
Monesh Kumar

Puru Lekhi
- Student, Guru Gobind Singh Indraprastha University, Delhi, India
- Student, Guru Gobind Singh Indraprastha University, Delhi, India
Abstract
It is well known that in this era mostly all of the things are carried on usually over the internet. The need of having a reliable mechanism of maintaining the data safe in the cyberspace is already felt for being assured that one’s personal data is not being misused and for being felt secure and safe when talking about the government bodies in a way that no third party or alien alliance should be able to obtain a country’s confidential data and information. This paper exclusively aims at revealing all the major setbacks of the modern-day cyber technology, and all the legal statutes and enactments till date have been discussed in a vibrant manner such that it unveils where the legislators lack and what all could be done in the near future to make the cyberspace more secure. The paper also talks about the cyber terrorism that has been inflicted upon many countries in the today’s scenario and ascertains the cyber security and cyber laws that have emerged to be an important aspect in today’s highly technological world. It throws a light on different spheres related to cyber security and laws concerning it. The paper also aims at creating an awareness regarding the need of improving the level of cyber security in businesses, and government platforms. The need of cyber security can be seen at an alarming rate, and every country needs to cope up with it.
Keywords: Cyberspace, law, India, cyber terrorism, cyber-security
[This article belongs to National Journal of Cyber Security Law(njcsl)]

Full Text
Browse Figures
References
1. The Information and Technology Act, 2000, preamble; https://www.indiacode.nic.in/ bitstream/123456789/1999/3/A2000–21.pdf.
2. NV Paranjape. Criminology and Penology. 19th edition, 2019 173–174.
3. Kaspersky (2021). What is Cyber Security? [online] www.kaspersky.co.in. Available at: https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security
4. Communications Security Establishment. (2021). Resources—Get Cyber Safe. [online] Get Cyber Safe. Available at: https://www.getcybersafe.gc.ca/en/resources
5. Crossdomainsolutions.com. (2021). Cyber Crime. Types & Preventive Measures. [online] Available at: http://www.crossdomainsolutions.com/cyber-crime/
6. 1library.net. (2019). Human Security in Information and Cyber Era. [online] Available at: https://1library.net/document/ynlx900q-human-security-in-information-and-cyber-era.html.
7. Talat Fatima, Wolters Kluwer, cyber law in India (2017) 150–165.
8. Ibid.
9. Pradeep Mallik, Kriti Singh. Liberal Studies. 2018;3(1).
10. Department of Information Technology, Ministry of Communications and Information Technology: https://www.meity.gov.in/sites/upload_files/dit/files/National%20Cyber%20Security%20Policy%20(1).pdf
11. Ibid.
12. Statista. (2012). India: number of cyber crimes. Statista. [online] Available at: https://www.statista.com/statistics/309435/india-cyber-crime-it-act/
13. M Dasgupta. Cyber terrorism in India: a comparative study. 2009;170–178.
14. Understanding Cybercrime: Phenomena and Legal Response; 2012; http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
15. The protection of critical infrastructures against terrorist attacks: Compendium of good practices (2019); https://www.un.org/sc/ctc/wp-content/uploads/2019/01/Compendium_of_Good_ Practices_Compressed.pdf
16. Koerner, Brendan I. Why ISIS Is Winning the Social Media War—And How to Fight Back; (2017).
17. Ibid.

National Journal of Cyber Security Law
Volume | 4 |
Issue | 1 |
Received | October 3, 2020 |
Accepted | March 25, 2021 |
Published | June 4, 2021 |