Few challenges that the technology space faces in cyber security are the
following:
Digital Data Threat: Growing online transactions generate bigger incentives
for cybercriminals. Besides, establishments looking to mine data—for instance, customer information, results of product surveys, and generic market information—create treasured intellectual property that is in itself an attractive target. Supply Chain Inter-connection: The supply chains are increasingly interconnected. Companies are urging vendors and customers to join their networks. This makes a company’s security wall thin. Hacking: This action is penetrating into someone’s system in unauthorized fashion to steal or destroy data, which has grown hundred folds in the past few years. The availability of information online makes it easier for even non-technical people to perform hacking. Phishing: The easiest to execute and can produce the results with very little effort. It is the act of sending out Fake emails, text messages and create websites to look like they're from authentic companies.
The following suggestions are recommended as
solution to the above challenges:
1. Net Security be tightened up
2. Use of Encryption Technology
3. Intrusion Management(IDS)
An intrusion detection system (IDS) is a device or software
application that monitors a network or systems for malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources, and uses alarm filtering techniques to distinguish malicious activity from false alarms.
4. False E-mail identity registration be treated as an offence
5. Use of Voice-recognizer, Filter Software and Caller ID for Protection
against Unauthorized Access
6. Development of Cyber Forensics and Biometric Techniques
7. Need to establish a Computer Crime Research and Development
Centre.
8. Need for a Universal Legal Regulatory Mechanism
9. Global Code of Digital Law for resolving Intellectual Property Rights
related disputes
10. Need for Universalization of Cyber Law
11. Interpol and Emergency Response Computer Security Team
12. Special Cyber Crime Investigation Cell for Hi-Tech Crimes
13. E-Judiciary and Video-Conferencing for Speedy Justice
14. Need for Cyber Crime Reporter or Cyber Law Journal
15. The Information Technology (Amendment) Act, 2008 – A Step in the
right direction
16. Establishment of Special Cyber Courts to try Cyber Crimes
17. Diffusion of Internet Technology in India
18. Technical Means for Blocking of Errant Websites
19. Planting of Baits in Cyberspace for Worms and Viruses
20. Regulation of Social Networking Sites
21. Decentralization of the National Informatics Centre
22. Appointments under the IT Act, 2000: Fair, Transparent and Speedy
23. Need for Increased Awareness among Victims of Cyber Crimes
24. Need for Imparting Training to Officials to Investigate Cyber Crimes
25. Need for connecting Cyber Cafes with Police Control Rooms
26. Periodical reviewing of licenses of Internet Service Providers (ISPs)
27. Need for Development of Anti-hijacking Software
28. Encouragement of Cyber Crime Victims to Lodge Complaints
29. Need for Modernization of Existing Laws and Enactment of New Laws
30. Digital timestamping
The main feature of digital time stamping is to
eliminate the possibility of forging the time of creation e.g. by modifying the system clock of the machine used for signing.
Why it is needed We often need to prove when a piece of data (text,
document, music, art or database) was created or last modified. Areas that need this could be : E-commerce, patent issues, betting, archiving, journaling and when the author signs the record or when someone approved it, or consented to it.