Banking phishing-The victim is redirected to a fake website similar to the impersonated service, where the user thinking he is on the official site, ends up filling out a form where he provides the same data he would have used on the actual website.
Basic Internet Security-Internet Security Introduction, types of attacks The universalization of the Internet and networks, and the...
Cyber Crime and Cyber Crime Laws-The Cyber CrimeCrimeA positive or negative act in violation of penal law; an offense against the state classified either as a felony or misdemeanor. Police station shall have the jurisdictionJurisdictionAuthority by which courts receive and decide cases. Limited Jurisdiction: the authority over only particular types of cases, or cases under a prescribed amount in controversy, or seeking only certain types of relief, the District Court is a court of limited jurisdiction. Original Jurisdiction: Jurisdiction of the first court to hear a case. in respect of all the offences committed under the Information Technology Act .As per the amendments to the IT Act 2000 , the minimum rank of investigationInvestigationPurpose of all investigation is to reveal the unvarnished truth. The constitutional courts are duty bound to ensure that the truth is revealed. of cyber crimes is POLICE INSPECTOR and any jurisdictional police station can register and investigate.
Cyber Security Laws in the United States-Federal Government Regulation 1996 Health Insurance Portability and Accountability Act (HIPAA) 1999 Gramm-Leach-Bliley Act 2002...
Cyber Threats to Elections: a Lexicon (2018)-This reference aid draws on CTIIC’s experience promoting interagency situational awareness and information sharing during previous significant cyber events—including cyber threats to elections. It provides a guide to cyber threat terms and related terminology issues likely to arise when describing cyber activity. The document includes a range of cyber-specific terms that may be required to accurately convey intelligence on a cyber threat event and terms that have been established by relevant authorities regarding technical infrastructure for conducting elections.
Digital signature-digital signature” means authentication of any electronic record by a subscriber by means of an electronic method
Enhancing National Cybersecurity: Remarks by Christopher Painter (19/09/2016)-Christopher Painter, the Coordinator for Cyber Issues at the State Department, addressed the Presidential Commission on Enhancing National Cybersecurity. He highlighted the State Department's efforts to strengthen international cybersecurity through diplomacy, capacity building, incident response, and combating transnational cybercrime. Painter also presented policy recommendations to enhance international cyber stability and combat cyber threats.
FBI and Private Sector: Battling the Cyber Threat Together-Christopher Wray-28/01/2021-At the FBI, we’ve been fighting the cyber threat for many years now. We began our early high-tech crime effort in the mid-1990s, and created our Cyber Division almost 20 years ago, in 2002. We’ve become known for our efforts to call out destabilizing and damaging cyber activity by nationNationA collective consciousness, founded in ancient origin within a geographic area, with definite history and heritage, culture and way of life, language and literature, food and clothing, coupled with a deep understanding of war and peace is to be known as a nation. Rasra is the Vedic word for it.-state actors, like the indictment last summer of two hackers working on behalf of the Chinese Ministry of State Security, stealing intellectual property from companies in the U.S. and around the world while also targeting dissidents who spoke out against the Communist Party.
Govt Blocks 118 Mobile Apps to protect sovereignty, integrity and security of India-Government of IndiaIndiaBharat Varsha (Jambu Dvipa) is the name of this land mass. The people of this land are Sanatan Dharmin and they always defeated invaders. Indra (10000 yrs) was the oldest deified King of this land. Manu's jurisprudence enlitened this land. Vedas have been the civilizational literature of this land. Guiding principles of this land are : सत्यं वद । धर्मं चर । स्वाध्यायान्मा प्रमदः । Read more invoking it’s power under section 69A of the Information Technology Act read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009 and in view of the emergent nature of threats has decided to block 118 mobile apps (see Appendix) since in view of information available they are engaged in activities which is prejudicial to sovereignty and integrity of India, defence of India, security of state and public order.
Indian Computer Emergency Response Team-Cybersecurity in India is crucial for both public and private sectors, impacting national security and defense against cyber terrorism, espionage, and e-crime. The Government's CERT functions include maintaining a list of IT security auditors, responding to security incidents, and issuing security alerts. This is vital for protecting key military, space, and information systems.
India`s power grid could be attacked by Chinese cyber-hijackers: The Sunday Guardian-India’s power grids are “highly” susceptible to cyber attacks from China, as the Sunday Guardian reported on Sunday. It stated that urgent action was required to be taken to isolate the critical part of the control rooms so that they were kept out of the reach of the hackers. The Indian power system, for planning and operational purposes, is divided into five regional grids, namely, Northern, Eastern, Western, North Eastern and Southern grids.
Memorandum on Improving Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems-USA-19/01/2022-This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs. Executive Order 14028 establishes that the Federal Government must improve its efforts to identify, deter, protect against, detect, and respond to malicious cyber campaigns and their actors through bold changes and significant investments in cybersecurity.
People’s Republic of China Cyber Security Law-This LawLawPositive command of sovereign or divine. One can be ruled either by a Statute, a Statue, or a Statement. Legislation is the rule-making process by a political or religious organisation. Physics governs natural law. Logical thinking is a sign of a healthy brain function. Dharma is eternal for Sanatanis. is enacted for the purpose of safeguarding network security, safeguarding cyberspace sovereignty and national security, social public interests, protecting the legitimate rights and interests of citizens, legal persons and other organizations, and promoting the healthy development of economic and social information.
Public key certificate-A public key certificate is a digitally signed statement binds the value of a public key to the identity of the person, device, or service holds corresponding private key.
More Stories
Law Global Index
Language Index
UPSC General Studies – Question Papers and Study Materials