Sei sulla pagina 1di 3

Few challenges that the technology space faces in cyber security are the

following:

 Digital Data Threat: Growing online transactions generate bigger incentives


for cybercriminals. Besides, establishments looking to mine data—for
instance, customer information, results of product surveys, and generic
market information—create treasured intellectual property that is in itself
an attractive target.
 Supply Chain Inter-connection: The supply chains are increasingly
interconnected. Companies are urging vendors and customers to join their
networks. This makes a company’s security wall thin.
 Hacking: This action is penetrating into someone’s system in unauthorized
fashion to steal or destroy data, which has grown hundred folds in the past
few years. The availability of information online makes it easier for even
non-technical people to perform hacking.
 Phishing: The easiest to execute and can produce the results with very little
effort. It is the act of sending out Fake emails, text messages and create
websites to look like they're from authentic companies.

The following suggestions are recommended as


solution to the above challenges:

1. Net Security be tightened up

2. Use of Encryption Technology

3. Intrusion Management(IDS)

An intrusion detection system (IDS) is a device or software


application that monitors a network or systems for malicious activity or
policy violations. Any malicious activity or violation is typically
reported either to an administrator or collected centrally using
a security information and event management (SIEM) system. A SIEM
system combines outputs from multiple sources, and uses alarm
filtering techniques to distinguish malicious activity from false alarms.

4. False E-mail identity registration be treated as an offence

5. Use of Voice-recognizer, Filter Software and Caller ID for Protection


against Unauthorized Access

6. Development of Cyber Forensics and Biometric Techniques

7. Need to establish a Computer Crime Research and Development


Centre.

8. Need for a Universal Legal Regulatory Mechanism

9. Global Code of Digital Law for resolving Intellectual Property Rights


related disputes

10. Need for Universalization of Cyber Law

11. Interpol and Emergency Response Computer Security Team

12. Special Cyber Crime Investigation Cell for Hi-Tech Crimes

13. E-Judiciary and Video-Conferencing for Speedy Justice

14. Need for Cyber Crime Reporter or Cyber Law Journal

15. The Information Technology (Amendment) Act, 2008 – A Step in the


right direction

16. Establishment of Special Cyber Courts to try Cyber Crimes

17. Diffusion of Internet Technology in India

18. Technical Means for Blocking of Errant Websites

19. Planting of Baits in Cyberspace for Worms and Viruses

20. Regulation of Social Networking Sites

21. Decentralization of the National Informatics Centre


22. Appointments under the IT Act, 2000: Fair, Transparent and Speedy

23. Need for Increased Awareness among Victims of Cyber Crimes

24. Need for Imparting Training to Officials to Investigate Cyber Crimes

25. Need for connecting Cyber Cafes with Police Control Rooms

26. Periodical reviewing of licenses of Internet Service Providers (ISPs)

27. Need for Development of Anti-hijacking Software

28. Encouragement of Cyber Crime Victims to Lodge Complaints

29. Need for Modernization of Existing Laws and Enactment of New Laws

30. Digital timestamping

The main feature of digital time stamping is to


eliminate the possibility of forging the time of creation e.g. by
modifying the system clock of the machine used for signing.

Why it is needed We often need to prove when a piece of data (text,


document, music, art or database) was created or last modified. Areas
that need this could be : E-commerce, patent issues, betting, archiving,
journaling and when the author signs the record or when someone
approved it, or consented to it.

Potrebbero piacerti anche