Interception in Information Communication Technology Special Reference to Cryptography, Information Security & Law

Authors

  • Srinivas Katkuri  Research Scholar University College of Law, Osmania University, Hyderabad, Telangana, India

Keywords:

Cryptography, Intruders, Information Security, Computer resources, Threats

Abstract

A rapid increase in the use of Information Communication Technology has given rise to new forms of malicious activities and incidents. Threats emanate from a wide variety of sources, and their effects carry significant risk for public safety, the security of nations and the stability of the globally linked international community as a whole. The origin, identity of the perpetrator, or motivation for the disruption can be difficult to ascertain. Threat actors can operate with substantial impunity from virtually anywhere. Many malicious tools and methodologies originate in the efforts of cybercriminals and hackers. The growing sophistication and scale of criminal activity increases the potential for harmful actions. The technical defense like cryptographic techniques to prevent and control of the intruders and their activities, need of legal provisions discussion in the knowledge court and some suggestions are to be explored in this Research paper.

References

  1. Vijaita Singh, "Many Cybercrime Cases Not Investigated", The Hindu, New Delhi, November 30, 2017.
  2. Kizza, Joseph Migga, Computer Network Security, 2005 Springer.pg.257.
  3. Wenbo Mao, Modern Cryptography: Theory and Practice, Publisher: Prentice Hall PTR, 2003, pg.33.
  4. Kizza, Joseph Migga, Computer Network Security, 2005, pg.77
  5. William Stallings, Network Security Essentials: Applications and Standards 4th Edition, Prentice Hall, 2011pg 306.
  6. Kizza, Joseph Migga, Computer Network Security, 2005, pg.78.
  7. Rosenoer Jonathan., Cyber Law: the law of the Internet, 1997, pg.213.
  8. Srinivas Katkuri, "Cyber Crimes and Penal Provisions in India", proceedings of National conference on ACPR2014.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Srinivas Katkuri, " Interception in Information Communication Technology Special Reference to Cryptography, Information Security & Law, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.666-670, January-February-2018.