New Laws on Cyber Security

Abstract

This research paper examines the evolving landscape of cyber security laws in response to the increasing frequency and sophistication of cyber threats. As technology advances, so do the methods employed by malicious actors, prompting governments and organizations worldwide to adapt their legal frameworks. This study provides a comprehensive analysis of current cyber security legislation across various jurisdictions, highlighting key regulations, compliance challenges, and enforcement mechanisms. It also explores the balance between security and privacy, considering the implications of data protection laws on cyber security efforts. Through case studies and comparative analysis, the paper identifies best practices and emerging trends in cyber security legislation, offering recommendations for policymakers to enhance resilience against cyber threats while safeguarding individual rights. Ultimately, this research contributes to a deeper understanding of the critical role that legal frameworks play in shaping effective cyber security strategies.

Country : India

1 Prof. Rana Afreen Sheikh2 Aditya A. Pande3 Tanaya A. Fate4 Nadeemuddin

  1. Professor, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, India
  2. Student, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, India
  3. Student, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, India
  4. Student, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, India

IRJIET, Volume 8, Issue 10, October 2024 pp. 225-227

doi.org/10.47001/IRJIET/2024.810030

References

  1. Dhruti M. Kapadia, “Cyber Crimes against women and Laws in India” (Live Law, November 2018) accessed 22 October 2021.
  2. State of Tamil Nadu V. Suhas Katti (2004). “Porn MMSes from Delhi Metro CCTV footage!” (Zee News, 10 July 2013) 27 October 2021.
  3. “Thinking of a Cybersecurity Career? Read This” (Krebs on Security, 24 July 2020) accessed 14 November 2021.
  4. Gaur, K.D., Text book on Indian Penal Code, Fifth edition, 2014, Universal Law Publishing Company Pvt. Limited, New Delhi.
  5. K. Wang, Y. Wang, Y. Sun, S. Guo, and J. Wu, Green industrial Internet of Things architecture: An energy-efficient perspective, IEEE Commun. Mag., vol. 54, no. 12, pp. 4854, Dec. 2016.
  6. I.Hwang, S. Kim, Y. Kim, and C.E. Seah, A survey of fault detection, isolation, and reconguration methods, IEEE Trans. Control Syst. Technol., vol. 18, no. 3, pp. 636653, May 2010.
  7. A.A.Cárdenas, S.Amin, B.Sinopoli, A.Perrig, and S.Sastry, Challenges for securing cyber physical systems, in Proc. Workshop Cyber-Phys. Syst. Secur., 2006, pp. 17.
  8. P. J. Criscuolo, Distributed denial of service Trin00, tribe ood network, tribe ood network 2000, and stacheldraht CIAC-2319, Dept. Energy Comput. Incident Advisory Capability, Lawrence Livermore Nat. Lab., Livermore, CA, USA, Tech. Rep. UCRL-ID-136939, Feb. 2000.
  9. Presidents Council of Advisors on Science and Technology. Leadership Under Challenge: Information Technology R&D in a Competitive World. Aug. 2007. [Online]. Available: http://www.nitrd.gov/Pcast/reports/ PCAST-NIT-FINAL.pdf.
  10. R. Rajkumar, I. Lee, L. Sha, and J. Stankovic, Cyber-physical systems: The next computing revolution, in Proc. Design Autom. Conf., 2010, pp. 731736.