New Laws on Cyber Security

Prof. Rana Afreen SheikhProfessor, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, IndiaAditya A. PandeStudent, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, IndiaTanaya A. FateStudent, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, IndiaNadeemuddinStudent, Department of MCA, Vidyabharti Mahavidyalaya, Amravati, Maharashtra, India

Vol 8 No 10 (2024): Volume 8, Issue 10, October 2024 | Pages: 225-227

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 26-10-2024

doi Logo doi.org/10.47001/IRJIET/2024.810030

Abstract

This research paper examines the evolving landscape of cyber security laws in response to the increasing frequency and sophistication of cyber threats. As technology advances, so do the methods employed by malicious actors, prompting governments and organizations worldwide to adapt their legal frameworks. This study provides a comprehensive analysis of current cyber security legislation across various jurisdictions, highlighting key regulations, compliance challenges, and enforcement mechanisms. It also explores the balance between security and privacy, considering the implications of data protection laws on cyber security efforts. Through case studies and comparative analysis, the paper identifies best practices and emerging trends in cyber security legislation, offering recommendations for policymakers to enhance resilience against cyber threats while safeguarding individual rights. Ultimately, this research contributes to a deeper understanding of the critical role that legal frameworks play in shaping effective cyber security strategies.

Keywords

Cyber Security, Cyber Laws, Data Protection, Privacy Regulations, Digital Privacy, Risk Management


Citation of this Article

Prof. Rana Afreen Sheikh, Aditya A. Pande, Tanaya A. Fate, Nadeemuddin. (2024). New Laws on Cyber Security. International Research Journal of Innovations in Engineering and Technology - IRJIET, 8(10), 225-227. Article DOI https://doi.org/10.47001/IRJIET/2024.810030

References
  1. Dhruti M. Kapadia, “Cyber Crimes against women and Laws in India” (Live Law, November 2018) accessed 22 October 2021.
  2. State of Tamil Nadu V. Suhas Katti (2004). “Porn MMSes from Delhi Metro CCTV footage!” (Zee News, 10 July 2013) 27 October 2021.
  3. “Thinking of a Cybersecurity Career? Read This” (Krebs on Security, 24 July 2020) accessed 14 November 2021.
  4. Gaur, K.D., Text book on Indian Penal Code, Fifth edition, 2014, Universal Law Publishing Company Pvt. Limited, New Delhi.
  5. K. Wang, Y. Wang, Y. Sun, S. Guo, and J. Wu, Green industrial Internet of Things architecture: An energy-efficient perspective, IEEE Commun. Mag., vol. 54, no. 12, pp. 4854, Dec. 2016.
  6. I.Hwang, S. Kim, Y. Kim, and C.E. Seah, A survey of fault detection, isolation, and reconguration methods, IEEE Trans. Control Syst. Technol., vol. 18, no. 3, pp. 636653, May 2010.
  7. A.A.Cárdenas, S.Amin, B.Sinopoli, A.Perrig, and S.Sastry, Challenges for securing cyber physical systems, in Proc. Workshop Cyber-Phys. Syst. Secur., 2006, pp. 17.
  8. P. J. Criscuolo, Distributed denial of service Trin00, tribe ood network, tribe ood network 2000, and stacheldraht CIAC-2319, Dept. Energy Comput. Incident Advisory Capability, Lawrence Livermore Nat. Lab., Livermore, CA, USA, Tech. Rep. UCRL-ID-136939, Feb. 2000.
  9. Presidents Council of Advisors on Science and Technology. Leadership Under Challenge: Information Technology R&D in a Competitive World. Aug. 2007. [Online]. Available: http://www.nitrd.gov/Pcast/reports/ PCAST-NIT-FINAL.pdf.
  10. R. Rajkumar, I. Lee, L. Sha, and J. Stankovic, Cyber-physical systems: The next computing revolution, in Proc. Design Autom. Conf., 2010, pp. 731736.