SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 5, August 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 4
Global Perspective: Cyberlaw, Regulations and Compliance
Syed Meharanjunisa
University of Mysore, Mysore, Karnataka, India
ABSTRACT
Cyber security provides protection to the internet connected networks and
system from the cyber-attacks. To stop attacks everyone must know and
aware of all cyber law, regulations and compliance to secure the cyber. Cyber
security is all about to stop cyber-crime. Cyber securityis mustandwehaveto
know about all safety measures required to stop cybercrime. This paper give
details information about cyber security and its safety measure. Also we will
discuss about the activities related to it and how actually cybercrimehappens
and all steps taken by the various organization and Governmenttohavecyber
ethics everywhere. Cyber security provides protectionagainstthecybercrime
and teach us what essential safety measures one need to follow from all
cybercrimes. Securing online information is priority where everyone is
involved with technology. Whenever anyone talked about cyber security,
straight one thing comes in mind that is cybercrime and whatsafetymeasures
need to take to be safe from it.
KEYWORDS: Cyber security, cybercrime, safety measures, cyber ethics
How to cite this paper: Syed
Meharanjunisa "Global Perspective:
Cyberlaw, Regulations and Compliance"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-5, August
2020, pp.4-7, URL:
www.ijtsrd.com/papers/ijtsrd31684.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
I. INTRODUCTION
A cyber security regulation comprises of ordinances that
protect information technology and computer systems to
protect the organizationfromcybercrimesandcyber-attacks
of viruses, phishing, unauthorized access etc [1]. There are
many measures to prevent from all these. Cyber Security
refers to the all safety measure taken to protect from all
deception practices done online to steal personal data andto
protect networks, programs, devices, damage and any
unauthorized access. Any information which transferred
through network can be easily hacked these days and
everyone access most of the things only whether it is
professional or personal. In organisation most of the work
done through email, audio videoconferences,HRMS, etc. and
in personal people do online bankingaswell.Eventheonline
chats are also not safe these days [2-4]. Anyone while doing
work ever think of that how much it is secured to access
everything online. Cyber-crime is increasing day by day
therefore there are various organisation and Government
who come in front to deal with all kind of cyber-crimes. IT
industry must focus on safety measure as 60 percent of total
transactions are done online so this field must have high
quality of security to give all safety to users while doing any
transactions. Even the cyber space these days are not safe.
Latest technologies like E-commerce, mobile computing,
cloud computing need highcybersecuritystandards.Making
the internet safer is the important and integral part of the
development IT Services and forGovernmentalsoimportant
to look into it to safeguards IT Services. Though we have
individual cyber cells to deal every individual case and the
response time is great. In 1903, first attack came into
existence and after that frequent crimes came up. People
associated with cyber security but it is more than that. The
modern hackers are there who are breaking down cyber
securities. Method have increased of hacking, new
techniques and new ways came up of cybercrime. These
tools know a exploit kits which is designed to exploit human
and to blackmail them and get all information. Effective
cyber security will protect but not necessary to protect
network where hackers will not attempt to attack andtarget
to track the system or whole server. But by cyber security, it
will difficult for hackers to crack the firewall and get into it
[3-6].
II. CYBER LAW
Cyber law is the law which deals with overall legal system of
cyberspace and internetlegal issueswhichcoversbroadarea
of cyber and all legal issues including right to freedom on
internet, freedom of expression, access to and usage of
internet and privacy of individual on internet. In common
language cyber law is the law of internet. In 1986, first cyber
law was enacted which covers computer fraudandabuse act
[7].
III. REQUIREMENT OF CYBER LAWS
Like existence of any other law, a cyber law is also created to
help people and organization to protect them from all legal
cases which is done online. It protects and safe against any
crime done online. For example, if anyone do any crime
online, victim can take action against that person and fight
till the time criminals get punished or sentenced. If you
break cyber law there are different kinds of punishment
depends upon what you affronted, where you broke and
IJTSRD31684
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 5
where you live. There is situation when your website gets
suspended or banned if your IP address is found in any
criminal activity and it will get blocked also. If someone
committed more serious crime such as hacking, misusing of
any personal data, hacking website, company distress etc.
then some serious actionmusttakeagainstyouwhereoneca
have to give good amount of penalty or may get into prison
as well [8,9].
IV. CYBER REGULATION
A cyber regulation is the regulation which comprises of
ordinances to protect individual and organization of any
kind of fraud related to cybercrimes like phishing,
unauthorized access, viruses, worms, personal online
damage etc. Regulations are meant to prevent fromall these.
In India, the Information Technology Act, 2000 came into
existence to provide legal acknowledgement to online
communication and to facilitate filing of online records with
the Governments. Regulations covers all aspects of crime
related to cyberspace and provide judgement basis on
ordinance [10].
V. CYBER COMPLIANCE
Compliance is defined as rules and requirements meeting.
Cyber compliance istocreatecompliance whichcontrolsrisk
based crime and protect the integrity, confidentially and
accessibility of information which are stored safely so thatit
can be processed and transferred. Every organization have
their own cyber department which look after the cases and
they have there on compliance to deal with the cybercrimes
[11,12].
VI. STEPS TO CREATE CYBERSECURITY
COMPLIANCE
There are 5 steps which may create cyber security
compliance program as follows-
1. DevelopComplianceTeam-Anorganizationmusthave
compliance team whether the company is small or big,
must have team of compliance to handle all work and
issues related to cyberspace and can communicate to
across business and IT departments.
2. Determine a Risk Analysis- Organization must follow
and have approach on risk basedtocomplianceandeasy
flow risk analysis process.
Identity of all information systems,assets,networksand
data access.
One can access the risk at all level and determine high
risk information stored, collected and transmitted.
After access of risk, one need to analysetheriskbyusing
formula
Once the risk is analysed, one need to determine how to
handle it whether to keep or reject the risk.
3. Arranged Controls- Based on risk analysedoneneedto
set risk controller like arrange of firewalls, strong
password policies, encryption,twofactorauthentication
protection, insurance, training of employee etc.
4. Generate Policies- Create policies documents which
controls and aware about all compliance of activities
and controls.
5. Monitor and Respond- All compliance must be check
and monitor to respond on time to time and find out
new ways to treat with threats and any kind of
vulnerabilities [13].
VII. GOVERNANCE, RISK MANAGEMENT AND
COMPLIANCE (GRC)
As compliance and risk go simultaneouslyorganization must
implement governance, risk and compliance (GRC)program
to improve sharing information among one another. The
compliance feature of GRC is to define to take legal
requirement in the organization for management process to
identity the role of legislation, policies and regulations to
deal with legal aspects and develop the compliance report.
GRC will help in analysing the gap to know the risk potential
associated with compliance versus potential costs of non-
compliance actions [14].
VIII. CHALLENGES OF CYBER SECURITY
There are many challenges while doing effective cyber
security in an organization or for personal reasons [15-18].
Few of them are as follows-
1. Network Security - The networksarenotsecureasthere
are many unwanted users sitting online and ready to
attack and destruct the interventions.
2. Application Security- Regular updating of mobile and
computer application is must to ensure any kind of
attacks and need to check on time to time.
3. Data Security - Second layer of security is required to
secure data on applications and network which is very
challenging. The use of two factor authentication safety
is must these to protect themselves from cybercrime.
4. Cloud Security- Cloud protection is must which require
large amount of space and online safe environment to
protect from data stolen.
5. Mobile Security- It involves every type of security from
login to space, from chat to banking which againrequire
conscious user’s involvement
IX. CYBER ETHICS
Organization must aware of cyber ethics of internet and use
this practice for proper use of knowledge to safe internet.
There are few points which need to consider for cyber
ethics-
Do not use any offensive and violent language
Cyber Bully is a crime so don’t bully
Plagiarism of any content come under stolen and
hacking.
Involve with someone other computer or network
comes under cybercrime.
Follow the copyright rules, never download material or
software’s which involve the information of other.
Always us free data available on internet or software’s.
Cyber ethics is significant and must be trailed by everybody
and takes the responsibility to decline the cybercrimes [13-
16].
X. SAFETY MEASURES FOR CYBER LAW SECURITY
SYSTEM
Basic precautions must be taken by everyone who use
internet and online transactions and work:
1. Security Suite- Keep real time full security through
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 6
secure suite which will protectfromonline malwareand
from any loss of personal and professional loss.
2. Strong Password- Password must be strong and
powerful so that no one can guess and useitforanykind
of fraud and it should be changed frequently by using
special character.
3. Regular Update Software – It is important for OS and
internet security toupdate regularsoftwaretoavoidany
kind of cybercrime as criminal’s use known exploitsand
flaws to gain access of system.
4. Manage Social Media Settings- Cyber criminals keep an
eye on social media information soitmustbelockedand
frequently change like password. Share as much less
information on social media so that anyone won’t be
able to guess security questions answers.
5. Intensify Home Network- Home network must have
strong encrypted password and have virtual private
network. If cybercriminals do succeed to drudge your
interaction link, they won’t intercept anything but
encoded data. It’s a great idea to use VPN in both public
and personal network so that it protects everywhere.
6. Secure Personal Computer- This can be done by
activating computer firewall, using anti-virus, malware
software and block spyware attacks by regularly
installing and updating software’s.
7. Secure Mobile Devices-Mobile devices must be updated
and password protected in two-factor authentication
and applications must be downloaded from trusted
sources.
8. Install latest Operating System- All Currentandupdated
operating system must be used in Windows, Mac, Linux
to prevent potential attacks on older software.
9. Use of Big data sciences and data mining techniques for
additional security cover toprevencyberbreaching[19-
21].
XI. CONCLUSION
For the emerging trend of online crime cases, it is very
important for every organization to have compliance
department which handle all cybercrime cases and must
aware of cyber law and regulations to deal with it.
Cybercrime are coming with new faces these days and we
listen many kinds of crimes related to it. We must follow
regulations and aware of cyberlawtohandleall compliances
and must take legal action to stop it in future. There is no
absolute solution of cybercrimes but one can take
precautions while using online and networks. Organization
must emphasis on regular trainings to IT department and
basis training to every department to enhance the
knowledge of online uses of networks, data and information
so that they can save the work. Individual also must be
aware of cyber law, regulation and compliance to deal with
any kind of issues related to cybercrimes. Cyber security
takes all measures to protect online crime and use as a
safeguards with regulations and compliances for all
networks, programs, software, data and information. The
protection and preventionofnetwork ismustandprovide all
intentional and unintentional intrusion for both inside and
outside system to protect and ensure assurance, integrity of
information and data online.
XII. REFERENCES
[1] Rahul Reddy Nadikattu, New Ways of Implementing
Cyber Security to Help in Protecting America x Journal
of Xidian University, VOLUME 14, ISSUE 5, 2020, Page
No: 6004 - 6015. Available at
SSRN: https://ssrn.com/abstract=3622822 (May 14,
2020).
[2] M. Bada, A. M. Sasse and J. R. Nurse, Cyber Security
Awareness Campaigns: Why do they fail to change
behaviour? ArXiv, abs/1901.02672. (2019).
[3] A. Ertan, G. Crossland, C. P. Heath, D. Denny and R. B.
Jensen, Cyber Security Behaviour In
Organisations. ArXiv, abs/2004.11768. (2020).
[4] M Lakshmi Prasanthi. Cyber Crime: Prevention &
Detection International Journal of Advanced Research
in Computer
[5] M. H. Kumar and A. S. Rani, Cyber security and the
Internet of Things: Vulnerabilities, threats, intruders
and attacks. International Journal of Advance Research,
Ideas and Innovations in Technology, 5, 1343-1346.
(2019).
[6] K. Halouzka and L. Burita, Cyber Security Strategic
Documents Analysis. 2019 International Conferenceon
Military Technologies (ICMT), 1-6. (2019).
[7] J. Rosenoer, Cyber Law: The Law of the Internet.
(1996).
[8] G. M Someswar and K. Roopanjali, Constitutional
Implications of Cyber Security Laws in
India. International Journal of Research, 5, 601-620.
(2018).
[9] B. Sahu, N. Sahu, S. K. Sahu and P. Sahu, identify
Uncertainty of Cyber Crime and Cyber Laws. 2013
International Conference on Communication Systems
and Network Technologies, 450-452. (2013).
[10] Podbregar and P. Sprajc, Adaptability of state to a new
CI challenges – with focus on cyber warfare
domain. National security and the future, 19, 187-199.
(2018).
[11] S. E. Blythe, The Proposed Computer Laws of Uganda:
Moving Toward Secure E-Commerce Transactionsand
Cyber-CrimeControl. JournalofManagementPolicyand
Practice, 11, 19-33(2010)..
[12] S. Chatterjee, A. K. Kar, Y. K. Dwivedi and H. Kizgin,
Prevention of cybercrimes in smartcitiesofIndia:from
a citizen's perspective. Inf. Technol. People, 32, 1153-
1183. (2019).
[13] https://www.computerhope.com/jargon/c/cyber-
law.htm
[14] https://digitalguardian.com/blog/what-cyber-security
[15] https://www.rcmp-grc.gc.ca/to-ot/tis-set/cyber-tips-
conseils-eng.htm
[16] https://www.computerhope.com/jargon/c/cyber-
law.htm
[17] Mohammad, Sikender Mohsienuddin, Security and
Privacy Concerns of the 'Internet of Things' (IoT) in IT
and its Help in the Various Sectors across the World x
International Journal of Computer Trends and
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 7
Technology (IJCTT) – Volume 68 Issue 4 – April 2020.
Available at
SSRN: https://ssrn.com/abstract=3630513 (April 4,
2020).
[18] Soni, Vishal Dineshkumar, Challenges and Solution for
Artificial Intelligence in Cyber security of the USA.
Available at
SSRN: https://ssrn.com/abstract=3624487 or http://d
x.doi.org/10.2139/ssrn.3624487(June 10, 2020)
[19] Rahul Reddy Nadikattu, Data Warehouse Architecture
– Leading the Next Generation Data Science Rahul
Reddy Nadikattu "Data Warehouse Architecture –
Leading the next generation Data Science"
International Journal of Computer Trends and
Technology 67.9 (2019):78-80.. Available at
SSRN: https://ssrn.com/abstract=3622840 or http://d
x.doi.org/10.2139/ssrn.3622840(September 11,
2019).
[20] R. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber-
security analysis of smart SCADA systems with game
models. Proceedings of the 9th annual cyber and
information security research conference, ACM, 2014,
pp. 109–112.
[21] RachnaBuch, Dhatri Ganda, Pooja Kalola, NiraliBorad,
World of Cyber Security and Cybercrime. Recent
Trends in Programming Languages. ISSN: 2455-1821
(Online) Volume 4, Issue 2

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Advanced Wireless Technologies
Advanced Wireless TechnologiesAdvanced Wireless Technologies
Advanced Wireless Technologies
 
Mobile Communications Sajay K R
Mobile Communications Sajay K RMobile Communications Sajay K R
Mobile Communications Sajay K R
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
5G PPT
5G PPT5G PPT
5G PPT
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notes
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
transmission media
 transmission media transmission media
transmission media
 
Generation of wireless Communication system-1G,2G,2.5G,3G,4G,5G
Generation of wireless Communication system-1G,2G,2.5G,3G,4G,5GGeneration of wireless Communication system-1G,2G,2.5G,3G,4G,5G
Generation of wireless Communication system-1G,2G,2.5G,3G,4G,5G
 
Pcs ch1
Pcs ch1Pcs ch1
Pcs ch1
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
5 G technology
5 G technology5 G technology
5 G technology
 
ISDN & DSL
ISDN & DSLISDN & DSL
ISDN & DSL
 
1g to 5g technologies
1g to 5g technologies1g to 5g technologies
1g to 5g technologies
 
Wireless communication ppt by dinesh
Wireless communication ppt by dineshWireless communication ppt by dinesh
Wireless communication ppt by dinesh
 
Millimeter wave technology in 5g
Millimeter wave technology in 5gMillimeter wave technology in 5g
Millimeter wave technology in 5g
 

Semelhante a Global Perspective Cyberlaw, Regulations and Compliance

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Securityijtsrd
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security Wee Tang
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)CR Group
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 

Semelhante a Global Perspective Cyberlaw, Regulations and Compliance (20)

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)All About Cyber Security | Cyberroot Risk Advisory (CR Group)
All About Cyber Security | Cyberroot Risk Advisory (CR Group)
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 

Mais de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mais de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Último

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Último (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Global Perspective Cyberlaw, Regulations and Compliance

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 5, August 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 4 Global Perspective: Cyberlaw, Regulations and Compliance Syed Meharanjunisa University of Mysore, Mysore, Karnataka, India ABSTRACT Cyber security provides protection to the internet connected networks and system from the cyber-attacks. To stop attacks everyone must know and aware of all cyber law, regulations and compliance to secure the cyber. Cyber security is all about to stop cyber-crime. Cyber securityis mustandwehaveto know about all safety measures required to stop cybercrime. This paper give details information about cyber security and its safety measure. Also we will discuss about the activities related to it and how actually cybercrimehappens and all steps taken by the various organization and Governmenttohavecyber ethics everywhere. Cyber security provides protectionagainstthecybercrime and teach us what essential safety measures one need to follow from all cybercrimes. Securing online information is priority where everyone is involved with technology. Whenever anyone talked about cyber security, straight one thing comes in mind that is cybercrime and whatsafetymeasures need to take to be safe from it. KEYWORDS: Cyber security, cybercrime, safety measures, cyber ethics How to cite this paper: Syed Meharanjunisa "Global Perspective: Cyberlaw, Regulations and Compliance" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-5, August 2020, pp.4-7, URL: www.ijtsrd.com/papers/ijtsrd31684.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) I. INTRODUCTION A cyber security regulation comprises of ordinances that protect information technology and computer systems to protect the organizationfromcybercrimesandcyber-attacks of viruses, phishing, unauthorized access etc [1]. There are many measures to prevent from all these. Cyber Security refers to the all safety measure taken to protect from all deception practices done online to steal personal data andto protect networks, programs, devices, damage and any unauthorized access. Any information which transferred through network can be easily hacked these days and everyone access most of the things only whether it is professional or personal. In organisation most of the work done through email, audio videoconferences,HRMS, etc. and in personal people do online bankingaswell.Eventheonline chats are also not safe these days [2-4]. Anyone while doing work ever think of that how much it is secured to access everything online. Cyber-crime is increasing day by day therefore there are various organisation and Government who come in front to deal with all kind of cyber-crimes. IT industry must focus on safety measure as 60 percent of total transactions are done online so this field must have high quality of security to give all safety to users while doing any transactions. Even the cyber space these days are not safe. Latest technologies like E-commerce, mobile computing, cloud computing need highcybersecuritystandards.Making the internet safer is the important and integral part of the development IT Services and forGovernmentalsoimportant to look into it to safeguards IT Services. Though we have individual cyber cells to deal every individual case and the response time is great. In 1903, first attack came into existence and after that frequent crimes came up. People associated with cyber security but it is more than that. The modern hackers are there who are breaking down cyber securities. Method have increased of hacking, new techniques and new ways came up of cybercrime. These tools know a exploit kits which is designed to exploit human and to blackmail them and get all information. Effective cyber security will protect but not necessary to protect network where hackers will not attempt to attack andtarget to track the system or whole server. But by cyber security, it will difficult for hackers to crack the firewall and get into it [3-6]. II. CYBER LAW Cyber law is the law which deals with overall legal system of cyberspace and internetlegal issueswhichcoversbroadarea of cyber and all legal issues including right to freedom on internet, freedom of expression, access to and usage of internet and privacy of individual on internet. In common language cyber law is the law of internet. In 1986, first cyber law was enacted which covers computer fraudandabuse act [7]. III. REQUIREMENT OF CYBER LAWS Like existence of any other law, a cyber law is also created to help people and organization to protect them from all legal cases which is done online. It protects and safe against any crime done online. For example, if anyone do any crime online, victim can take action against that person and fight till the time criminals get punished or sentenced. If you break cyber law there are different kinds of punishment depends upon what you affronted, where you broke and IJTSRD31684
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 5 where you live. There is situation when your website gets suspended or banned if your IP address is found in any criminal activity and it will get blocked also. If someone committed more serious crime such as hacking, misusing of any personal data, hacking website, company distress etc. then some serious actionmusttakeagainstyouwhereoneca have to give good amount of penalty or may get into prison as well [8,9]. IV. CYBER REGULATION A cyber regulation is the regulation which comprises of ordinances to protect individual and organization of any kind of fraud related to cybercrimes like phishing, unauthorized access, viruses, worms, personal online damage etc. Regulations are meant to prevent fromall these. In India, the Information Technology Act, 2000 came into existence to provide legal acknowledgement to online communication and to facilitate filing of online records with the Governments. Regulations covers all aspects of crime related to cyberspace and provide judgement basis on ordinance [10]. V. CYBER COMPLIANCE Compliance is defined as rules and requirements meeting. Cyber compliance istocreatecompliance whichcontrolsrisk based crime and protect the integrity, confidentially and accessibility of information which are stored safely so thatit can be processed and transferred. Every organization have their own cyber department which look after the cases and they have there on compliance to deal with the cybercrimes [11,12]. VI. STEPS TO CREATE CYBERSECURITY COMPLIANCE There are 5 steps which may create cyber security compliance program as follows- 1. DevelopComplianceTeam-Anorganizationmusthave compliance team whether the company is small or big, must have team of compliance to handle all work and issues related to cyberspace and can communicate to across business and IT departments. 2. Determine a Risk Analysis- Organization must follow and have approach on risk basedtocomplianceandeasy flow risk analysis process. Identity of all information systems,assets,networksand data access. One can access the risk at all level and determine high risk information stored, collected and transmitted. After access of risk, one need to analysetheriskbyusing formula Once the risk is analysed, one need to determine how to handle it whether to keep or reject the risk. 3. Arranged Controls- Based on risk analysedoneneedto set risk controller like arrange of firewalls, strong password policies, encryption,twofactorauthentication protection, insurance, training of employee etc. 4. Generate Policies- Create policies documents which controls and aware about all compliance of activities and controls. 5. Monitor and Respond- All compliance must be check and monitor to respond on time to time and find out new ways to treat with threats and any kind of vulnerabilities [13]. VII. GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE (GRC) As compliance and risk go simultaneouslyorganization must implement governance, risk and compliance (GRC)program to improve sharing information among one another. The compliance feature of GRC is to define to take legal requirement in the organization for management process to identity the role of legislation, policies and regulations to deal with legal aspects and develop the compliance report. GRC will help in analysing the gap to know the risk potential associated with compliance versus potential costs of non- compliance actions [14]. VIII. CHALLENGES OF CYBER SECURITY There are many challenges while doing effective cyber security in an organization or for personal reasons [15-18]. Few of them are as follows- 1. Network Security - The networksarenotsecureasthere are many unwanted users sitting online and ready to attack and destruct the interventions. 2. Application Security- Regular updating of mobile and computer application is must to ensure any kind of attacks and need to check on time to time. 3. Data Security - Second layer of security is required to secure data on applications and network which is very challenging. The use of two factor authentication safety is must these to protect themselves from cybercrime. 4. Cloud Security- Cloud protection is must which require large amount of space and online safe environment to protect from data stolen. 5. Mobile Security- It involves every type of security from login to space, from chat to banking which againrequire conscious user’s involvement IX. CYBER ETHICS Organization must aware of cyber ethics of internet and use this practice for proper use of knowledge to safe internet. There are few points which need to consider for cyber ethics- Do not use any offensive and violent language Cyber Bully is a crime so don’t bully Plagiarism of any content come under stolen and hacking. Involve with someone other computer or network comes under cybercrime. Follow the copyright rules, never download material or software’s which involve the information of other. Always us free data available on internet or software’s. Cyber ethics is significant and must be trailed by everybody and takes the responsibility to decline the cybercrimes [13- 16]. X. SAFETY MEASURES FOR CYBER LAW SECURITY SYSTEM Basic precautions must be taken by everyone who use internet and online transactions and work: 1. Security Suite- Keep real time full security through
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 6 secure suite which will protectfromonline malwareand from any loss of personal and professional loss. 2. Strong Password- Password must be strong and powerful so that no one can guess and useitforanykind of fraud and it should be changed frequently by using special character. 3. Regular Update Software – It is important for OS and internet security toupdate regularsoftwaretoavoidany kind of cybercrime as criminal’s use known exploitsand flaws to gain access of system. 4. Manage Social Media Settings- Cyber criminals keep an eye on social media information soitmustbelockedand frequently change like password. Share as much less information on social media so that anyone won’t be able to guess security questions answers. 5. Intensify Home Network- Home network must have strong encrypted password and have virtual private network. If cybercriminals do succeed to drudge your interaction link, they won’t intercept anything but encoded data. It’s a great idea to use VPN in both public and personal network so that it protects everywhere. 6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus, malware software and block spyware attacks by regularly installing and updating software’s. 7. Secure Mobile Devices-Mobile devices must be updated and password protected in two-factor authentication and applications must be downloaded from trusted sources. 8. Install latest Operating System- All Currentandupdated operating system must be used in Windows, Mac, Linux to prevent potential attacks on older software. 9. Use of Big data sciences and data mining techniques for additional security cover toprevencyberbreaching[19- 21]. XI. CONCLUSION For the emerging trend of online crime cases, it is very important for every organization to have compliance department which handle all cybercrime cases and must aware of cyber law and regulations to deal with it. Cybercrime are coming with new faces these days and we listen many kinds of crimes related to it. We must follow regulations and aware of cyberlawtohandleall compliances and must take legal action to stop it in future. There is no absolute solution of cybercrimes but one can take precautions while using online and networks. Organization must emphasis on regular trainings to IT department and basis training to every department to enhance the knowledge of online uses of networks, data and information so that they can save the work. Individual also must be aware of cyber law, regulation and compliance to deal with any kind of issues related to cybercrimes. Cyber security takes all measures to protect online crime and use as a safeguards with regulations and compliances for all networks, programs, software, data and information. The protection and preventionofnetwork ismustandprovide all intentional and unintentional intrusion for both inside and outside system to protect and ensure assurance, integrity of information and data online. XII. REFERENCES [1] Rahul Reddy Nadikattu, New Ways of Implementing Cyber Security to Help in Protecting America x Journal of Xidian University, VOLUME 14, ISSUE 5, 2020, Page No: 6004 - 6015. Available at SSRN: https://ssrn.com/abstract=3622822 (May 14, 2020). [2] M. Bada, A. M. Sasse and J. R. Nurse, Cyber Security Awareness Campaigns: Why do they fail to change behaviour? ArXiv, abs/1901.02672. (2019). [3] A. Ertan, G. Crossland, C. P. Heath, D. Denny and R. B. Jensen, Cyber Security Behaviour In Organisations. ArXiv, abs/2004.11768. (2020). [4] M Lakshmi Prasanthi. Cyber Crime: Prevention & Detection International Journal of Advanced Research in Computer [5] M. H. Kumar and A. S. Rani, Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks. International Journal of Advance Research, Ideas and Innovations in Technology, 5, 1343-1346. (2019). [6] K. Halouzka and L. Burita, Cyber Security Strategic Documents Analysis. 2019 International Conferenceon Military Technologies (ICMT), 1-6. (2019). [7] J. Rosenoer, Cyber Law: The Law of the Internet. (1996). [8] G. M Someswar and K. Roopanjali, Constitutional Implications of Cyber Security Laws in India. International Journal of Research, 5, 601-620. (2018). [9] B. Sahu, N. Sahu, S. K. Sahu and P. Sahu, identify Uncertainty of Cyber Crime and Cyber Laws. 2013 International Conference on Communication Systems and Network Technologies, 450-452. (2013). [10] Podbregar and P. Sprajc, Adaptability of state to a new CI challenges – with focus on cyber warfare domain. National security and the future, 19, 187-199. (2018). [11] S. E. Blythe, The Proposed Computer Laws of Uganda: Moving Toward Secure E-Commerce Transactionsand Cyber-CrimeControl. JournalofManagementPolicyand Practice, 11, 19-33(2010).. [12] S. Chatterjee, A. K. Kar, Y. K. Dwivedi and H. Kizgin, Prevention of cybercrimes in smartcitiesofIndia:from a citizen's perspective. Inf. Technol. People, 32, 1153- 1183. (2019). [13] https://www.computerhope.com/jargon/c/cyber- law.htm [14] https://digitalguardian.com/blog/what-cyber-security [15] https://www.rcmp-grc.gc.ca/to-ot/tis-set/cyber-tips- conseils-eng.htm [16] https://www.computerhope.com/jargon/c/cyber- law.htm [17] Mohammad, Sikender Mohsienuddin, Security and Privacy Concerns of the 'Internet of Things' (IoT) in IT and its Help in the Various Sectors across the World x International Journal of Computer Trends and
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31684 | Volume – 4 | Issue – 5 | July-August 2020 Page 7 Technology (IJCTT) – Volume 68 Issue 4 – April 2020. Available at SSRN: https://ssrn.com/abstract=3630513 (April 4, 2020). [18] Soni, Vishal Dineshkumar, Challenges and Solution for Artificial Intelligence in Cyber security of the USA. Available at SSRN: https://ssrn.com/abstract=3624487 or http://d x.doi.org/10.2139/ssrn.3624487(June 10, 2020) [19] Rahul Reddy Nadikattu, Data Warehouse Architecture – Leading the Next Generation Data Science Rahul Reddy Nadikattu "Data Warehouse Architecture – Leading the next generation Data Science" International Journal of Computer Trends and Technology 67.9 (2019):78-80.. Available at SSRN: https://ssrn.com/abstract=3622840 or http://d x.doi.org/10.2139/ssrn.3622840(September 11, 2019). [20] R. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber- security analysis of smart SCADA systems with game models. Proceedings of the 9th annual cyber and information security research conference, ACM, 2014, pp. 109–112. [21] RachnaBuch, Dhatri Ganda, Pooja Kalola, NiraliBorad, World of Cyber Security and Cybercrime. Recent Trends in Programming Languages. ISSN: 2455-1821 (Online) Volume 4, Issue 2