top of page

Importance Of Cyber Security




Riya Sharma, BA LLB, Manav Rachna University

ABSTRACT

Currently, the majority of international economic, commercial, cultural, social, and governmental interactions and activities—including those of individuals, non-governmental organizations, governments, and governmental institutions—are conducted online. Recently, cyber-attacks and the risk of wireless communication technologies have become issues for many private businesses and governmental institutions around the world. The modern society is heavily reliant on electronic technology, so safeguarding this data from cyber-attacks is a difficult problem. The goal of cyber-attacks is to financially hurt businesses. Cyber-attacks may also serve military or political objectives in other circumstances. PC infections, knowledge gaps, data distribution services (DDS), and other attack vectors are a few examples of these harms. In order to protect harm from cyber- attacks, numerous organizations employ a variety of measures. Currently, the majority of national Cyber security interactions and economic, commercial, cultural, and social activities rely on real-time information on the most recent IT data. Researchers from all over the world have up till now offered a variety of techniques to stop cyber-attacks or lessen the harm they inflict. Some of the methods are now being used, while others are still being studied. The purpose of this study is to examine and thoroughly review the standard advancements made in the area of cyber security as well as to look into the difficulties, advantages, and disadvantages of the suggested approaches. The several new descendant assaults are discussed in detail. The history of early- generation cyber-security techniques are explored together with standard security frameworks. In addition, current events and emerging trends. Cyber security innovations, security risks, and challenges are discussed. The thorough review study that has been offered to IT and cyber security researchers is anticipated to be helpful.

Keywords: Cyber security, Cyber Action, Cyberspace, Cyber security policy


Recent Posts

See All
Analysis Of FIR With Case Judgment

Zulekha Begum, LL.B Amity Law School, Lucknow, Amity University, Uttar Pradesh. INTRODUCTION FIR, which stands for "First Information...

 
 

Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Licensing: 

 

All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

 

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page