cyber attacks are listed in this paper. It also throws light on the state of cyber crimes and cyber security in India. A gist of Indian cyber laws is presented in this paper as well.
ABSTRACT This paper presents a comparative analysis of cyber security and data protection laws in India and other countries. The study focuses on the strengths and weaknesses of the legal frameworks in India, in comparison to global perspectives, and their effectiveness in dealing with the challenges of cyber security and data protection. The analysis includes a review of the legal and ...
The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access. Shodhganga@INFLIBNET. Maharaja Agrasen University. Maharaja Agrasen School of Law.
The purpose of the paper to analyse the increasing cases of cyber violations, the urgency for more robust and comprehensive cyber security measures, among other issues.
At the end of this paper "A brief study on Cyber Crime and Cyber Law's of India" we want to say cyber crimes can never be acknowledged. If anyone falls in the prey of cyber attack, please come forward and register a case in your nearest police station.
Standard security frameworks are discussed with the history and early-generation cyber-security methods. In addition, emerging trends and recent developments of cyber security and security threats and challenges are presented. It is expected that the comprehensive review study presented for IT and cyber security researchers will be useful. Previous
The need for Cyber Security According to a recent report by McAfee 594 million people were affected globally due to some form of Cyber Abuse. The 2003 loss estimates by some firms range from $13 billion (that was caused worms and viruses only).
Abstract The world has progressed in terms of communication, particularly since the introduction of the Internet. The rise of cybercrime, often known as e-crimes (electronic crimes), is a major challenge confronting today's society. As a result, cybercrime poses a threat to nations, companies, and individuals all across the world. It has expanded to many parts of the globe, and millions of ...
Cyber Security is defined as a crime in which a computer is subject to crime (piracy, phishing, spam) or used as a tool to commit a crime (child pornography, hate crimes). Cyber-criminals can use computer technology to access personal information, trade secrets or use the Internet for malicious or exploitative purposes.
Indian Journal of Law and Legal Research Volume IV Issue I | ISSN: 2582-8878 Page: 1 CYBER LAWS IN INDIA: AN OVERVIEW Jatin Patil, BA LL.B, School of Law, NMIMS, Hyder abad ABSTRACT The world has ...
The research is done on "Study on Emerging Issues of Cyber Attacks & Security: In India" The Quantitative Research Design used is in this paper is Descriptive research.
Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this ...
Security solutions for networking, data center, cloud, and collaboration, powered by a unified platform with easy integration for third-party apps and solutions.
PDF | In the current world that is run by technology and network connections, it is crucial to know what cyber security is and to be able to use it... | Find, read and cite all the research you ...