Cyber Security: An Emerging Role of Law in the Field of Cyber Crime

Open Access

Year : 2023 | Volume : | : | Page : –
By

Monesh Kumar

Puru Lekhi

  1. Student Guru Gobind Singh Indraprastha University Delhi India
  2. Student Guru Gobind Singh Indraprastha University Delhi India

Abstract

It is well known that in this era mostly all of the things are carried on usually over the internet. The need of having a reliable mechanism of maintaining the data safe in the cyberspace is already felt for being assured that one’s personal data is not being misused and for being felt secure and safe when talking about the government bodies in a way that no third party or alien alliance should be able to obtain a country’s confidential data and information. This paper exclusively aims at revealing all the major setbacks of the modern-day cyber technology, and all the legal statutes and enactments till date have been discussed in a vibrant manner such that it unveils where the legislators lack and what all could be done in the near future to make the cyberspace more secure. The paper also talks about the cyber terrorism that has been inflicted upon many countries in the today’s scenario and ascertains the cyber security and cyber laws that have emerged to be an important aspect in today’s highly technological world. It throws a light on different spheres related to cyber security and laws concerning it. The paper also aims at creating an awareness regarding the need of improving the level of cyber security in businesses, and government platforms. The need of cyber security can be seen at an alarming rate, and every country needs to cope up with it.

Keywords: Cyberspace, law, India, cyber terrorism, cyber-security

How to cite this article: Monesh Kumar, Puru Lekhi. Cyber Security: An Emerging Role of Law in the Field of Cyber Crime. National Journal of Cyber Security Law. 2023; ():-.
How to cite this URL: Monesh Kumar, Puru Lekhi. Cyber Security: An Emerging Role of Law in the Field of Cyber Crime. National Journal of Cyber Security Law. 2023; ():-. Available from: https://journals.stmjournals.com/njcsl/article=2023/view=91462

Full Text PDF Download

References

1. The Information and Technology Act, 2000, preamble; https://www.indiacode.nic.in/ bitstream/123456789/1999/3/A2000–21.pdf.
2. NV Paranjape. Criminology and Penology. 19th edition, 2019 173–174.
3. Kaspersky (2021). What is Cyber Security? [online] www.kaspersky.co.in. Available at: https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security
4. Communications Security Establishment. (2021). Resources—Get Cyber Safe. [online] Get Cyber Safe. Available at: https://www.getcybersafe.gc.ca/en/resources
5. Crossdomainsolutions.com. (2021). Cyber Crime. Types & Preventive Measures. [online] Available at: http://www.crossdomainsolutions.com/cyber-crime/
6. 1library.net. (2019). Human Security in Information and Cyber Era. [online] Available at: https://1library.net/document/ynlx900q-human-security-in-information-and-cyber-era.html.
7. Talat Fatima, Wolters Kluwer, cyber law in India (2017) 150–165.
8. Ibid.
9. Pradeep Mallik, Kriti Singh. Liberal Studies. 2018;3(1).
10. Department of Information Technology, Ministry of Communications and Information Technology: https://www.meity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20(1).pdf
11. Ibid.
12. Statista. (2012). India: number of cyber crimes. Statista. [online] Available at: https://www.statista.com/statistics/309435/india-cyber-crime-it-act/
13. M Dasgupta. Cyber terrorism in India: a comparative study. 2009;170–178.
14. Understanding Cybercrime: Phenomena and Legal Response; 2012; http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
15. The protection of critical infrastructures against terrorist attacks: Compendium of good practices (2019); https://www.un.org/sc/ctc/wp-content/uploads/2019/01/Compendium_of_Good_ Practices_Compressed.pdf
16. Koerner, Brendan I. Why ISIS Is Winning the Social Media War—And How to Fight Back; (2017).
17. Ibid.


Open Access Article
Volume
Received October 3, 2020
Accepted March 25, 2021
Published January 14, 2023