Skip to main content

2019 | OriginalPaper | Buchkapitel

9. Cyber Security: A Two-Edged Sword!

verfasst von : V. Sridhar

Erschienen in: Emerging ICT Policies and Regulations

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security of cyber infrastructure and systems is becoming more important today than ever before due to extensive digitization of all aspects of our life. Protecting against cybercrime, cyber warfare, cyber fraud, and cyber theft are of utmost importance to individuals, societies, businesses, and governments at various levels. As cyber incidents proliferate, privacy of individuals, business methods, and processes including intellectual properties and government sovereignty are being threatened. The human is the greatest vulnerability in any organization. In this era of persistent cyber threats, an organization will be secure only with the active participation of everyone (NIST 2018). In this chapter, we will try to provide an overview of all aspects of cyber security at various levels including protection of individuals, businesses, and the states. Specifically, we will try to answer the following questions:
  • What are the different aspects of cyber security? How do cyber incidents affect individuals, businesses, and governments?
  • What precautionary measures should be taken at various levels to minimize harm due to cyber security incidents?
  • What are the extant laws and regulations that we have enacted to protect individuals and businesses, with specific references to India?

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B. … Anderson, H. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228. Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B. … Anderson, H. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:​1802.​07228.
Zurück zum Zitat Hui, K. -L., Kim, S. H., Wang, Q. -H. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497–523. Research Collection School Of Information Systems. Available at: http://ink.library.smu.edu.sg/sis_research/3420. Accessed on February 12, 2018. Hui, K. -L., Kim, S. H., Wang, Q. -H. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497–523. Research Collection School Of Information Systems. Available at: http://​ink.​library.​smu.​edu.​sg/​sis_​research/​3420. Accessed on February 12, 2018.
Zurück zum Zitat Karnataka Jnana Ayoga (KJA), Government of Karnataka. (2019). Karnataka cyber security vision 2025. Karnataka Jnana Ayoga (KJA), Government of Karnataka. (2019). Karnataka cyber security vision 2025.
Zurück zum Zitat Ministry of Electronics and Information Technology (MeitY), Government of India. (2008). The Information Technology Act (Amended 2008). Ministry of Electronics and Information Technology (MeitY), Government of India. (2008). The Information Technology Act (Amended 2008).
Zurück zum Zitat Ministry of Electronics and Information Technology (MeitY), Government of India. (2018a). The information technology: Intermediaries guidelines (Amendment) Rules] 2018. Ministry of Electronics and Information Technology (MeitY), Government of India. (2018a). The information technology: Intermediaries guidelines (Amendment) Rules] 2018.
Zurück zum Zitat Ministry of Electronics and Information Technology (MeitY), Government of India. (2018b). Conference of State IT Ministers and IT Secretaries: Cyber Security and Cyber Law. The Information Technology: Intermediaries Guidelines (Amendment) Rules] 2018. Ministry of Electronics and Information Technology (MeitY), Government of India. (2018b). Conference of State IT Ministers and IT Secretaries: Cyber Security and Cyber Law. The Information Technology: Intermediaries Guidelines (Amendment) Rules] 2018.
Zurück zum Zitat NASSCOM-DSCI. (2016). NASSCOM-DSCI growing cyber security industry roadmap for India. NASSCOM-DSCI. (2016). NASSCOM-DSCI growing cyber security industry roadmap for India.
Zurück zum Zitat NASSCOM-KPMG. (2018). Secure India 2018. Leader’s insights into GCC empowered Global Cyber Security. NASSCOM-KPMG. (2018). Secure India 2018. Leader’s insights into GCC empowered Global Cyber Security.
Zurück zum Zitat Tan. E. E. (2018). Cyber deterrence in Singapore: Framework & recommendations (RSIS Working Paper, No. 309). Singapore: Nanyang Technological University. Tan. E. E. (2018). Cyber deterrence in Singapore: Framework & recommendations (RSIS Working Paper, No. 309). Singapore: Nanyang Technological University.
Metadaten
Titel
Cyber Security: A Two-Edged Sword!
verfasst von
V. Sridhar
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-32-9022-8_9

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.