Suche senden
Hochladen
Cyber Security Awareness Challenge: In India
•
0 gefällt mir
•
15 views
IRJET Journal
Folgen
https://irjet.net/archives/V5/i1/IRJET-V5I1268.pdf
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 2
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Indian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
anthony4web
Cyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
Potato
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
ShivamSharma909
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
Htc itmr 30-05-13
Htc itmr 30-05-13
s.balu swaminathan
Cybercrime: Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
Empfohlen
Indian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
anthony4web
Cyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
Potato
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
ShivamSharma909
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
Htc itmr 30-05-13
Htc itmr 30-05-13
s.balu swaminathan
Cybercrime: Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
Cyber Security in Manufacturing
Cyber Security in Manufacturing
CentraComm
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
Cyber security and threats
Cyber security and threats
Harsh Kumar
Cyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
cybersecurity and cyber crime
cybersecurity and cyber crime
Darshan Aswani
Cyberlaw
Cyberlaw
ambadesuhas
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
Cyber crime and laws
Cyber crime and laws
Ajnish Rana
Assignment 1
Assignment 1
Jeewanthi Fernando
Cyber security laws
Cyber security laws
Nasir Bhutta
Cyber laws with case studies
Cyber laws with case studies
Bhagya Bgk
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
Mobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
Cyber crime p pt
Cyber crime p pt
Hemant
Cybercrime kunal gupta
Cybercrime kunal gupta
kg19
Chapter 3.docx
Chapter 3.docx
Amir Khan
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
Cyber security basics
Cyber security basics
Rohit Srivastava
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
ijtsrd
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
IRJET Journal
Weitere ähnliche Inhalte
Was ist angesagt?
Cyber Security in Manufacturing
Cyber Security in Manufacturing
CentraComm
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
Cyber security and threats
Cyber security and threats
Harsh Kumar
Cyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
cybersecurity and cyber crime
cybersecurity and cyber crime
Darshan Aswani
Cyberlaw
Cyberlaw
ambadesuhas
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
Cyber crime and laws
Cyber crime and laws
Ajnish Rana
Assignment 1
Assignment 1
Jeewanthi Fernando
Cyber security laws
Cyber security laws
Nasir Bhutta
Cyber laws with case studies
Cyber laws with case studies
Bhagya Bgk
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
Mobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
Cyber crime p pt
Cyber crime p pt
Hemant
Cybercrime kunal gupta
Cybercrime kunal gupta
kg19
Chapter 3.docx
Chapter 3.docx
Amir Khan
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
Cyber security basics
Cyber security basics
Rohit Srivastava
Was ist angesagt?
(19)
Cyber Security in Manufacturing
Cyber Security in Manufacturing
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
Cyber security and threats
Cyber security and threats
Cyber Crime and a Case Study
Cyber Crime and a Case Study
cybersecurity and cyber crime
cybersecurity and cyber crime
Cyberlaw
Cyberlaw
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Cyber crime and laws
Cyber crime and laws
Assignment 1
Assignment 1
Cyber security laws
Cyber security laws
Cyber laws with case studies
Cyber laws with case studies
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
Mobile security issues & frauds in India
Mobile security issues & frauds in India
Cyber crime p pt
Cyber crime p pt
Cybercrime kunal gupta
Cybercrime kunal gupta
Chapter 3.docx
Chapter 3.docx
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
Cyber security basics
Cyber security basics
Ähnlich wie Cyber Security Awareness Challenge: In India
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
IRJET Journal
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
ijtsrd
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
IRJET Journal
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
IRJET Journal
India and its wall of data security
India and its wall of data security
Ashish Jhalani
India and Its Wall of Data Security
India and Its Wall of Data Security
eTailing India
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
IRJET Journal
Cyber Security Awareness
Cyber Security Awareness
Ramiro Cid
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
IRJET Journal
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking System
paperpublications3
Cyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
Cyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
Cyber crime
Cyber crime
praveen1792
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
MAHIRA
Cyber crime
Cyber crime
JASJIT SINGH
Cybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
A report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
Ähnlich wie Cyber Security Awareness Challenge: In India
(20)
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
India and its wall of data security
India and its wall of data security
India and Its Wall of Data Security
India and Its Wall of Data Security
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
Cyber Security Awareness
Cyber Security Awareness
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking System
Cyberfort syllabus & career
Cyberfort syllabus & career
Cyberfort syllabus & career
Cyberfort syllabus & career
Cyber crime
Cyber crime
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
Cyber crime
Cyber crime
Cybersecurity awareness.pdf
Cybersecurity awareness.pdf
A Wake-Up Call for IoT
A Wake-Up Call for IoT
A report on cyber Crime
A report on cyber Crime
Mehr von IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mehr von IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Kürzlich hochgeladen
School management system project Report.pdf
School management system project Report.pdf
Kamal Acharya
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
BhangaleSonal
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
Magic Marks
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
Hostel management system project report..pdf
Hostel management system project report..pdf
Kamal Acharya
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
smsksolar
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
RAJNEESHKUMAR341697
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
hamedmustafa094
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
Kürzlich hochgeladen
(20)
School management system project Report.pdf
School management system project Report.pdf
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Online electricity billing project report..pdf
Online electricity billing project report..pdf
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Hostel management system project report..pdf
Hostel management system project report..pdf
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
Cyber Security Awareness Challenge: In India
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1258 Cyber Security Awareness Challenge: In India Shikha Panwar1, Dr. Mona Purohit2 1MS Scholar, UIT- BU, Bhopal, M.P., India 2HoD, Department of Legal Study, BU, Bhopal, M.P., India MS Cyber Law and Information Security, Barkatullah University, Bhopal, Madhya Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Now days we are surrounded byinternet.Andthe Infosec 1 is the important feature of internet world. The information security is necessary for web basedservices.Every organizations, institutes and firms also maintain security of their information and they continuously worked to keep their data safe and secure. Organizations and private firms continuously trained their security professionals with latest technology. Information security is necessary for organizations as well as internet users who are using web based services like social networking, realtimeapplications,E- mails. Organizations and firms know the importance of security but the user who does not know much about internet and security of information. The research will show why information security is necessary for organizations as well as other internet users, and how can they keep secure their information, how does their information used by hackers and what techniques used by hackers. And why securityawareness is necessary for internet users and organizations. And what step is to be taken by government. Key Words: Infosec, Cyber crime, Digital Signature, Cyber Law, Cyber Security. 1. INTRODUCTION Before 15 august 1995, Internet had been in India for many years in the form of ERNET2. This was provided to government offices, scientific research centers, Organizations but from 15 august 1995 internet was available for all but in limited area by VSNL (Videsh Sanchar Nigam Limited). Since then till now internet area and internet users are continuously growing. But there is lack of awareness as compared to internet or technical growth in India. Private firms, government organizations, institutes aware about information security and they trained their security experts time to time according to new technology but there are huge internet users who don’t know about information security and less aware about information security. They actually don’t know how to protect their information from being misused by others because lack of awareness towards security. Most targeted peoples are general public because their information can be easily available from social networks and from their personal sources and by various cyber attacks, as well as other firms and organizations are also targeted because of their own 1 Infosec - Information Security. 2 ERNET – Educational Research Network frustrated employees or by hackers for their entertainment or for money. 1.1 Internet Statics of India: Before 15 august 1995 internet wasonly available tolimited fieldssuch as scientific research centers, governmentoffices, military or some of educational institutes. After the internet available publically the users are continuously vary. This sounds good that the internet users are continuously growing since 1995 to now but the risk of cyber attacks or cyber crime also increasing. Now internet facility is easily available to all without paying huge amount the internet facility cost is low as compared to previous years and cell phones are the best gadget to use internet and connect worldwide without any extra effort. The internet statics shows how internet users are growing year by year: 2. Cyber crime: Any unlawful act that committed knowingly orunknowingly through any electronic communication device or network like computer, cell phone, internet etc. that causes loss of time, money, privacy or integrity of target. Cyber crime committed: Cyber crime against individual Cyber crime against organization Cyber crime against society Cyber crime against Cyber crime against property
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1259 There are various reasons behind committing Cyber crime that are: Crime committed for personal entertainment To harass someone personally using cyber bullying or cyber stalking To earn money via blackmailing To take revenge for personal reason There are various Cyber crime techniques but few of them are mostly used as Cyber attack techniques in India: Hacking Forgery E mail spoofing Cyber bullying Cyber stalking Spamming Pornography Online frauds Salami attacks Cyber defamation According to NCRB 3 Cyber crime are increasing day by day and due to lack of awareness most of the crimes are not filed or action not taken against crime. 3. Challenges or Need forCybersecurityawareness: The biggest challenge for cyber security awareness in India is population. We can spread security awareness at metro cities, urban areas, sub urban areas but what where the literature percentage is below 20% and they are using cell phone and internet facility but they actually don’t know about the legal or illegal activities over internet they unknowingly committed crimes where law will be helpless because that act is illegal but the offender is innocence. While the biggest challenge amongst them all are well educated populations because they tend their selves so smart and techno friendly when the point comes on awareness they neglect the security features and sometimes commit such unlawful act to check whether something happened or not. The huge internet users come into age group between 18 to 35 years. Government may taking action against cyber criminalsand introduced cyber law but people and companies are lake aware about security and they neglect the awareness. Most of the companies neglect security audits. There are millions of companies whose working online or their data uploaded on server but due to improper guidance or neglecting behavior or lackofsecurity experts their customer’sinformation accessedbyhackerand they sell out that information at international market and earn money. All the banking system is online now but most of the banking sites or ATMs get hacked by hacker and transactions made online without knowing account holder. So that there are need of expertise of this field or need to keep update security policies as well as security techniques and should be aware about latest techniques and how to overcome them. Cyber crime is going to be so challengingfor India in few years. 3 NCRB: National Crime Records Bureau 4. For awareness steps should be taken: There should be campaigning about cyber security awareness. There should be compulsory training program for all that will describe about cyber crime and cyber security. Government should place cyber security experts in every field. Cyber Thana or cyber cell must be in every district or in every city. The awareness should be friendlier and guidance should be easy for all. 5. CONCLUSIONS Cyber security awareness or infosec awarenessisnecessary in India because internet is easiest way to commit crime there is no need to go out criminal only needs a network, a system or target that may be individual,organization,society or any property. Cyber crime continuously growing and almost everyone is targeted by different types of cyber attacks. So that the cyber security awareness should be spread more and more. Innocent people do not know how their personal information is being used by hackers and sell in international market. Cyber crime and cyber security is the biggest challenge for India aswell asfor other countries. Even now day’s conventional crimes also committed using high technology that also comes into cyber crime category. There should be a strong strategy against cyber crime and cyber criminals that takes action against them and prevent from getting targeted. And should be a separate cyber court and cyber lawyer so that the number of pendingcaseinIndia will be minimized. The more aware about information security the less target the people or organizations. And the cyber law should be more effectively come on forceforcyber crimes and need for more implementation. REFERENCES [1] Cyber security [Understanding cyber crimes, computer forensics and legal perspectives] by Nina Godbole,Sunit Belapure. [2] WHOA [Working to Halt online Abuse], US based online safety organization], www.haltabuse.org. [3] Internet statics [www.internetlivestats.com/internet- users/india]. [4] https://en.wikipedia.org/wiki/Cybercrime. [5] https://www.enotes.com/homework-help/define-five- categories-cybercrime-give-an-example-478828. [6] http://ncrb.gov.in/
Jetzt herunterladen