A COMPREHENSIVE EXPLORATION OF THE CYBER SECURITY FEATURES AND SAFEGUARDS ALLIED TO THE THREATS AND PROTECTIONS WITHIN THE FRAMEWORK OF THE LAW AND COMPLIANCE SYSTEMS
Ariz Abbas Naqvi
Abstract
With the help of the Internet and digitalization, people have revolutionized their daily lives and activities in the 21st century. Cyberspace is frequently the target of unethical attacks for illegal gains as the digital age advances and becomes increasingly digitalized. It is nearly impossible to locate the attacker due to their cleverness and effectiveness. The sudden increase in cyberattacks has resulted in the development of cyber regulations. This paper provides an in-depth analysis of cybercrime, the fundamental terms used in the field, and related laws and guidelines for increasing cyberspace security. You can buy replica uhren schweiz best 2023 panerai fake watches UK here with low price and high quality. Do not miss the 1:1 UK perfect breitling replica watches. Place an order online and fast shipping. Shop around. The best Swiss iwc fake watches UK with high quality are here. Read more details if you want.
References
- Alex Roney Mathew, Aayad Al Hajj, Khalil Al Ruqeishi, (2010), CyberCrimes, International Conference on Networking and Information Technology.
- C. E. Notar, S. Padgett, and J. Roden, (2013), Cyberbullying : A Review of the Literature, Universal Journal of Educational Research, vol. 1, no. 1, pp. 1–9.
- Christof Baron, IUM Number of cybercrimes related to social media across India in 2016 and 2017, Statista Research Department.
- The White House, (2003), the National Strategy to Secure Cyberspace, the White House, Ed. 2003. [Online]. Available: https://www.uscert. gov/sites/default/files/publications/ cyberspace_strategy.pdf.
- NATO Cooperative Cyber Defence Centre of Excellence, National Cyber Security Framework Manual, 2012.
- U.S. DoD, (2014), Department of Défense Dictionary of Military and Associated Terms, U.S. Department of Defense.
- Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74. doi:10.1145/2063176.2063197
- https://economictimes.indiatimes.com//tech/ inter net/cryptojackingis- trending-but-for-how-long/article show/63628338.cms?utm_source =contentofinterest&utm_medium=text&utm_campaign=cppst
- Ahluwalia, “Over 900 cases of fraud involving cards, net banking registered in Apr-Sep 2018 //economictimes.indiatimes.com/article show/67977230.cms?utm_source=contentofinterest&utm_medium=t ext&utm_campaign=cppst.”
- E. Abu-shanab, (2015), Security and Fraud Issues of E-banking, International Journal of Computer Networks and Applications, Vol. 2, no. 4, pp. 179–187.
- R. G. Sarita Sharma, (2017), Comparative Study and Analysis of Unique Identification Number and Social Security Number, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.27-30.
- Modi, Krishna. (2017). Review on fraud detection methods in credit card transactions. 10.1109/I2C2.2017.8321781.
- Yazdanifard, Assoc. Prof. Dr. Rashad & Wan Yusoff, Wan Fadzilah & Behora, Alawa & Sade, Abu. (2011). Electronic banking fraud; The need to enhance security and customer trust in online banking. International Journal in Advances in Information Sciences and Service Sciences. 3. 505-509. 10.4156/aiss.vol3.issue10.61.
- https://www.statista.com/statistics/184083/commonly-reported-typesof- cyber-crime/
- https://en.wikipedia.org/wiki/Information_Technology_Act,_2000
Back