Framework and Challenges of Cyber Security in India: An Analytical Study

https://doi.org/10.55529/ijitc.24.27.34

Authors

  • A. Panneerselvam Research Scholar of Political science Department of Political science Annamalai University Tamil Nadu, India.

Keywords:

Cyber; Challenges; Laws; Security; Threats.

Abstract

Cyber security threats come in a wide variety of forms, including ransomware, phishing, malware attacks, and many others. India is currently ranked 11th in the world in terms of the number of local cyberattacks and it has already experienced 2,399,692 of these incidents in the first three months of 2020. Because cyber security is a topic that is growing more and more essential, businesses are undoubtedly well aware of the hazards and threats that hackers offer to their corporation. However cybersecurity would continue to be a difficult issue for three reasons: It goes beyond a simple technological issue. Cyberspace operates under a distinct set of regulations than the real world. Law, policy, and practise in the area of cybersecurity are still in their infancy. Every firm requires a security analyst to ensure that their system is secure given the rise in cyber-attacks. These security analysts must secure private company servers; protect the confidential data of governmental organisations, and other cybersecurity-related difficulties. Research indicates that there is a significant need in India for qualified cybersecurity specialists and that this demand will continue to rise in the near future. Employers anticipate a scarcity of qualified cybersecurity specialists. The goal of the study is to analyse and explain India's cyber security framework and difficulties. The study used a combination of descriptive and analytical method to draw a result. The Thematic software tool QADMAX also used in the study to analyse the qualitative data for secondary sources

Published

2022-07-15

How to Cite

A. Panneerselvam. (2022). Framework and Challenges of Cyber Security in India: An Analytical Study. International Journal of Information Technology & Computer Engineering , 2(04), 27–34. https://doi.org/10.55529/ijitc.24.27.34

Issue

Section

Aricle Publication

Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.