Cyber Crime,Cyber Security,Cyber LawINDEX

Cyber Security Library

  • Alert of kidnapping and encryption of computer data (Ransomware) - Alert of kidnapping and encryption of computer data Ransomware One has to remember the danger of the propagation of malicious software that once executed, encrypts the content of the computer and connected […]
  • Alert of scams through web pages - Alert of scams through web pages On the Internet there are several platforms that contain advertisements of individuals, in which they offer the sale of a vehicle at an excessively low price, […]
  • Avoid deception in online shopping - Tips to put into practice when making purchases: In case of need to buy a product, it is advisable to take a look at the product that is being promoted in the […]
  • Banking phishing - The victim is redirected to a fake website similar to the impersonated service, where the user thinking he is on the official site, ends up filling out a form where he provides the same data he would have used on the actual website.
  • Basic Internet Security - Internet Security Introduction, types of attacks The universalization of the Internet and networks, and the great boom it has experienced thanks to the proliferation of broadband, poses a great challenge for home […]
  • CYBER AND INFORMATION SECURITY DIVISION MHA - Cyber and Information Security (C&IS) Division Work Profile: The Ministry of Home Affairs (MHA) Cyber Crime Wing Indian Cyber Crime Co-ordination Centre(I4C) Scheme. Schemes on prevention of Cyber Crime against women and […]
  • Cyber Crime and Cyber Crime Laws - The Cyber Crime Police station shall have the jurisdiction in respect of all the offences committed under the Information Technology Act .As per the amendments to the IT Act 2000 , the minimum rank of investigation of cyber crimes is POLICE INSPECTOR and any jurisdictional police station can register and investigate.
  • Cyber Regulation Advisory Committee - Cyber Regulation Advisory Committee [India] Under section 88 of the Information Technology Act, 2000 (21 of 2000) [ No. 1(20)/97-IID(NII)/F6] (P.M.Singh) Joint Secretary To, The Manager Govt. of India Press Mayapuri New […]
  • Cyber Security and Law- a Global Approach - Contents Introduction to the cybercrime and cybercrime laws Meaning and implication of Cyber Attack Geopolitics and Cyber Security Cyber Intelligence Security Threat by using Foreign Softwares A bug in your Mobile Hardware-level […]
  • Cyber Security Laws in the United States - Federal Government Regulation 1996 Health Insurance Portability and Accountability Act (HIPAA)  1999 Gramm-Leach-Bliley Act 2002 Homeland Security Act, which included the Federal Information Security Management Act (FISMA) Cybersecurity Information Sharing Act (CISA) […]
  • Digital signature - digital signature” means authentication of any electronic record by a subscriber by means of an electronic method
  • Govt Blocks 118 Mobile Apps to protect sovereignty, integrity and security of India - Government of India invoking it’s power under section 69A of the Information Technology Act read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009 and in view of the emergent nature of threats has decided to block 118 mobile apps (see Appendix) since in view of information available they are engaged in activities which is prejudicial to sovereignty and integrity of India, defence of India, security of state and public order.
  • Indian Computer emergency response team - Cybersecurity wings under the government of India Cybersecurity in India affects both the public and the private sector and spans a broad range of issues related to  Indian national security, whether through […]
  • India`s power grid could be attacked by Chinese cyber-hijackers: The Sunday Guardian - India’s power grids are “highly” susceptible to cyber attacks from  China, as the Sunday Guardian reported on Sunday. It stated that urgent action was required to be taken to isolate the critical part of the control rooms so that they were kept out of the reach of the hackers. The Indian power system, for planning and operational purposes, is divided into five regional grids, namely, Northern, Eastern, Western, North Eastern and Southern grids.
  • List of the common file extensions for developers - "xls",".xlsx",".pdf",".doc",".docx",".ppt",".pptx"
  • People’s Republic of China Cyber ​​Security Law - This Law is enacted for the purpose of safeguarding network security, safeguarding cyberspace sovereignty and national security, social public interests, protecting the legitimate rights and interests of citizens, legal persons and other organizations, and promoting the healthy development of economic and social information.
  • People’s Republic of China Cyber ​​Security Laws,Regulations, Rules and policies - Public Acts 2016-11-08 ·The People’s Republic of China Cyber Security Law 2014-09-02 ·The People’s Republic of China Electronic Signature Law 2014-11-02 ·The Standing Committee of the National People’s Congress decided to strengthen […]
  • Public key certificate - A public key certificate is a digitally signed statement binds the value of a public key to the identity of the person, device, or service holds corresponding private key.
  • Sec 69A of IT Act: Power to block data generation, transmission, stored or hosted in any computer. - Power to issue directions for blocking for public access of any information through any computer resource.
  • Sexual extortion via Net - Sexual extortion via Net The Police Department reports that new scams have been detected again, all linked to the same type of crime, linked to the sexual privacy of the complainants . […]

Categories: INDEX

Tagged as: