Cybersecurity: Issues and Challenges

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

CYBERSECURITY: ISSUES AND CHALLENGES

A ROUGH RESEARCH PROPOSAL SUBMITTED IN PARTIAL


FULFILLMENT OF THE COURSE OF CYBER LAW, SEMESTER-IX
DURING THE ACADEMIC YEAR 2020-21.

SUBMITTED BY:
SWETA KUMARI
1658
B.B.A. LLB

SUBMITTED TO:
Mr. KUMAR GAURAV
(FACULTY, CYBER LAW)

SEPTEMBER, 2020
CHANAKYA NATIONAL LAW UNIVERSITY
INTRODUCTION:

Cyber security or Computer security or IT Security is applied to computers and networks. The
field covers all the processes and mechanisms by which computer-based equipment, information
and services are protected from unintended or unauthorized access, change or destruction.
Computer security also includes protection from unplanned events and natural disasters.
Indian Computer Emergency Response Team [CERT-In]. This is the national nodal agency for
responding to computer security incidents as and when they occur. Through Information
Technology (Amendment) Act, 2008 [CERT-In] has been designated to serve as the national
nodal agency for responding to perform the following functions in area of cyber security. The
Indian Computer Emergency Response Team shall serve as the national agency for performing
the following functions in the area of Cyber Security,-
(a) Collection, analysis and dissemination of information on cyber incidents Forecast and alerts of cyber
security incidents (b) Emergency measures for handling cyber security incidents (c) Coordination of
cyber incidents response activities Issue guidelines, advisories, vulnerability notes and white papers
relating to information security practices, procedures, prevention, response and reporting of cyber
incidents.

OBJECTIVES OF THE STUDY:

 To know about the purpose and importance of Cyber Security.


 To study the emerging issues and challenges of Cyber Security faced by the
organisations.

RESEARCH METHODOLOGY:
The researcher would like to follow doctrinal research methodology.

SOURCES OF DATA:
The researcher will gather data from both primary as well as secondary sources.
TENTATIVE CHAPTERISATION:

I. INTRODUCTION
II. MEANING, IMPORTANCE AND TYPES OF CYBERSECURITY
III. PRINCIPLES AND INCIDENTS OF CYBERSECURITY
IV. EMERGING ISSUES AND CHALLENGES OF CYBERSECURITY
V. CONCLUSION
VI. BIBLIOGRAPHY

You might also like