SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1258
Cyber Security Awareness Challenge: In India
Shikha Panwar1, Dr. Mona Purohit2
1MS Scholar, UIT- BU, Bhopal, M.P., India
2HoD, Department of Legal Study, BU, Bhopal, M.P., India
MS Cyber Law and Information Security, Barkatullah University, Bhopal, Madhya Pradesh, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Now days we are surrounded byinternet.Andthe
Infosec 1 is the important feature of internet world. The
information security is necessary for web basedservices.Every
organizations, institutes and firms also maintain security of
their information and they continuously worked to keep their
data safe and secure. Organizations and private firms
continuously trained their security professionals with latest
technology. Information security is necessary for
organizations as well as internet users who are using web
based services like social networking, realtimeapplications,E-
mails. Organizations and firms know the importance of
security but the user who does not know much about internet
and security of information. The research will show why
information security is necessary for organizations as well as
other internet users, and how can they keep secure their
information, how does their information used by hackers and
what techniques used by hackers. And why securityawareness
is necessary for internet users and organizations. And what
step is to be taken by government.
Key Words: Infosec, Cyber crime, Digital Signature, Cyber
Law, Cyber Security.
1. INTRODUCTION
Before 15 august 1995, Internet had been in India for many
years in the form of ERNET2. This was provided to
government offices, scientific research centers,
Organizations but from 15 august 1995 internet was
available for all but in limited area by VSNL (Videsh Sanchar
Nigam Limited). Since then till now internet area and
internet users are continuously growing. But there is lack of
awareness as compared to internet or technical growth in
India. Private firms, government organizations, institutes
aware about information security and they trained their
security experts time to time according to new technology
but there are huge internet users who don’t know about
information security and less aware about information
security. They actually don’t know how to protect their
information from being misused by others because lack of
awareness towards security. Most targeted peoples are
general public because their information can be easily
available from social networks and from their personal
sources and by various cyber attacks, as well as other firms
and organizations are also targeted because of their own
1
Infosec - Information Security.
2
ERNET – Educational Research Network
frustrated employees or by hackers for their entertainment
or for money.
1.1 Internet Statics of India:
Before 15 august 1995 internet wasonly available tolimited
fieldssuch as scientific research centers, governmentoffices,
military or some of educational institutes. After the internet
available publically the users are continuously vary. This
sounds good that the internet users are continuously
growing since 1995 to now but the risk of cyber attacks or
cyber crime also increasing. Now internet facility is easily
available to all without paying huge amount the internet
facility cost is low as compared to previous years and cell
phones are the best gadget to use internet and connect
worldwide without any extra effort. The internet statics
shows how internet users are growing year by year:
2. Cyber crime:
Any unlawful act that committed knowingly orunknowingly
through any electronic communication device or network
like computer, cell phone, internet etc. that causes loss of
time, money, privacy or integrity of target. Cyber crime
committed:
 Cyber crime against individual
 Cyber crime against organization
 Cyber crime against society
 Cyber crime against
 Cyber crime against property
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1259
There are various reasons behind committing Cyber crime
that are:
 Crime committed for personal entertainment
 To harass someone personally using cyber bullying
or cyber stalking
 To earn money via blackmailing
 To take revenge for personal reason
There are various Cyber crime techniques but few of them
are mostly used as Cyber attack techniques in India:
 Hacking
 Forgery
 E mail spoofing
 Cyber bullying
 Cyber stalking
 Spamming
 Pornography
 Online frauds
 Salami attacks
 Cyber defamation
According to NCRB 3 Cyber crime are increasing day by day
and due to lack of awareness most of the crimes are not filed
or action not taken against crime.
3. Challenges or Need forCybersecurityawareness:
The biggest challenge for cyber security awareness in India
is population. We can spread security awareness at metro
cities, urban areas, sub urban areas but what where the
literature percentage is below 20% and they are using cell
phone and internet facility but they actually don’t know
about the legal or illegal activities over internet they
unknowingly committed crimes where law will be helpless
because that act is illegal but the offender is innocence.
While the biggest challenge amongst them all are well
educated populations because they tend their selves so
smart and techno friendly when the point comes on
awareness they neglect the security features and sometimes
commit such unlawful act to check whether something
happened or not. The huge internet users come into age
group between 18 to 35 years. Government may taking
action against cyber criminalsand introduced cyber law but
people and companies are lake aware about security and
they neglect the awareness. Most of the companies neglect
security audits. There are millions of companies whose
working online or their data uploaded on server but due to
improper guidance or neglecting behavior or lackofsecurity
experts their customer’sinformation accessedbyhackerand
they sell out that information at international market and
earn money. All the banking system is online now but most
of the banking sites or ATMs get hacked by hacker and
transactions made online without knowing account holder.
So that there are need of expertise of this field or need to
keep update security policies as well as security techniques
and should be aware about latest techniques and how to
overcome them. Cyber crime is going to be so challengingfor
India in few years.
3
NCRB: National Crime Records Bureau
4. For awareness steps should be taken:
 There should be campaigning about cyber security
awareness.
 There should be compulsory training program for
all that will describe about cyber crime and cyber
security.
 Government should place cyber security experts in
every field.
 Cyber Thana or cyber cell must be in every district
or in every city.
 The awareness should be friendlier and guidance
should be easy for all.
5. CONCLUSIONS
Cyber security awareness or infosec awarenessisnecessary
in India because internet is easiest way to commit crime
there is no need to go out criminal only needs a network, a
system or target that may be individual,organization,society
or any property. Cyber crime continuously growing and
almost everyone is targeted by different types of cyber
attacks. So that the cyber security awareness should be
spread more and more. Innocent people do not know how
their personal information is being used by hackers and sell
in international market. Cyber crime and cyber security is
the biggest challenge for India aswell asfor other countries.
Even now day’s conventional crimes also committed using
high technology that also comes into cyber crime category.
There should be a strong strategy against cyber crime and
cyber criminals that takes action against them and prevent
from getting targeted. And should be a separate cyber court
and cyber lawyer so that the number of pendingcaseinIndia
will be minimized. The more aware about information
security the less target the people or organizations. And the
cyber law should be more effectively come on forceforcyber
crimes and need for more implementation.
REFERENCES
[1] Cyber security [Understanding cyber crimes, computer
forensics and legal perspectives] by Nina Godbole,Sunit
Belapure.
[2] WHOA [Working to Halt online Abuse], US based online
safety organization], www.haltabuse.org.
[3] Internet statics [www.internetlivestats.com/internet-
users/india].
[4] https://en.wikipedia.org/wiki/Cybercrime.
[5] https://www.enotes.com/homework-help/define-five-
categories-cybercrime-give-an-example-478828.
[6] http://ncrb.gov.in/

Más contenido relacionado

La actualidad más candente

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Benjamin Ang
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docxAmir Khan
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 

La actualidad más candente (19)

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 

Similar a Irjet v5 i1268

Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Complianceijtsrd
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIAIRJET Journal
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data securityAshish Jhalani
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data SecurityeTailing India
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking Systempaperpublications3
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )MAHIRA
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 

Similar a Irjet v5 i1268 (20)

Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking System
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 

Último

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Irjet v5 i1268

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1258 Cyber Security Awareness Challenge: In India Shikha Panwar1, Dr. Mona Purohit2 1MS Scholar, UIT- BU, Bhopal, M.P., India 2HoD, Department of Legal Study, BU, Bhopal, M.P., India MS Cyber Law and Information Security, Barkatullah University, Bhopal, Madhya Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Now days we are surrounded byinternet.Andthe Infosec 1 is the important feature of internet world. The information security is necessary for web basedservices.Every organizations, institutes and firms also maintain security of their information and they continuously worked to keep their data safe and secure. Organizations and private firms continuously trained their security professionals with latest technology. Information security is necessary for organizations as well as internet users who are using web based services like social networking, realtimeapplications,E- mails. Organizations and firms know the importance of security but the user who does not know much about internet and security of information. The research will show why information security is necessary for organizations as well as other internet users, and how can they keep secure their information, how does their information used by hackers and what techniques used by hackers. And why securityawareness is necessary for internet users and organizations. And what step is to be taken by government. Key Words: Infosec, Cyber crime, Digital Signature, Cyber Law, Cyber Security. 1. INTRODUCTION Before 15 august 1995, Internet had been in India for many years in the form of ERNET2. This was provided to government offices, scientific research centers, Organizations but from 15 august 1995 internet was available for all but in limited area by VSNL (Videsh Sanchar Nigam Limited). Since then till now internet area and internet users are continuously growing. But there is lack of awareness as compared to internet or technical growth in India. Private firms, government organizations, institutes aware about information security and they trained their security experts time to time according to new technology but there are huge internet users who don’t know about information security and less aware about information security. They actually don’t know how to protect their information from being misused by others because lack of awareness towards security. Most targeted peoples are general public because their information can be easily available from social networks and from their personal sources and by various cyber attacks, as well as other firms and organizations are also targeted because of their own 1 Infosec - Information Security. 2 ERNET – Educational Research Network frustrated employees or by hackers for their entertainment or for money. 1.1 Internet Statics of India: Before 15 august 1995 internet wasonly available tolimited fieldssuch as scientific research centers, governmentoffices, military or some of educational institutes. After the internet available publically the users are continuously vary. This sounds good that the internet users are continuously growing since 1995 to now but the risk of cyber attacks or cyber crime also increasing. Now internet facility is easily available to all without paying huge amount the internet facility cost is low as compared to previous years and cell phones are the best gadget to use internet and connect worldwide without any extra effort. The internet statics shows how internet users are growing year by year: 2. Cyber crime: Any unlawful act that committed knowingly orunknowingly through any electronic communication device or network like computer, cell phone, internet etc. that causes loss of time, money, privacy or integrity of target. Cyber crime committed:  Cyber crime against individual  Cyber crime against organization  Cyber crime against society  Cyber crime against  Cyber crime against property
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1259 There are various reasons behind committing Cyber crime that are:  Crime committed for personal entertainment  To harass someone personally using cyber bullying or cyber stalking  To earn money via blackmailing  To take revenge for personal reason There are various Cyber crime techniques but few of them are mostly used as Cyber attack techniques in India:  Hacking  Forgery  E mail spoofing  Cyber bullying  Cyber stalking  Spamming  Pornography  Online frauds  Salami attacks  Cyber defamation According to NCRB 3 Cyber crime are increasing day by day and due to lack of awareness most of the crimes are not filed or action not taken against crime. 3. Challenges or Need forCybersecurityawareness: The biggest challenge for cyber security awareness in India is population. We can spread security awareness at metro cities, urban areas, sub urban areas but what where the literature percentage is below 20% and they are using cell phone and internet facility but they actually don’t know about the legal or illegal activities over internet they unknowingly committed crimes where law will be helpless because that act is illegal but the offender is innocence. While the biggest challenge amongst them all are well educated populations because they tend their selves so smart and techno friendly when the point comes on awareness they neglect the security features and sometimes commit such unlawful act to check whether something happened or not. The huge internet users come into age group between 18 to 35 years. Government may taking action against cyber criminalsand introduced cyber law but people and companies are lake aware about security and they neglect the awareness. Most of the companies neglect security audits. There are millions of companies whose working online or their data uploaded on server but due to improper guidance or neglecting behavior or lackofsecurity experts their customer’sinformation accessedbyhackerand they sell out that information at international market and earn money. All the banking system is online now but most of the banking sites or ATMs get hacked by hacker and transactions made online without knowing account holder. So that there are need of expertise of this field or need to keep update security policies as well as security techniques and should be aware about latest techniques and how to overcome them. Cyber crime is going to be so challengingfor India in few years. 3 NCRB: National Crime Records Bureau 4. For awareness steps should be taken:  There should be campaigning about cyber security awareness.  There should be compulsory training program for all that will describe about cyber crime and cyber security.  Government should place cyber security experts in every field.  Cyber Thana or cyber cell must be in every district or in every city.  The awareness should be friendlier and guidance should be easy for all. 5. CONCLUSIONS Cyber security awareness or infosec awarenessisnecessary in India because internet is easiest way to commit crime there is no need to go out criminal only needs a network, a system or target that may be individual,organization,society or any property. Cyber crime continuously growing and almost everyone is targeted by different types of cyber attacks. So that the cyber security awareness should be spread more and more. Innocent people do not know how their personal information is being used by hackers and sell in international market. Cyber crime and cyber security is the biggest challenge for India aswell asfor other countries. Even now day’s conventional crimes also committed using high technology that also comes into cyber crime category. There should be a strong strategy against cyber crime and cyber criminals that takes action against them and prevent from getting targeted. And should be a separate cyber court and cyber lawyer so that the number of pendingcaseinIndia will be minimized. The more aware about information security the less target the people or organizations. And the cyber law should be more effectively come on forceforcyber crimes and need for more implementation. REFERENCES [1] Cyber security [Understanding cyber crimes, computer forensics and legal perspectives] by Nina Godbole,Sunit Belapure. [2] WHOA [Working to Halt online Abuse], US based online safety organization], www.haltabuse.org. [3] Internet statics [www.internetlivestats.com/internet- users/india]. [4] https://en.wikipedia.org/wiki/Cybercrime. [5] https://www.enotes.com/homework-help/define-five- categories-cybercrime-give-an-example-478828. [6] http://ncrb.gov.in/