A Study on Data Privacy, Security of Cyber Crime
| Vol-4 | Issue-5 | May 2019 | Published Online: 25 May 2019 PDF ( 321 KB ) | ||
| Author(s) | ||
| Pelasur Chandrakumar Swamy 1; Dr. Gireesh Kumar J 2 | ||
|
1Research Scholar, Himalayan University, Faculty of Law, Itanagar, AP 2Research Supervisor, Department of Sociology, Himalayan University, Itanagar, AP |
||
| Abstract | ||
This study discusses the issues of cybercrime and what is being done to prevent it. Cyber criminals take advantages of vulnerabilities by using viruses, bots, etc to cause damage and/or maybe steal information. There are ways that this can be minimized by being aware of what the problems are. There are many problems but common ones are discussed. Not can these problems be solved on an individual or organization level but also on a global level. This study will look at what cybercrime is and three topics that discuss the problems with cybercrime and how to prevent it.The information age has made the public and private sectors of modern society increasingly dependent on technology, in which telecommunications play a vital role. Over the past thirty years, developed nations’ transit from the industrial era to the new information age has enabled them to develop the nascent technology and produce ever greater quality in standards and value. The past decades have also delivered many opportunities in which the flaws and faults of the system have been exploited and mended, by hackers and legitimate users alike. The new society has engendered new types of crimes, such as phishing and botnets, and facilitated the commission of old crimes, for example the violation of intellectual property rights, with new technology facilitating breaches of copyright in music, films and software. As society grows ever more reliant on these technologies, so does the concern for security, especially in cyberspace. The emancipation of the internet has leaped ahead of the judicial system, but the authorities have taken heed and the wheels of the legal machine have started turning. The difficulty, however, has been that the internet-based society has no physical boundaries and thus much traffic escapes national supremacy. |
||
| Keywords | ||
| Data Privacy, Security, Cyber Crime, information, cyberspace. | ||
|
Statistics
Article View: 298
|
||

