SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 5, August 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 4
Global Perspective: Cyberlaw, Regulations and Compliance
Syed Meharanjunisa
University of Mysore, Mysore, Karnataka, India
ABSTRACT
Cyber security provides protection to the internet connected networks and
system from the cyber-attacks. To stop attacks everyone must know and
aware of all cyber law, regulations and compliance to secure the cyber. Cyber
security is all about to stop cyber-crime. Cyber securityis mustandwehaveto
know about all safety measures required to stop cybercrime. This paper give
details information about cyber security and its safety measure. Also we will
discuss about the activities related to it and how actually cybercrimehappens
and all steps taken by the various organization and Governmenttohavecyber
ethics everywhere. Cyber security provides protectionagainstthecybercrime
and teach us what essential safety measures one need to follow from all
cybercrimes. Securing online information is priority where everyone is
involved with technology. Whenever anyone talked about cyber security,
straight one thing comes in mind that is cybercrime and whatsafetymeasures
need to take to be safe from it.
KEYWORDS: Cyber security, cybercrime, safety measures, cyber ethics
How to cite this paper: Syed
Meharanjunisa "Global Perspective:
Cyberlaw, Regulations and Compliance"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-5, August
2020, pp.4-7, URL:
www.ijtsrd.com/papers/ijtsrd31684.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
I. INTRODUCTION
A cyber security regulation comprises of ordinances that
protect information technology and computer systems to
protect the organizationfromcybercrimesandcyber-attacks
of viruses, phishing, unauthorized access etc [1]. There are
many measures to prevent from all these. Cyber Security
refers to the all safety measure taken to protect from all
deception practices done online to steal personal data andto
protect networks, programs, devices, damage and any
unauthorized access. Any information which transferred
through network can be easily hacked these days and
everyone access most of the things only whether it is
professional or personal. In organisation most of the work
done through email, audio videoconferences,HRMS, etc. and
in personal people do online bankingaswell.Eventheonline
chats are also not safe these days [2-4]. Anyone while doing
work ever think of that how much it is secured to access
everything online. Cyber-crime is increasing day by day
therefore there are various organisation and Government
who come in front to deal with all kind of cyber-crimes. IT
industry must focus on safety measure as 60 percent of total
transactions are done online so this field must have high
quality of security to give all safety to users while doing any
transactions. Even the cyber space these days are not safe.
Latest technologies like E-commerce, mobile computing,
cloud computing need highcybersecuritystandards.Making
the internet safer is the important and integral part of the
development IT Services and forGovernmentalsoimportant
to look into it to safeguards IT Services. Though we have
individual cyber cells to deal every individual case and the
response time is great. In 1903, first attack came into
existence and after that frequent crimes came up. People
associated with cyber security but it is more than that. The
modern hackers are there who are breaking down cyber
securities. Method have increased of hacking, new
techniques and new ways came up of cybercrime. These
tools know a exploit kits which is designed to exploit human
and to blackmail them and get all information. Effective
cyber security will protect but not necessary to protect
network where hackers will not attempt to attack andtarget
to track the system or whole server. But by cyber security, it
will difficult for hackers to crack the firewall and get into it
[3-6].
II. CYBER LAW
Cyber law is the law which deals with overall legal system of
cyberspace and internetlegal issueswhichcoversbroadarea
of cyber and all legal issues including right to freedom on
internet, freedom of expression, access to and usage of
internet and privacy of individual on internet. In common
language cyber law is the law of internet. In 1986, first cyber
law was enacted which covers computer fraudandabuse act
[7].
III. REQUIREMENT OF CYBER LAWS
Like existence of any other law, a cyber law is also created to
help people and organization to protect them from all legal
cases which is done online. It protects and safe against any
crime done online. For example, if anyone do any crime
online, victim can take action against that person and fight
till the time criminals get punished or sentenced. If you
break cyber law there are different kinds of punishment
depends upon what you affronted, where you broke and
IJTSRD31684
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 5
where you live. There is situation when your website gets
suspended or banned if your IP address is found in any
criminal activity and it will get blocked also. If someone
committed more serious crime such as hacking, misusing of
any personal data, hacking website, company distress etc.
then some serious actionmusttakeagainstyouwhereoneca
have to give good amount of penalty or may get into prison
as well [8,9].
IV. CYBER REGULATION
A cyber regulation is the regulation which comprises of
ordinances to protect individual and organization of any
kind of fraud related to cybercrimes like phishing,
unauthorized access, viruses, worms, personal online
damage etc. Regulations are meant to prevent fromall these.
In India, the Information Technology Act, 2000 came into
existence to provide legal acknowledgement to online
communication and to facilitate filing of online records with
the Governments. Regulations covers all aspects of crime
related to cyberspace and provide judgement basis on
ordinance [10].
V. CYBER COMPLIANCE
Compliance is defined as rules and requirements meeting.
Cyber compliance istocreatecompliance whichcontrolsrisk
based crime and protect the integrity, confidentially and
accessibility of information which are stored safely so thatit
can be processed and transferred. Every organization have
their own cyber department which look after the cases and
they have there on compliance to deal with the cybercrimes
[11,12].
VI. STEPS TO CREATE CYBERSECURITY
COMPLIANCE
There are 5 steps which may create cyber security
compliance program as follows-
1. DevelopComplianceTeam-Anorganizationmusthave
compliance team whether the company is small or big,
must have team of compliance to handle all work and
issues related to cyberspace and can communicate to
across business and IT departments.
2. Determine a Risk Analysis- Organization must follow
and have approach on risk basedtocomplianceandeasy
flow risk analysis process.
Identity of all information systems,assets,networksand
data access.
One can access the risk at all level and determine high
risk information stored, collected and transmitted.
After access of risk, one need to analysetheriskbyusing
formula
Once the risk is analysed, one need to determine how to
handle it whether to keep or reject the risk.
3. Arranged Controls- Based on risk analysedoneneedto
set risk controller like arrange of firewalls, strong
password policies, encryption,twofactorauthentication
protection, insurance, training of employee etc.
4. Generate Policies- Create policies documents which
controls and aware about all compliance of activities
and controls.
5. Monitor and Respond- All compliance must be check
and monitor to respond on time to time and find out
new ways to treat with threats and any kind of
vulnerabilities [13].
VII. GOVERNANCE, RISK MANAGEMENT AND
COMPLIANCE (GRC)
As compliance and risk go simultaneouslyorganization must
implement governance, risk and compliance (GRC)program
to improve sharing information among one another. The
compliance feature of GRC is to define to take legal
requirement in the organization for management process to
identity the role of legislation, policies and regulations to
deal with legal aspects and develop the compliance report.
GRC will help in analysing the gap to know the risk potential
associated with compliance versus potential costs of non-
compliance actions [14].
VIII. CHALLENGES OF CYBER SECURITY
There are many challenges while doing effective cyber
security in an organization or for personal reasons [15-18].
Few of them are as follows-
1. Network Security - The networksarenotsecureasthere
are many unwanted users sitting online and ready to
attack and destruct the interventions.
2. Application Security- Regular updating of mobile and
computer application is must to ensure any kind of
attacks and need to check on time to time.
3. Data Security - Second layer of security is required to
secure data on applications and network which is very
challenging. The use of two factor authentication safety
is must these to protect themselves from cybercrime.
4. Cloud Security- Cloud protection is must which require
large amount of space and online safe environment to
protect from data stolen.
5. Mobile Security- It involves every type of security from
login to space, from chat to banking which againrequire
conscious user’s involvement
IX. CYBER ETHICS
Organization must aware of cyber ethics of internet and use
this practice for proper use of knowledge to safe internet.
There are few points which need to consider for cyber
ethics-
Do not use any offensive and violent language
Cyber Bully is a crime so don’t bully
Plagiarism of any content come under stolen and
hacking.
Involve with someone other computer or network
comes under cybercrime.
Follow the copyright rules, never download material or
software’s which involve the information of other.
Always us free data available on internet or software’s.
Cyber ethics is significant and must be trailed by everybody
and takes the responsibility to decline the cybercrimes [13-
16].
X. SAFETY MEASURES FOR CYBER LAW SECURITY
SYSTEM
Basic precautions must be taken by everyone who use
internet and online transactions and work:
1. Security Suite- Keep real time full security through
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 6
secure suite which will protectfromonline malwareand
from any loss of personal and professional loss.
2. Strong Password- Password must be strong and
powerful so that no one can guess and useitforanykind
of fraud and it should be changed frequently by using
special character.
3. Regular Update Software – It is important for OS and
internet security toupdate regularsoftwaretoavoidany
kind of cybercrime as criminal’s use known exploitsand
flaws to gain access of system.
4. Manage Social Media Settings- Cyber criminals keep an
eye on social media information soitmustbelockedand
frequently change like password. Share as much less
information on social media so that anyone won’t be
able to guess security questions answers.
5. Intensify Home Network- Home network must have
strong encrypted password and have virtual private
network. If cybercriminals do succeed to drudge your
interaction link, they won’t intercept anything but
encoded data. It’s a great idea to use VPN in both public
and personal network so that it protects everywhere.
6. Secure Personal Computer- This can be done by
activating computer firewall, using anti-virus, malware
software and block spyware attacks by regularly
installing and updating software’s.
7. Secure Mobile Devices-Mobile devices must be updated
and password protected in two-factor authentication
and applications must be downloaded from trusted
sources.
8. Install latest Operating System- All Currentandupdated
operating system must be used in Windows, Mac, Linux
to prevent potential attacks on older software.
9. Use of Big data sciences and data mining techniques for
additional security cover toprevencyberbreaching[19-
21].
XI. CONCLUSION
For the emerging trend of online crime cases, it is very
important for every organization to have compliance
department which handle all cybercrime cases and must
aware of cyber law and regulations to deal with it.
Cybercrime are coming with new faces these days and we
listen many kinds of crimes related to it. We must follow
regulations and aware of cyberlawtohandleall compliances
and must take legal action to stop it in future. There is no
absolute solution of cybercrimes but one can take
precautions while using online and networks. Organization
must emphasis on regular trainings to IT department and
basis training to every department to enhance the
knowledge of online uses of networks, data and information
so that they can save the work. Individual also must be
aware of cyber law, regulation and compliance to deal with
any kind of issues related to cybercrimes. Cyber security
takes all measures to protect online crime and use as a
safeguards with regulations and compliances for all
networks, programs, software, data and information. The
protection and preventionofnetwork ismustandprovide all
intentional and unintentional intrusion for both inside and
outside system to protect and ensure assurance, integrity of
information and data online.
XII. REFERENCES
[1] Rahul Reddy Nadikattu, New Ways of Implementing
Cyber Security to Help in Protecting America x Journal
of Xidian University, VOLUME 14, ISSUE 5, 2020, Page
No: 6004 - 6015. Available at
SSRN: https://ssrn.com/abstract=3622822 (May 14,
2020).
[2] M. Bada, A. M. Sasse and J. R. Nurse, Cyber Security
Awareness Campaigns: Why do they fail to change
behaviour? ArXiv, abs/1901.02672. (2019).
[3] A. Ertan, G. Crossland, C. P. Heath, D. Denny and R. B.
Jensen, Cyber Security Behaviour In
Organisations. ArXiv, abs/2004.11768. (2020).
[4] M Lakshmi Prasanthi. Cyber Crime: Prevention &
Detection International Journal of Advanced Research
in Computer
[5] M. H. Kumar and A. S. Rani, Cyber security and the
Internet of Things: Vulnerabilities, threats, intruders
and attacks. International Journal of Advance Research,
Ideas and Innovations in Technology, 5, 1343-1346.
(2019).
[6] K. Halouzka and L. Burita, Cyber Security Strategic
Documents Analysis. 2019 International Conferenceon
Military Technologies (ICMT), 1-6. (2019).
[7] J. Rosenoer, Cyber Law: The Law of the Internet.
(1996).
[8] G. M Someswar and K. Roopanjali, Constitutional
Implications of Cyber Security Laws in
India. International Journal of Research, 5, 601-620.
(2018).
[9] B. Sahu, N. Sahu, S. K. Sahu and P. Sahu, identify
Uncertainty of Cyber Crime and Cyber Laws. 2013
International Conference on Communication Systems
and Network Technologies, 450-452. (2013).
[10] Podbregar and P. Sprajc, Adaptability of state to a new
CI challenges – with focus on cyber warfare
domain. National security and the future, 19, 187-199.
(2018).
[11] S. E. Blythe, The Proposed Computer Laws of Uganda:
Moving Toward Secure E-Commerce Transactionsand
Cyber-CrimeControl. JournalofManagementPolicyand
Practice, 11, 19-33(2010)..
[12] S. Chatterjee, A. K. Kar, Y. K. Dwivedi and H. Kizgin,
Prevention of cybercrimes in smartcitiesofIndia:from
a citizen's perspective. Inf. Technol. People, 32, 1153-
1183. (2019).
[13] https://www.computerhope.com/jargon/c/cyber-
law.htm
[14] https://digitalguardian.com/blog/what-cyber-security
[15] https://www.rcmp-grc.gc.ca/to-ot/tis-set/cyber-tips-
conseils-eng.htm
[16] https://www.computerhope.com/jargon/c/cyber-
law.htm
[17] Mohammad, Sikender Mohsienuddin, Security and
Privacy Concerns of the 'Internet of Things' (IoT) in IT
and its Help in the Various Sectors across the World x
International Journal of Computer Trends and
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 7
Technology (IJCTT) – Volume 68 Issue 4 – April 2020.
Available at
SSRN: https://ssrn.com/abstract=3630513 (April 4,
2020).
[18] Soni, Vishal Dineshkumar, Challenges and Solution for
Artificial Intelligence in Cyber security of the USA.
Available at
SSRN: https://ssrn.com/abstract=3624487 or http://d
x.doi.org/10.2139/ssrn.3624487(June 10, 2020)
[19] Rahul Reddy Nadikattu, Data Warehouse Architecture
– Leading the Next Generation Data Science Rahul
Reddy Nadikattu "Data Warehouse Architecture –
Leading the next generation Data Science"
International Journal of Computer Trends and
Technology 67.9 (2019):78-80.. Available at
SSRN: https://ssrn.com/abstract=3622840 or http://d
x.doi.org/10.2139/ssrn.3622840(September 11,
2019).
[20] R. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber-
security analysis of smart SCADA systems with game
models. Proceedings of the 9th annual cyber and
information security research conference, ACM, 2014,
pp. 109–112.
[21] RachnaBuch, Dhatri Ganda, Pooja Kalola, NiraliBorad,
World of Cyber Security and Cybercrime. Recent
Trends in Programming Languages. ISSN: 2455-1821
(Online) Volume 4, Issue 2

Más contenido relacionado

La actualidad más candente

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printingCHETAN THAKRE
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 

La actualidad más candente (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
Network security
Network security Network security
Network security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Network security
Network securityNetwork security
Network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 

Similar a Global Perspective Cyberlaw, Regulations and Compliance

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Securityijtsrd
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security Wee Tang
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)CR Group
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 

Similar a Global Perspective Cyberlaw, Regulations and Compliance (20)

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 

Más de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Más de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Último

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 

Último (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

Global Perspective Cyberlaw, Regulations and Compliance

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 5, August 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 4 Global Perspective: Cyberlaw, Regulations and Compliance Syed Meharanjunisa University of Mysore, Mysore, Karnataka, India ABSTRACT Cyber security provides protection to the internet connected networks and system from the cyber-attacks. To stop attacks everyone must know and aware of all cyber law, regulations and compliance to secure the cyber. Cyber security is all about to stop cyber-crime. Cyber securityis mustandwehaveto know about all safety measures required to stop cybercrime. This paper give details information about cyber security and its safety measure. Also we will discuss about the activities related to it and how actually cybercrimehappens and all steps taken by the various organization and Governmenttohavecyber ethics everywhere. Cyber security provides protectionagainstthecybercrime and teach us what essential safety measures one need to follow from all cybercrimes. Securing online information is priority where everyone is involved with technology. Whenever anyone talked about cyber security, straight one thing comes in mind that is cybercrime and whatsafetymeasures need to take to be safe from it. KEYWORDS: Cyber security, cybercrime, safety measures, cyber ethics How to cite this paper: Syed Meharanjunisa "Global Perspective: Cyberlaw, Regulations and Compliance" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-5, August 2020, pp.4-7, URL: www.ijtsrd.com/papers/ijtsrd31684.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) I. INTRODUCTION A cyber security regulation comprises of ordinances that protect information technology and computer systems to protect the organizationfromcybercrimesandcyber-attacks of viruses, phishing, unauthorized access etc [1]. There are many measures to prevent from all these. Cyber Security refers to the all safety measure taken to protect from all deception practices done online to steal personal data andto protect networks, programs, devices, damage and any unauthorized access. Any information which transferred through network can be easily hacked these days and everyone access most of the things only whether it is professional or personal. In organisation most of the work done through email, audio videoconferences,HRMS, etc. and in personal people do online bankingaswell.Eventheonline chats are also not safe these days [2-4]. Anyone while doing work ever think of that how much it is secured to access everything online. Cyber-crime is increasing day by day therefore there are various organisation and Government who come in front to deal with all kind of cyber-crimes. IT industry must focus on safety measure as 60 percent of total transactions are done online so this field must have high quality of security to give all safety to users while doing any transactions. Even the cyber space these days are not safe. Latest technologies like E-commerce, mobile computing, cloud computing need highcybersecuritystandards.Making the internet safer is the important and integral part of the development IT Services and forGovernmentalsoimportant to look into it to safeguards IT Services. Though we have individual cyber cells to deal every individual case and the response time is great. In 1903, first attack came into existence and after that frequent crimes came up. People associated with cyber security but it is more than that. The modern hackers are there who are breaking down cyber securities. Method have increased of hacking, new techniques and new ways came up of cybercrime. These tools know a exploit kits which is designed to exploit human and to blackmail them and get all information. Effective cyber security will protect but not necessary to protect network where hackers will not attempt to attack andtarget to track the system or whole server. But by cyber security, it will difficult for hackers to crack the firewall and get into it [3-6]. II. CYBER LAW Cyber law is the law which deals with overall legal system of cyberspace and internetlegal issueswhichcoversbroadarea of cyber and all legal issues including right to freedom on internet, freedom of expression, access to and usage of internet and privacy of individual on internet. In common language cyber law is the law of internet. In 1986, first cyber law was enacted which covers computer fraudandabuse act [7]. III. REQUIREMENT OF CYBER LAWS Like existence of any other law, a cyber law is also created to help people and organization to protect them from all legal cases which is done online. It protects and safe against any crime done online. For example, if anyone do any crime online, victim can take action against that person and fight till the time criminals get punished or sentenced. If you break cyber law there are different kinds of punishment depends upon what you affronted, where you broke and IJTSRD31684
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 5 where you live. There is situation when your website gets suspended or banned if your IP address is found in any criminal activity and it will get blocked also. If someone committed more serious crime such as hacking, misusing of any personal data, hacking website, company distress etc. then some serious actionmusttakeagainstyouwhereoneca have to give good amount of penalty or may get into prison as well [8,9]. IV. CYBER REGULATION A cyber regulation is the regulation which comprises of ordinances to protect individual and organization of any kind of fraud related to cybercrimes like phishing, unauthorized access, viruses, worms, personal online damage etc. Regulations are meant to prevent fromall these. In India, the Information Technology Act, 2000 came into existence to provide legal acknowledgement to online communication and to facilitate filing of online records with the Governments. Regulations covers all aspects of crime related to cyberspace and provide judgement basis on ordinance [10]. V. CYBER COMPLIANCE Compliance is defined as rules and requirements meeting. Cyber compliance istocreatecompliance whichcontrolsrisk based crime and protect the integrity, confidentially and accessibility of information which are stored safely so thatit can be processed and transferred. Every organization have their own cyber department which look after the cases and they have there on compliance to deal with the cybercrimes [11,12]. VI. STEPS TO CREATE CYBERSECURITY COMPLIANCE There are 5 steps which may create cyber security compliance program as follows- 1. DevelopComplianceTeam-Anorganizationmusthave compliance team whether the company is small or big, must have team of compliance to handle all work and issues related to cyberspace and can communicate to across business and IT departments. 2. Determine a Risk Analysis- Organization must follow and have approach on risk basedtocomplianceandeasy flow risk analysis process. Identity of all information systems,assets,networksand data access. One can access the risk at all level and determine high risk information stored, collected and transmitted. After access of risk, one need to analysetheriskbyusing formula Once the risk is analysed, one need to determine how to handle it whether to keep or reject the risk. 3. Arranged Controls- Based on risk analysedoneneedto set risk controller like arrange of firewalls, strong password policies, encryption,twofactorauthentication protection, insurance, training of employee etc. 4. Generate Policies- Create policies documents which controls and aware about all compliance of activities and controls. 5. Monitor and Respond- All compliance must be check and monitor to respond on time to time and find out new ways to treat with threats and any kind of vulnerabilities [13]. VII. GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE (GRC) As compliance and risk go simultaneouslyorganization must implement governance, risk and compliance (GRC)program to improve sharing information among one another. The compliance feature of GRC is to define to take legal requirement in the organization for management process to identity the role of legislation, policies and regulations to deal with legal aspects and develop the compliance report. GRC will help in analysing the gap to know the risk potential associated with compliance versus potential costs of non- compliance actions [14]. VIII. CHALLENGES OF CYBER SECURITY There are many challenges while doing effective cyber security in an organization or for personal reasons [15-18]. Few of them are as follows- 1. Network Security - The networksarenotsecureasthere are many unwanted users sitting online and ready to attack and destruct the interventions. 2. Application Security- Regular updating of mobile and computer application is must to ensure any kind of attacks and need to check on time to time. 3. Data Security - Second layer of security is required to secure data on applications and network which is very challenging. The use of two factor authentication safety is must these to protect themselves from cybercrime. 4. Cloud Security- Cloud protection is must which require large amount of space and online safe environment to protect from data stolen. 5. Mobile Security- It involves every type of security from login to space, from chat to banking which againrequire conscious user’s involvement IX. CYBER ETHICS Organization must aware of cyber ethics of internet and use this practice for proper use of knowledge to safe internet. There are few points which need to consider for cyber ethics- Do not use any offensive and violent language Cyber Bully is a crime so don’t bully Plagiarism of any content come under stolen and hacking. Involve with someone other computer or network comes under cybercrime. Follow the copyright rules, never download material or software’s which involve the information of other. Always us free data available on internet or software’s. Cyber ethics is significant and must be trailed by everybody and takes the responsibility to decline the cybercrimes [13- 16]. X. SAFETY MEASURES FOR CYBER LAW SECURITY SYSTEM Basic precautions must be taken by everyone who use internet and online transactions and work: 1. Security Suite- Keep real time full security through
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 6 secure suite which will protectfromonline malwareand from any loss of personal and professional loss. 2. Strong Password- Password must be strong and powerful so that no one can guess and useitforanykind of fraud and it should be changed frequently by using special character. 3. Regular Update Software – It is important for OS and internet security toupdate regularsoftwaretoavoidany kind of cybercrime as criminal’s use known exploitsand flaws to gain access of system. 4. Manage Social Media Settings- Cyber criminals keep an eye on social media information soitmustbelockedand frequently change like password. Share as much less information on social media so that anyone won’t be able to guess security questions answers. 5. Intensify Home Network- Home network must have strong encrypted password and have virtual private network. If cybercriminals do succeed to drudge your interaction link, they won’t intercept anything but encoded data. It’s a great idea to use VPN in both public and personal network so that it protects everywhere. 6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus, malware software and block spyware attacks by regularly installing and updating software’s. 7. Secure Mobile Devices-Mobile devices must be updated and password protected in two-factor authentication and applications must be downloaded from trusted sources. 8. Install latest Operating System- All Currentandupdated operating system must be used in Windows, Mac, Linux to prevent potential attacks on older software. 9. Use of Big data sciences and data mining techniques for additional security cover toprevencyberbreaching[19- 21]. XI. CONCLUSION For the emerging trend of online crime cases, it is very important for every organization to have compliance department which handle all cybercrime cases and must aware of cyber law and regulations to deal with it. Cybercrime are coming with new faces these days and we listen many kinds of crimes related to it. We must follow regulations and aware of cyberlawtohandleall compliances and must take legal action to stop it in future. There is no absolute solution of cybercrimes but one can take precautions while using online and networks. Organization must emphasis on regular trainings to IT department and basis training to every department to enhance the knowledge of online uses of networks, data and information so that they can save the work. Individual also must be aware of cyber law, regulation and compliance to deal with any kind of issues related to cybercrimes. Cyber security takes all measures to protect online crime and use as a safeguards with regulations and compliances for all networks, programs, software, data and information. The protection and preventionofnetwork ismustandprovide all intentional and unintentional intrusion for both inside and outside system to protect and ensure assurance, integrity of information and data online. XII. REFERENCES [1] Rahul Reddy Nadikattu, New Ways of Implementing Cyber Security to Help in Protecting America x Journal of Xidian University, VOLUME 14, ISSUE 5, 2020, Page No: 6004 - 6015. Available at SSRN: https://ssrn.com/abstract=3622822 (May 14, 2020). [2] M. Bada, A. M. Sasse and J. R. Nurse, Cyber Security Awareness Campaigns: Why do they fail to change behaviour? ArXiv, abs/1901.02672. (2019). [3] A. Ertan, G. Crossland, C. P. Heath, D. Denny and R. B. Jensen, Cyber Security Behaviour In Organisations. ArXiv, abs/2004.11768. (2020). [4] M Lakshmi Prasanthi. Cyber Crime: Prevention & Detection International Journal of Advanced Research in Computer [5] M. H. Kumar and A. S. Rani, Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks. International Journal of Advance Research, Ideas and Innovations in Technology, 5, 1343-1346. (2019). [6] K. Halouzka and L. Burita, Cyber Security Strategic Documents Analysis. 2019 International Conferenceon Military Technologies (ICMT), 1-6. (2019). [7] J. Rosenoer, Cyber Law: The Law of the Internet. (1996). [8] G. M Someswar and K. Roopanjali, Constitutional Implications of Cyber Security Laws in India. International Journal of Research, 5, 601-620. (2018). [9] B. Sahu, N. Sahu, S. K. Sahu and P. Sahu, identify Uncertainty of Cyber Crime and Cyber Laws. 2013 International Conference on Communication Systems and Network Technologies, 450-452. (2013). [10] Podbregar and P. Sprajc, Adaptability of state to a new CI challenges – with focus on cyber warfare domain. National security and the future, 19, 187-199. (2018). [11] S. E. Blythe, The Proposed Computer Laws of Uganda: Moving Toward Secure E-Commerce Transactionsand Cyber-CrimeControl. JournalofManagementPolicyand Practice, 11, 19-33(2010).. [12] S. Chatterjee, A. K. Kar, Y. K. Dwivedi and H. Kizgin, Prevention of cybercrimes in smartcitiesofIndia:from a citizen's perspective. Inf. Technol. People, 32, 1153- 1183. (2019). [13] https://www.computerhope.com/jargon/c/cyber- law.htm [14] https://digitalguardian.com/blog/what-cyber-security [15] https://www.rcmp-grc.gc.ca/to-ot/tis-set/cyber-tips- conseils-eng.htm [16] https://www.computerhope.com/jargon/c/cyber- law.htm [17] Mohammad, Sikender Mohsienuddin, Security and Privacy Concerns of the 'Internet of Things' (IoT) in IT and its Help in the Various Sectors across the World x International Journal of Computer Trends and
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 7 Technology (IJCTT) – Volume 68 Issue 4 – April 2020. Available at SSRN: https://ssrn.com/abstract=3630513 (April 4, 2020). [18] Soni, Vishal Dineshkumar, Challenges and Solution for Artificial Intelligence in Cyber security of the USA. Available at SSRN: https://ssrn.com/abstract=3624487 or http://d x.doi.org/10.2139/ssrn.3624487(June 10, 2020) [19] Rahul Reddy Nadikattu, Data Warehouse Architecture – Leading the Next Generation Data Science Rahul Reddy Nadikattu "Data Warehouse Architecture – Leading the next generation Data Science" International Journal of Computer Trends and Technology 67.9 (2019):78-80.. Available at SSRN: https://ssrn.com/abstract=3622840 or http://d x.doi.org/10.2139/ssrn.3622840(September 11, 2019). [20] R. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber- security analysis of smart SCADA systems with game models. Proceedings of the 9th annual cyber and information security research conference, ACM, 2014, pp. 109–112. [21] RachnaBuch, Dhatri Ganda, Pooja Kalola, NiraliBorad, World of Cyber Security and Cybercrime. Recent Trends in Programming Languages. ISSN: 2455-1821 (Online) Volume 4, Issue 2