Advocatetanmoy Law Library

Legal Database and Encyclopedia

Home » INDEX » Cyber Security Library

Cyber Security Library

Cyber Crime,Cyber Security,Cyber Law

  • Alert of kidnapping and encryption of computer data (Ransomware) - Alert of kidnapping and encryption of computer data Ransomware One has to remember the danger...
  • Alert of scams through web pages - Alert of scams through web pages On the Internet there are several platforms that contain...
  • Avoid deception in online shopping - Tips to put into practice when making purchases: In case of need to buy a...
  • Banking phishing - The victim is redirected to a fake website similar to the impersonated service, where the user thinking he is on the official site, ends up filling out a form where he provides the same data he would have used on the actual website.
  • Basic Internet Security - Internet Security Introduction, types of attacks The universalization of the Internet and networks, and the...
  • CYBER AND INFORMATION SECURITY DIVISION MHA - Cyber and Information Security (C&IS) Division Work Profile: The Ministry of Home Affairs (MHA) Cyber...
  • Cyber Crime and Cyber Crime Laws - The Cyber CrimeCrime A positive or negative act in violation of penal law; an offense against the state classified either as a felony or misdemeanor. Police station shall have the jurisdictionJurisdiction Authority by which courts receive and decide cases. Limited Jurisdiction: the authority over only particular types of cases, or cases under a prescribed amount in controversy, or seeking only certain types of relief, the District Court is a court of limited jurisdiction. Original Jurisdiction: Jurisdiction of the first court to hear a case. in respect of all the offences committed under the Information Technology Act .As per the amendments to the IT Act 2000 , the minimum rank of investigationInvestigation Purpose of all investigation is to reveal the unvarnished truth. The constitutional courts are duty bound to ensure that the truth is revealed. of cyber crimes is POLICE INSPECTOR and any jurisdictional police station can register and investigate.
  • Cyber Regulation Advisory Committee - Cyber Regulation Advisory Committee [IndiaIndia Bharat Varsha (Jambu Dvipa) is the name of this land...
  • Cyber Security and Law- a Global Approach - Contents Introduction to the cybercrime and cybercrime laws Meaning and implication of Cyber Attack Geopolitics...
  • Cyber Security Laws in the United States - Federal Government Regulation 1996 Health Insurance Portability and Accountability Act (HIPAA)  1999 Gramm-Leach-Bliley Act 2002...
  • Cyber Threats to Elections: a Lexicon (2018) - This reference aid draws on CTIIC’s experience promoting interagency situational awareness and information sharing during previous significant cyber events—including cyber threats to elections. It provides a guide to cyber threat terms and related terminology issues likely to arise when describing cyber activity. The document includes a range of cyber-specific terms that may be required to accurately convey intelligence on a cyber threat event and terms that have been established by relevant authorities regarding technical infrastructure for conducting elections.
  • Digital signature - digital signature” means authentication of any electronic record by a subscriber by means of an electronic method
  • Enhancing National Cybersecurity: Remarks by Christopher Painter (19/09/2016) - Christopher Painter, the Coordinator for Cyber Issues at the State Department, addressed the Presidential Commission on Enhancing National Cybersecurity. He highlighted the State Department's efforts to strengthen international cybersecurity through diplomacy, capacity building, incident response, and combating transnational cybercrime. Painter also presented policy recommendations to enhance international cyber stability and combat cyber threats.
  • FBI and Private Sector: Battling the Cyber Threat Together-Christopher Wray-28/01/2021 - At the FBI, we’ve been fighting the cyber threat for many years now. We began our early high-tech crime effort in the mid-1990s, and created our Cyber Division almost 20 years ago, in 2002. We’ve become known for our efforts to call out destabilizing and damaging cyber activity by nationNation A collective consciousness, founded in ancient origin within a geographic area, with definite history and heritage, culture and way of life, language and literature, food and clothing, coupled with a deep understanding of war and peace is to be known as a nation. Rasra is the Vedic word for it.-state actors, like the indictment last summer of two hackers working on behalf of the Chinese Ministry of State Security, stealing intellectual property from companies in the U.S. and around the world while also targeting dissidents who spoke out against the Communist Party.
  • Government has established Indian Cyber Crime Coordination Centre to provide a framework and eco-system to deal with cyber crimes - r. The Government has launched the National Cyber Crime Reporting Portal (www.cybercrime.gov.in), to enable public to report incidents pertaining to all types of cyber crimes, with a special focus on cyber crimes against women and children.
  • Govt Blocks 118 Mobile Apps to protect sovereignty, integrity and security of India - Government of IndiaIndia Bharat Varsha (Jambu Dvipa) is the name of this land mass. The people of this land are Sanatan Dharmin and they always defeated invaders. Indra (10000 yrs) was the oldest deified King of this land. Manu's jurisprudence enlitened this land. Vedas have been the civilizational literature of this land. Guiding principles of this land are : सत्यं वद । धर्मं चर । स्वाध्यायान्मा प्रमदः । Read more invoking it’s power under section 69A of the Information Technology Act read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009 and in view of the emergent nature of threats has decided to block 118 mobile apps (see Appendix) since in view of information available they are engaged in activities which is prejudicial to sovereignty and integrity of India, defence of India, security of state and public order.
  • Indian Computer Emergency Response Team - Cybersecurity in India is crucial for both public and private sectors, impacting national security and defense against cyber terrorism, espionage, and e-crime. The Government's CERT functions include maintaining a list of IT security auditors, responding to security incidents, and issuing security alerts. This is vital for protecting key military, space, and information systems.
  • India`s power grid could be attacked by Chinese cyber-hijackers: The Sunday Guardian - India’s power grids are “highly” susceptible to cyber attacks from  China, as the Sunday Guardian reported on Sunday. It stated that urgent action was required to be taken to isolate the critical part of the control rooms so that they were kept out of the reach of the hackers. The Indian power system, for planning and operational purposes, is divided into five regional grids, namely, Northern, Eastern, Western, North Eastern and Southern grids.
  • List of the common file extensions for developers - "xls",".xlsx",".pdf",".doc",".docx",".ppt",".pptx"
  • Memorandum on Improving Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems-USA-19/01/2022 - This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs.  Executive Order 14028 establishes that the Federal Government must improve its efforts to identify, deter, protect against, detect, and respond to malicious cyber campaigns and their actors through bold changes and significant investments in cybersecurity. 
  • People’s Republic of China Cyber ​​Security Law - This LawLaw Positive command of sovereign or divine. One can be ruled either by a Statute, a Statue, or a Statement. Legislation is the rule-making process by a political or religious organisation. Physics governs natural law. Logical thinking is a sign of a healthy brain function. Dharma is eternal for Sanatanis. is enacted for the purpose of safeguarding network security, safeguarding cyberspace sovereignty and national security, social public interests, protecting the legitimate rights and interests of citizens, legal persons and other organizations, and promoting the healthy development of economic and social information.
  • People’s Republic of China Cyber ​​Security Laws,Regulations, Rules and policies - Public Acts 2016-11-08 ·The People’s RepublicRepublic Res publica. Having a head of the state. Pope...
  • Public key certificate - A public key certificate is a digitally signed statement binds the value of a public key to the identity of the person, device, or service holds corresponding private key.
  • Sec 69A of IT Act: Power to block data generation, transmission, stored or hosted in any computer. - Power to issue directions for blocking for public access of any information through any computer resource.
  • Sexual extortion via Net - Sexual extortion via Net The Police Department reports that new scams have been detected again,...
  • Statement by NATO Council in solidarity with those affected by recent malicious cyber activities including Microsoft Exchange Server compromise-19/07/2021 - We observe with increasing concern that cyber threats to the security of the Alliance are complex, destructive, coercive, and becoming ever more frequent. This has been recently illustrated by ransomware incidents and other malicious cyber activity, targeting our critical infrastructure and democratic institutions, as well as exploiting weaknesses in hardware and software supply chains.