Abstract

A technology enhances a man’s life in every aspect whether it is healthcare, transport, communication, education etc. During this Covid – 19 pandemic, the growths of technology usage have increased enormously. There are various issues and challenges which we face during the use of any technology. Security is the most important aspect, when we are using in any digital platform during Covid – 19. When we think about Cyber Security, the first thing that comes to our mind is “Cyber Crime” which is increasing immensely day by day. Cyber Security refers to the practice of ensuring the integrity, confidentiality and availability (ICA) of information. Basically Cyber security is the state or process of protecting and recovering networks, devices and programs from any type of Cyber Attack. It is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attacks or unauthorized access. Cyber-attacks in India have risen up to such an extent that our country ranks fourth out of the tenth targeted countries in the world. In this Covid – 19 pandemic Cyber-attacks are an evolving danger to many organizations, employees and consumers in different sectors. They may be designed to access or destroy sensitive data, change any kind of data or extort money. According to a Research, more than 50% of onliners are victim of some of cybercrime every year, which includes computer viruses, malware, credit card fraud, online scams, phishing, and identity theft and so on. These crimes will lead the country to lose millions of rupees or dollars, also time and expenses to put back the things in right directions. This paper mainly focuses on the different aspects of cyber security and the challenges faced in the implementation and by using latest technologies during Covid - 19. The paper also focuses on the India’s legal framework for Cyber Security.

Highlights

  • Inthistechnologicalera,digitaltransmissionofdataisverycommon.Thisdatacanbe ofanyform audio,video,e-mail,textetc.Butwhenwetransmitanydata,thefirstthing comesintoourmindis,How secureourdatais?In2009,comparedtophysicaltheft fraudulentmoneytransfershasexceededinbankbranchesofUnitedStates.Crimes havegoneupby60%everyyear,in2012,3500casesand2070in2011reportedinIndia

  • The defense of cyberspace necessarily involves the forging of effective partnershipsbetweenthepublicorganizationschargedwithensuringthesecurity ofcyberspaceandthosewhomanagetheuseofthisspacebymyriaduserslike government departments,banks,infrastructure,manufacturing and service enterprisesand individualcitizens.Thedefenseofcyberspacehasaspecial feature.Thenationalterritoryorspacethatisbeingdefendedbythe land,seaandairforcesiswelldefined.Outerspaceandcyberspacearedifferent

  • Thefinancialsectoraloneisexpectedtohireover2lakhpeoplewhiletelecoms,utility sectors,power,oil&gas,airlines,government(law&orderande-governance)willhire therest.Employmentnewssays-Basedonacademicbackgroundandworkexperience, ethicalhackerscandontherolesofnetworksecurityadministrators,networkdefense analysts,websecurityadministrators,applicationsecuritytesters,securityanalysts, http://sciforum.net/conference/mol2net-07 forensic analysts,penetration testers and securityauditors.the job role would be to developandtestITproductsandservicesoforganizationsandensurethattheyareas secure as possible.Secure programming,authorized hacking and network security surveillancearespecializationsinthisdomain

Read more

Summary

Introduction

Inthistechnologicalera,digitaltransmissionofdataisverycommon.Thisdatacanbe ofanyform audio,video,e-mail,textetc.Butwhenwetransmitanydata,thefirstthing comesintoourmindis,How secureourdatais?In2009,comparedtophysicaltheft fraudulentmoneytransfershasexceededinbankbranchesofUnitedStates.Crimes havegoneupby60%everyyear,in2012,3500casesand2070in2011reportedinIndia. 2.Applicationsecurityfocusesonkeepingsoftwareanddevicesfreeofthreats.A compromised application could provide accessto the data itsdesigned to protect.Successfulsecuritybeginsinthedesignstage,wellbeforeaprogram or deviceisdeployed. 5.End-usereducation involves educating end users with various information attacksandhowtoavoidthem.Forexample,whileregisteringpassword,tellend userwhatshouldbethelengthandcharacteristicsofcomplexpassword. 5.There is more technology advanced hackers,professionalcybercrime organization.Forexample,hackerreceivespaymenttoinfectenduserdevice withmalware.Today’sMalwaresaredifficulttotraceandtheystealdatafor financialgain.Somepeoplethinkthattheygetmoremoneyiftheybecome hackerscomparedtosecurers. There are a varietyofways this could be done, from using a false identity to access sensitive data (masquerade attack) tofloodingyourserverwith massiveamountsoftraffictomakeyourapplicationunresponsive(denialofserviceattack). 9.4% housesinIndiahavecomputer(anyofLaptoporDesktop).Chandigarh (U/T),GoaandNCTofDelhiaretopthreestats/unionterritorieswithhighest computerusage.Accordingto2011Census,Only3.1percentoftotalhouses haveInternetaccessinIndia.Thecensuscovered24,66,92,667(246.7million) housesinIndiaandfoundonly76,47,473(3.1%)ofthishousesuseInternet.The Internetincludes both broadband and low-speed connections.According to InternetWorld StatsonJune30 2012,therewere2.4 billioninternetusers (2,405,510,175)worldwide.Chinawasthelargestcountriesintermsofinternet userswithover538millionusers[10].Thefollowinggraph(figure1)showstop internetcountriesworldwideatmid-year2012: MOL2NET,2021,7,ISSN:2624-5078 11 http://sciforum.net/conference/mol2net-07 internet users in. CyberLaw called IT Law is the law regarding Information-technology includingcomputersandinternet.Itisrelatedtolegalinformaticsandsupervises the digitalcirculation ofinformation,software,information security and ecommerce. ITlaw doesnotconsistofaseparateareaoflaw ratheritenclosesaspectsof contract,intellectualproperty,privacyand data protection laws.Intellectual propertyisakeyelementofITlaw.Theareaofsoftwarelicenseiscontroversial andstillevolvinginEuropeandelsewhere. AccordingtoMinistryofElectronicandInformationTechnology,Governmentof India :CyberLaws yields legalrecognition to electronic documents and a structuretosupporte-filingande-commercetransactionsandalsoprovides a MOL2NET,2021,7,ISSN:2624-5078 14 http://sciforum.net/conference/mol2net-07 legalstructureto reduce,checkcybercrimes

AreaofCyberLaw
Copyright
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call