India’s Cyber Security Landscape

  • First Online: 14 February 2022

Cite this chapter

research paper on cyber security in india pdf

  • Sameer Patil 3  

Part of the book series: India Studies in Business and Economics ((ISBE))

240 Accesses

4 Citations

With the second-largest Internet user base and a leading Information and Communications Technology industry, India has quickly adopted digital technologies to emerge as a major actor in the global cyberspace. This thrust on digital and information technologies is accompanied by a rapid expansion of cyberthreats such as malware attacks, data breaches and cyber-enabled espionage operations. While there has been no major disruptive cyber-attack, India has faced multiple attacks from China and Pakistan—two countries with which it is locked in protracted border disputes. These two sources of threat are joined by non-state actors such as organised hacking syndicates and terrorist groups which have used the cyberspace to target Indian interests. This paper broadly examines the sources and nature of India’s cyberthreats. It also reviews the government’s policy measures to counter these threats. The paper argues that in tackling these threats, India maintains a precarious balance between its commitment to a liberal multi-stakeholder order in the cyberspace and the pressure to protect its national security interests.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

research paper on cyber security in india pdf

Cybersecurity Threats in Africa

research paper on cyber security in india pdf

A Study on Cyber Security and its Challenges in India

research paper on cyber security in india pdf

The Fragmented Securitization of Cyber Threats

Baezner, M. (2018). Regional rivalry between India Pakistan: Tit-for-tat in cyberspace . Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich. https://www.researchgate.net/profile/Marie-Baezner/publication/326866504_Regional_rivalry_between_India-Pakistan_tit-for-tat_in_cyberspace/links/5b6985fd299bf14c6d950724/Regional-rivalry-between-India-Pakistan-tit-for-tat-in-cyberspace.pdf .

Balasubramanian, D. (2013). Sixty years of IT in India. The Hindu . https://www.thehindu.com/sci-tech/science/sixty-years-of-it-in-india/article4435223.ece .

Basu, A. (2019). India’s role in global cyber policy formulation . Lawfare. https://www.lawfareblog.com/indias-role-global-cyber-policy-formulation .

Bhardwaj, S. (2013). Security in cyberspace: India’s multilateral efforts. In W. P. S. Sidhu, Pr. B. Mehta, & B. Jones (Eds.), Shaping the emerging world: India and the multilateral order (pp. 217–236). Brookings Institution Press.

Google Scholar  

Chakravarti, A. (2021). Data of 100 million credit, debit cardholders leaked on dark web. India Today . https://www.indiatoday.in/technology/news/story/-data-of-100-million-credit-debit-cardholders-leaked-on-dark-web-1755570-2021-01-04 .

Cosmos Bank. (n.d.). Official press release regarding the unfortunate attack on the Indian banking sector . Retrieved Sep 20, 2018, from https://www.cosmosbank.com/press-release/ .

Department of Justice. (2013). Criminal complaint against Ross William Ulbricht . https://www.cs.columbia.edu/~smb/UlbrichtCriminalComplaint.pdf .

Department of Justice. (2018). North Korean regime-backed programmer charged with conspiracy to conduct multiple cyber attacks and intrusions . https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and .

Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. SSYM’04: Proceedings of the 13th Conference on USENIX Security Symposium 13 . https://www.usenix.org/legacy/publications/library/proceedings/sec04/tech/full_papers/dingledine/dingledine.pdf .

DQI Bureau. (2003). India’s first ‘Nigeria 419’ case registered . Dataquest. https://www.dqindia.com/india-s-first-nigeria-419-case-registered/ .

Ebert, H. (2020). Hacked IT superpower: How India secures its cyberspace as a rising digital democracy. India Review, 19 (4), 376–413.

Article   Google Scholar  

Economic Times. (2019). Tracing dark web crimes a big challenge for Kerala police. Economic Times . https://government.economictimes.indiatimes.com/news/secure-india/tracing-dark-web-crimes-a-big-challenge-for-kerala-police/71258534 .

FireEye. (n.d.). APT38: Un-usual Suspects . Retrieved May 21, 2019, from https://content.fireeye.com/apt/rpt-apt38 .

Fitter, P. (2012). Stuxnet attack wakes India up to threat to critical infrastructure. India Today . http://indiatoday.intoday.in/story/stuxnet-cyber-war-critical-infrastructure-of-india-ntro/1/216107.html .

Gopakumar, G., & D’Monte, L. (2017). How Union Bank was hacked and got its money back. LiveMint . https://www.livemint.com/Industry/xuBJNapRGBrtl05iEAvsYO/How-Union-Bank-was-hacked-and-got-its-money-back.html .

Government of Jammu and Kashmir. (2020). Temporary suspension of Telecom Services-directions reg. http://jkhome.nic.in/28(TSTS)of2020.pdf .

Greenwald, G., & Saxena, S. (2013). India among top targets of spying by NSA. The Hindu . http://www.thehindu.com/news/national/india-among-top-targets-of-spying-by-nsa/article5157526.ece .

Hegel, T. (2021). A global perspective of the sidewinder APT . https://cybersecurity.att.com/blogs/labs-research/a-global-perspective-of-the-sidewinder-apt .

Hitachi. (2017). Hitachi, final investigation report completed; Hitachi payment services suffered breach due to sophisticated malware attack in mid-2016 . https://www.hitachi-payments.com/src/HPY%20Press%20Release_V9.pdf .

Hohmann, M., Pirang, A., & Benner, T. (2017). Advancing cybersecurity capacity building: Implementing a principle-based approach . Global Public Policy Institute. https://www.gppi.net/media/Hohmann__Pirang__Benner__2017__Advancing_Cybersecurity_Capacity_Building.pdf .

ICANN. (2015). Indian government declares support for multistakeholder model of internet governance at ICANN53 . https://www.icann.org/resources/press-material/release-2015-06-22-en .

Insikt Group. (2021). China-linked group RedEcho targets the Indian power sector amid heightened border tensions . https://www.recordedfuture.com/redecho-targeting-indian-power-sector/ .

ITU. (1999). Consultations get under way for world summit on information society. ITU News , 4 . http://www.itu.int/itunews/issue/1999/04/index.html .

Kushner, D. (2013). The real story of Stuxnet. IEEE Spectrum . https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet .

Leyden, J. (2021). Indian cyber-espionage activity rising amid growing rivalry with China, Pakistan . https://portswigger.net/daily-swig/indian-cyber-espionage-activity-rising-amid-growing-rivalry-with-china-pakistan .

McGuinness, D. (2017). How a cyber attack transformed Estonia. BBC . https://www.bbc.com/news/39655415 .

Ministry of Home Affairs. (n.d.). Details about Indian cybercrime coordination centre (I4C) Scheme . Retrieved August 19, 2020, from https://www.mha.gov.in/division_of_mha/cyber-and-information-security-cis-division/Details-about-Indian-Cybercrime-Coordination-Centre-I4C-Scheme .

Naren, N. (2020). Two decades of the information technology act, 2000: Way forward. The Daily Guardian . https://thedailyguardian.com/two-decades-of-the-information-technology-act-2000-way-forward/ .

National Payments Corporation of India. (2020a). Statement pertaining to press reports on debit card compromise . https://www.npci.org.in/PDF/npci/press-releases/2016/Statementpertainingtopressreportsondebitcardcompromise.pdf .

National Payments Corporation of India. (2020b). RuPay product overview. RuPay Product Overview . https://www.npci.org.in/what-we-do/rupay/product-overview .

Patil, S. (2014). India’s vulnerable SCADA systems. https://www.gatewayhouse.in/indias-vulnerable-scada-systems/ .

Patil, S. (2018a). Punjab’s unshakable drug smuggling networks. https://www.gatewayhouse.in/punjabs-drug-smuggling/ .

Patil, S. (2018b). India’s lead on cyber space governance. https://www.gatewayhouse.in/india-cyber-space-governance/ .

Patil, S. (2019a). Partnering for prosperity: India-Canada collaboration to curb digital black markets (No. 2; Canada-India Track 1.5 Dialogue). https://www.gatewayhouse.in/wp-content/uploads/2019/02/Canada-India-Paper-no-2_0.pdf .

Patil, S. (2019b). Pakistan’s cyber propaganda: Fake news and social media .

Patil, S., & Chakraborty, S. (2019). A cybersecurity agenda for India’s digital payment systems (No. 20). https://www.gatewayhouse.in/wp-content/uploads/2019/10/Digital-Payments_FINAL.pdf .

Press Information Bureau. (2019). Raksha Mantri Reviews Defence Cooperation Mechanism . https://pib.gov.in/Pressreleaseshare.aspx?PRID=1573610 .

PTI. (2020a). Access to internet is a fundamental right, rules Supreme Court. The Hindu . https://www.thehindubusinessline.com/news/right-to-access-internet-is-a-fundamental-right-rules-supreme-court/article30531490.ece .

PTI. (2020b). Sabotage suspected in Mumbai power outage: Nitin Raut, energy minister . https://economictimes.indiatimes.com/news/politics-and-nation/sabotage-suspected-in-mumbai-power-outage-nitin-raut-energy-minister/articleshow/78656392.cms .

Rajaraman, V. (2012). History of computing in India (1955–2010) . IEEE Computer Society.

Ramani, S. (2011). Bringing the Internet to India. In M. Rao & O. Manzar (Eds.), NetCh@kra: 15 years of internet in India, retrospect and roadmaps (pp. 47–62). Digital Empowerment Foundation.

Rao, P. (2016). Online radicalisation: The example of Burhan Wani. Manohar Parrikar institute for defence studies and analyses . https://idsa.in/issuebrief/online-radicalisation-burhan-wani_prao_160716 .

Reserve Bank of India. (n.d.). Payment and settlement systems in India: Journey in the second decade of the millennium . Retrieved Feb 27, 2021, from https://rbidocs.rbi.org.in/rdocs/Publications/PDFs/PSSBOOKLET93D3AEFDEAF14044BC1BB36662C41A8C.PDF .

Reserve Bank of India. (2016). Cyber security framework in banks . https://www.rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=10435 .

Reuters. (2021, March 1). Chinese hackers target India’s serum institute, Bharat Biotech: Report. NDTV .

Scott-Railton, J., Hulcoop, A., Bahr, A. R., Marczak, B., Anstis, S., & Deibert, R. (2020). Dark Basin: Uncovering a massive hack-for-hire operation . Citizen Lab. https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/ .

Shah, K., & Kaul, A. (2020). Indian government’s 2G restrictions in Kashmir fail to curb online extremism. Observer Research Foundation . https://www.orfonline.org/research/indian-governments-2g-restrictions-in-kashmir-fail-to-curb-online-extremism-66861/ .

Sinha, J. (2020). Delhi: 21-year-old drug dealer operating through the ‘dark web’ arrested. The Indian Express . https://indianexpress.com/article/cities/delhi/21-yr-old-drug-dealer-operating-through-the-dark-web-arrested-6259629/ .

Software Freedom Law Centre. (n.d.). Longest Shutdowns . Retrieved Feb 27, 2021, from https://internetshutdowns.in/ .

Ultrascan Advanced Global Investigations. (2013). 419 Advance fee fraud statistics 2013 . https://www.ultrascan-agi.com/public_html/html/pdf_files/Pre-Release-419_Advance_Fee_Fraud_Statistics_2013-July-10-2014-NOT-FINAL-1.pdf .

UNI. (2000, August 9). IT Act to come into force from Aug 15 . Refiff.Com. https://www.rediff.com/business/2000/aug/09itact.htm .

United Nations Security Council. (2019). Report of the panel of experts established pursuant to resolution 1874 . https://www.undocs.org/S/2019/171 .

Download references

Author information

Authors and affiliations.

Gateway House, Mumbai, India

Sameer Patil

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Conflict Resolution and Peace Research Programme, National Institute of Advanced Studies (NIAS), Bengaluru, Karnataka, India

Anshuman Behera

School of Liberal Studies, Pandit Deendayal Energy University, Gandhinagar, Gujarat, India

Sitakanta Mishra

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Patil, S. (2022). India’s Cyber Security Landscape. In: Behera, A., Mishra, S. (eds) Varying Dimensions of India’s National Security. India Studies in Business and Economics. Springer, Singapore. https://doi.org/10.1007/978-981-16-7593-5_6

Download citation

DOI : https://doi.org/10.1007/978-981-16-7593-5_6

Published : 14 February 2022

Publisher Name : Springer, Singapore

Print ISBN : 978-981-16-7592-8

Online ISBN : 978-981-16-7593-5

eBook Packages : Political Science and International Studies Political Science and International Studies (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research
  • My Shodhganga
  • Receive email updates
  • Edit Profile

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • Maharaja Agrasen University
  • Maharaja Agrasen School of Law
Title: Prevention of Cyber Crimes in India A Comparative Study
Researcher: Sunidhi Kashyap
Guide(s): 
Keywords: Law
Social Sciences
Social Sciences General
University: Maharaja Agrasen University
Completed Date: 2021
Abstract: newline The Internet in India is increasing in the era of 21st century rapidly which gave rise to the new opportunities in various fields like entertainment, business, sports, education and many more. As the Internet users are growing fast, there are some advantages as well as disadvantages. Cyber-crimes are the latest entrants in the long list of various types of crimes which are continuously bothering the mankind. newlineThe need for Cyber law came into existence due to the crimes which are done by the people virtually which have no boundaries and may affect any country across the globe. Thus, there is a dire need of such law which is necessary for the prevention of computer related crime. newlineCyber-crimes are mainly concerned with all the criminal activities which are done using the various communication devices like computers, tablets, mobile phones, the internet, cyberspace, and the World Wide Web. But these crimes can be done on those individuals also who don t have any knowledge of computers or Internet. newlineThe Parliament of India has taken into consideration the recommendations of General Assembly in the form of Information Technology Act, 2000. The benefit of coming into existence this Act is that it further amended the Indian Penal Code, 1860, The Indian Evidence Act, 1872, the Bankers Books Evidence Act,1891 and the Reserve Bank of India Act,1934. The Information Technology Act makes the international trade easier and secondly it is an alternative to the paper-based methods of communication and storage of information. There was also a beginning at international level to combat the problem of International Cyber Crime Convention which came into force on November 23, 2001. As on August 30, 2016, 55 countries have become signatory to this convention. newlineIn Indian Constitution also right to privacy has been defined as the right of person to enjoy his own presence by himself and decides his boundaries of physical, mental, and emotional interaction with another person. From this we can easily observe that privacy
Pagination: 
URI: 
Appears in Departments:
File Description SizeFormat 
Attached File525.33 kBAdobe PDF
536.44 kBAdobe PDF
1.72 MBAdobe PDF
480.02 kBAdobe PDF
520.63 kBAdobe PDF
287.91 kBAdobe PDF
182.44 kBAdobe PDF
2.05 MBAdobe PDF
393.74 kBAdobe PDF
303.56 kBAdobe PDF
239.33 kBAdobe PDF

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Cyber Security in India

Profile image of Manshubh Rihal

Related Papers

Defence and Diplomacy

Dr. E. Dilipraj

research paper on cyber security in india pdf

Rishabh Upadhyay

The paper studies the initiatives taken by the Government of India, Private Organization, Think Tank,etc within the Indian sub domain in order to strengthen the Security and Privacy of the country.

Ritu Srivastava

Lennon Chang

Saroj K Rath

There is near no literature available about India’s cyber security activities. Because of this absence and despite India’s grand standing in the cyber world, India is not included in the tightest intelligence sharing circles of big-powers like the US and Britain. Debates, discussions, analysis and simulation of cyber security in the public domain are not only essential but also unavoidable to build a robust digital India. This volume is an endeavor to gather the scattered and tickling pieces and provide a platform to channelize the untapped potential. Indian Infosec Consortium is dedicated to enrich India’s cyber security policy debate and offer first-of-itskind glimpse into the secret world of Asia’s cyber space. This volume would excite readers on many accounts. Firstly, it provides information about the people who are working in this field. The compilation is accommodating the senior-most of government functionaries while giving space to the youngest cyber professional at the same stage. The participants, who contributed to this volume belong to diverse back-ground which offer stiff competition among the participants to test their cyber prowess. The assemblage of the gist or abstract of papers presented at the Ground Zero Summit 2014 is the only authoritative text that offer tremendous amount of information to cyberenthusiasts, who in turn would, track and visualize changes in the digital world and prepare themselves for future challenges. With these words, Indian Infosec Consortium is dedicating this volume to its esteem readers.

Air Power Journal

Dr. E. Dilipraj , Ramnath Reghunadhan

Adam Ali.Zare hudaib

Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.

Emmanuel S Dandaura

Proceedings of the INTERNATIONAL CONFERENCE ON "CYBERSPACE GOVERNANCE:The Imperative For National & Economic Security"

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) ijarcet

Cyber security is a information technology. Securing information has become one of the biggest challenges nowadays. Whenever we think about cyber security the first thing we remember is 'Cyber Crime' which is been increasing day by day. The cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security and its types. To the world of computer technology, governments, police and intelligence units are acting toward the issue closely. Different strategies are put into action. The main goal is to educate the people in the world and to expose the idea that it is not safe anymore to navigate in the cyber world without any of security. This paper discuss about techniques used in cyber security.

Valarie Findlay

Cyber-threats can range from minor electronic crimes to more sophisticated fraud and the infiltration and compromise of systems, networks and supply chains causing significant damage and harm. Cyber-threats are actioned by more than terrorists; actors who engage in cyber-threat activities and events vary from individuals, corporations involved in industrial espionage, criminals and criminal enterprises, terrorists and terrorist organizations and even nation states; recent reports indicate that Russian forces hacked a U.S. surveillance drone flying over the Crimea region of Ukraine in March 2014 by allegedly severing the connection between the drone and its operator using an undisclosed, complex radio-electronic technology, resulting in its interception. These asymmetrical characteristics are distinctly different than that of conventional threats, requiring specialized, “cutting edge” skills to prevent, detect, respond and recover. The Internet has added a level of ambiguity and comp...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Chandrakant Chellani

Jawad Hussain Awan

IOSR Journals

Kent Zamora

Prabinda Joshee

Dr.Debarati Halder,Ph.D

David OMAND

Susan Nepal

The Atlantic Times- Special Edition of the Security Times for 50th Munich Security Conference

Victoria Kupsch

Alexandra Kulikova , Oleg Demidov

Nurlan Karimov

Lennon Chang , Lena Y. Zhong

Mahima Rai , HL Mandoria

Nikola Zlatanov

Diana Pysarenko

Richard "Pete" Hunt

Dr. Jennifer R Henrichsen , Joanne Lisosky

Gabi Siboni

Lumuli Gwakisa

Stefano Manacorda

Matthew Nordmoe

Self-Published

Michael Nycyk

Ikenga Oraegbunam

Kavali Suresh

Law, Privacy and Surveillance in Canada in the Post-Snowden Era

Steve Hewitt

Christopher Laing

debalina ghoshal

Chevening Fellowship Paper

Adv Prashant Mali, Ph.D.

Rita Bonello

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Cyber Laws in India: An Overview

Indian Journal of Law and Legal Research, 4(01), pp. 1391-1411. https://doi-ds.org/doilink/02.2022-31571548/IJLLR/V4/I1/A132

21 Pages Posted: 28 Mar 2022

Jatin Patil

NMIMS, School of Law, Hyderabad

Date Written: March 3, 2022

The world has progressed in terms of communication, particularly since the introduction of the Internet. The rise of cybercrime, often known as e-crimes (electronic crimes), is a major challenge confronting today's society. As a result, cybercrime poses a threat to nations, companies, and individuals all across the world. It has expanded to many parts of the globe, and millions of individuals have become victims of cybercrime. Given the serious nature of e-crime, as well as its worldwide character and repercussions, it is evident that a common understanding of such criminal conduct is required to successfully combat it. The definitions, types, and incursions of e-crime are all covered in this study. It has also focused on India's anti-e-crime legislation.

Keywords: Cyber Law

Suggested Citation: Suggested Citation

Jatin Patil (Contact Author)

Nmims, school of law, hyderabad ( email ).

Plot no.B4, Green Industrial Park Polepally SEZ, TSIIC Jadcherla Mahbubnagar, Dist, OH Telangana 509301 India

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, cyberspace law ejournal.

Subscribe to this fee journal for more curated articles on this topic

Criminal Law eJournal

India law ejournal.

  • Skip to main content
  • Skip to search
  • Skip to footer

Products and Services

2 persons sitting in front of laptop

Cisco Security

Master your goals. innovate. we'll tackle threats..

Get powerful security across all your networks, cloud, endpoints, and email to protect everything that matters, from anywhere.

If it's connected, you're protected

Hacker working at multiple computer screens

Cisco Security “The Hacker”

More connected users and devices creates more complexity. Cisco Security Cloud makes security easier for IT and safer for everyone anywhere security meets the network.

Deliver smarter, stronger security

Protect your organization across a multicloud environment, while simplifying security operations, improving scalability, and driving data-informed outcomes, powered by Cisco Talos.

Unlock better user experiences

Create a seamless experience that frustrates attackers, not users, by granting access from any device, anywhere, and adding more proactive security controls.

Deliver cost-effective defenses

Improve ROI by consolidating vendors, reducing complexity and integrating your security.

Strengthen security resilience

Unified, end-to-end protection maximizes value, minimizes risk, and closes security gaps everywhere to defend against evolving threats. Protect access, apps, and innovation across your network to secure your future.

research paper on cyber security in india pdf

Cisco Secure Firewall

Better visibility and actionable insights across networks, clouds, endpoints, and email allows users to respond confidently to the most sophisticated threats at machine scale.

Featured security products

Cisco hypershield.

A new groundbreaking security architecture that makes hyperscaler technology accessible to enterprises of all sizes and delivers AI-native security for modern data centers and cloud.

Cisco Secure Access (SSE)

A converged cybersecurity solution, grounded in zero trust, that radically reduces risk and delights both end users and IT staff by safely connecting anything to anywhere.

Detect the most sophisticated threats sooner across all vectors and prioritize by impact for faster responses.

Cisco Multicloud Defense

Gain multidirectional protection across clouds to stop inbound attacks, data exfiltration, and lateral movement.

Secure applications and enable frictionless access with strong MFA and more. Establish user and device trust, gain visibility into devices, and enable secure access to all apps.

Cisco Identity Services Engine (ISE)

Simplify highly secure network access control with software-defined access and automation.

Security Suites delivered by Cisco Security Cloud

User Protection Suite

Cisco User Protection Suite

Get secure access to any application, on any device, from anywhere. Defend against threats targeting users and deliver seamless access for hybrid work.

Cloud Protection Suite

Cisco Cloud Protection Suite

Secure your apps and data with a powerful, flexible framework for a hybrid and multicloud world.

Breach Protection Suite

Cisco Breach Protection Suite

Secure your business by investigating, prioritizing, and resolving incidents through unified defense and contextual insights from data-backed, AI-powered security.

Customer stories and insights

Global partnerships fight to end child exploitation together.

Marriott International

"Marriott has long championed human rights and human trafficking awareness. Combating CSAM is an important extension of that work. The IWF provided the level of rigor we needed in a URL list, and Cisco's security technology provided the means to easily apply it."

Abbe Horswill, Director, Human Rights and Social Impact

Company: Marriott International

The NFL relies on Cisco

NFL logo

"From securing stadiums, broadcasts, and fans to protecting the largest live sporting event in America, the right tools and the right team are key in making sure things run smoothly, avoiding disruptions to the game, and safeguarding the data and devices that make mission-critical gameday operations possible."

Add value to security solutions

Cisco Security Enterprise Agreement

Instant savings

Experience security software buying flexibility with one easy-to-manage agreement.

Services for security

Let the experts secure your business

Get more from your investments and enable constant vigilance to protect your organization.

Sharpen your security insights

Cisco Cybersecurity Viewpoints

Set your vision to a more secure future with Cisco Cybersecurity Viewpoints. With specialized content from podcasts to industry news, you'll walk away with a deeper understanding of the trends, research, and topics in our rapidly changing world.

IMAGES

  1. (PDF) A STUDY ON TYPES OF CYBER CRIMES AND CYBER ATTACKS IN INDIA

    research paper on cyber security in india pdf

  2. (PDF) Cyber Security

    research paper on cyber security in india pdf

  3. (PDF) INFORMATION SECURITY TOWARDS CYBER SECURITY: A REVIEW PAPER

    research paper on cyber security in india pdf

  4. (PDF) Role of Artificial Intelligence in Cyber Security

    research paper on cyber security in india pdf

  5. (PDF) A Study of Cyber Crime and Perpetration of Cyber Crime in India

    research paper on cyber security in india pdf

  6. (PDF) IMPACT OF INFORMATION TECHNOLOGY IN BANKING-CYBER LAW AND CYBER

    research paper on cyber security in india pdf

COMMENTS

  1. (PDF) Cyber Security and Indian Cyber Laws

    This research paper includes a summary of Indian cyber laws, lists the various types of cyber security and cyber-attacks; sheds insight on India's current situation of cyber security.

  2. PDF Issues & Challenges of Cyber Security in India: a Study

    "Analysis Of National Cyber Security Policy Of India 2013 (NCSP-2013) And Indian Cyber Security Infrastructure". Centre Of Excellence For Cyber Security Research And Development In India (CECSRDI). 21 November 2014.

  3. (Pdf) Cybersecurity: Pressing Priority of India

    Abstract and Figures This research paper aims to provide a comprehensive analysis of the current state of cybersecurity in India. The study begins by establishing a clear understanding of ...

  4. (Pdf) India'S National Cyber Security Policy: Gaps and The Way Forward

    National Cyber Security Policy 2013 is an official document published by MeitY, that. includes the roadmap of cyber security and framing a secure cyber ecosystem. throughout the country. It is a ...

  5. PDF Cybercrime and Cybersecurity in India: Causes, Consequences and

    s rising rapidly in India. Developing economies such as India face unique cybercrime risks. This paper examines cybercrime and cybersecurity in India. The literature on which this paper draws is diverse, encompassing the work of economists, criminologists, institutionalists and international relations theorists. We develop a framework that delineates the relationships of formal and informal ...

  6. PDF Cybersecurity in India: An Evolving Concern for National Security

    Cyber Security in India: In-Depth ignificant catalysts for the country's economic growth, and as an integral part of the country's business and governance. The sector is positively influencing the lives of Indian citizens through direct or indirect co

  7. A Study on Cyber Security and its Challenges in India

    The suggested study paper intends to go thorough cybersecurity standards for India. The presentation will begin by giving a general review of India's current cybersecurity environment and analysing the numerous risks and difficulties the nation is now...

  8. A STUDY OF CYBER SECURITY AND ITS CHALLENGES IN THE SOCIETY

    Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies .It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber security.

  9. India's Cyber Security Landscape

    Abstract. With the second-largest Internet user base and a leading Information and Communications Technology industry, India has quickly adopted digital technologies to emerge as a major actor in the global cyberspace. This thrust on digital and information technologies is accompanied by a rapid expansion of cyberthreats such as malware attacks ...

  10. PDF A Literature Review on Cyber Security in Indian Context

    Types of cyber security and cyber attacks are listed in this paper. It also throws light on the state of cyber crimes and cyber security in India. A gist of Indian cyber laws is presented in this paper as well.

  11. Assessing Cyber Security and Data Protection Laws: a Comparative Study

    ABSTRACT This paper presents a comparative analysis of cyber security and data protection laws in India and other countries. The study focuses on the strengths and weaknesses of the legal frameworks in India, in comparison to global perspectives, and their effectiveness in dealing with the challenges of cyber security and data protection. The analysis includes a review of the legal and ...

  12. Shodhganga@INFLIBNET: Prevention of Cyber Crimes in India A Comparative

    The Shodhganga@INFLIBNET Centre provides a platform for research students to deposit their Ph.D. theses and make it available to the entire scholarly community in open access. Shodhganga@INFLIBNET. Maharaja Agrasen University. Maharaja Agrasen School of Law.

  13. (Pdf) Cyber Crimes in India: Trends and Prevention

    The purpose of the paper to analyse the increasing cases of cyber violations, the urgency for more robust and comprehensive cyber security measures, among other issues.

  14. PDF Cyber Crimes and Law in India: a Critical Analysis

    At the end of this paper "A brief study on Cyber Crime and Cyber Law's of India" we want to say cyber crimes can never be acknowledged. If anyone falls in the prey of cyber attack, please come forward and register a case in your nearest police station.

  15. Research paper A comprehensive review study of cyber-attacks and cyber

    Standard security frameworks are discussed with the history and early-generation cyber-security methods. In addition, emerging trends and recent developments of cyber security and security threats and challenges are presented. It is expected that the comprehensive review study presented for IT and cyber security researchers will be useful. Previous

  16. (PDF) Cyber Security in India

    The need for Cyber Security According to a recent report by McAfee 594 million people were affected globally due to some form of Cyber Abuse. The 2003 loss estimates by some firms range from $13 billion (that was caused worms and viruses only).

  17. Cyber Laws in India: An Overview by Jatin Patil :: SSRN

    Abstract The world has progressed in terms of communication, particularly since the introduction of the Internet. The rise of cybercrime, often known as e-crimes (electronic crimes), is a major challenge confronting today's society. As a result, cybercrime poses a threat to nations, companies, and individuals all across the world. It has expanded to many parts of the globe, and millions of ...

  18. PDF Cyber Crime in India: An Empirical Study

    Cyber Security is defined as a crime in which a computer is subject to crime (piracy, phishing, spam) or used as a tool to commit a crime (child pornography, hate crimes). Cyber-criminals can use computer technology to access personal information, trade secrets or use the Internet for malicious or exploitative purposes.

  19. Cyber Laws in India: An Overview

    Indian Journal of Law and Legal Research Volume IV Issue I | ISSN: 2582-8878 Page: 1 CYBER LAWS IN INDIA: AN OVERVIEW Jatin Patil, BA LL.B, School of Law, NMIMS, Hyder abad ABSTRACT The world has ...

  20. PDF A Study on Emerging Issues of Cyber Attacks & Security: In India

    The research is done on "Study on Emerging Issues of Cyber Attacks & Security: In India" The Quantitative Research Design used is in this paper is Descriptive research.

  21. (PDF) A Systematic Literature Review on the Cyber Security

    Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this ...

  22. Cisco Security Products and Solutions

    Security solutions for networking, data center, cloud, and collaboration, powered by a unified platform with easy integration for third-party apps and solutions.

  23. (PDF) Research Paper on Cyber Security

    PDF | In the current world that is run by technology and network connections, it is crucial to know what cyber security is and to be able to use it... | Find, read and cite all the research you ...