Interception in Information Communication Technology Special Reference to Cryptography, Information Security & Law
Keywords:
Cryptography, Intruders, Information Security, Computer resources, ThreatsAbstract
A rapid increase in the use of Information Communication Technology has given rise to new forms of malicious activities and incidents. Threats emanate from a wide variety of sources, and their effects carry significant risk for public safety, the security of nations and the stability of the globally linked international community as a whole. The origin, identity of the perpetrator, or motivation for the disruption can be difficult to ascertain. Threat actors can operate with substantial impunity from virtually anywhere. Many malicious tools and methodologies originate in the efforts of cybercriminals and hackers. The growing sophistication and scale of criminal activity increases the potential for harmful actions. The technical defense like cryptographic techniques to prevent and control of the intruders and their activities, need of legal provisions discussion in the knowledge court and some suggestions are to be explored in this Research paper.
References
- Vijaita Singh, "Many Cybercrime Cases Not Investigated", The Hindu, New Delhi, November 30, 2017.
- Kizza, Joseph Migga, Computer Network Security, 2005 Springer.pg.257.
- Wenbo Mao, Modern Cryptography: Theory and Practice, Publisher: Prentice Hall PTR, 2003, pg.33.
- Kizza, Joseph Migga, Computer Network Security, 2005, pg.77
- William Stallings, Network Security Essentials: Applications and Standards 4th Edition, Prentice Hall, 2011pg 306.
- Kizza, Joseph Migga, Computer Network Security, 2005, pg.78.
- Rosenoer Jonathan., Cyber Law: the law of the Internet, 1997, pg.213.
- Srinivas Katkuri, "Cyber Crimes and Penal Provisions in India", proceedings of National conference on ACPR2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.