Abstract
In the current technological era, use of computers becomes an essential part of our lives. But this part is also affected by a new breed of security known as cyber security. It is a global issue that arises by different organisations. This paper presents the global cyber security scenario, cyber security and its practices, and firms who are major stakeholders in the cyber security. At the end counter measures of cyber crimes, its average rate is calculated in India during the years 2009–2013.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Jessie J Walker, Travis Jones and Roy Blount. Visualization, Modeling and Predictive Analysis of cyber security attacks against cyber infrastructure oriented systems. 978-1-4577-1376-7/11. page no. 82. IEEE (2011).
Rick A. Jones, Barry Horowitz. System-Aware Cyber Security. 978-0-7695-4367-3/11. page no. 914. IEEE (2011).
Andrea Rigoni, Igor Nai Fovino, Salvatore Di Blasi, Emiliano Casalicchio. Worldwide Security and Resiliency of Cyber Infrastructures: The Role of the Domain Name System. 978-0-615-51608-0/11. page no. 2 (2011).
Desire Athow, Trojan Malware Penetrates British Navy Defences–http://www.itproportal.com/2009/01/16/trojan-malware-penetrates-british-navy-defences/ (2009).
UN-backed anti-cyber-threat coalition launches headquarters in Malaysia- http://portal.unesco.org/ci/en/ev.php-URL_ID=28464&URL_DO=DO_TOPIC&URL_SECTION=201.html/ (2009).
Top 20 Cyber Security Companies 2014- http://www.reportlinker.com/p02148719-summary/Top-20-Cyber-Security-Companies.html (2014).
A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace - http://www.heritage.org/research/reports/2013/04/a-congressional-guide-seven-steps-to-us-security-prosperity-and-freedom-in-cyberspace. (2013).
Major power outage hits New York, other large cities-http://edition.cnn.com/2003/US/08/14/power.outage/ (2003).
Alex Roney Mathew, Aayad Al Hajj and Khalil Al Ruqeishi. Cyber Crimes: Threats and Protection. 978-1-4244-7578-0. page no. 16-17. IEEE (2010).
Critical Infrastructure Threats and Terrorism. DCSINT Handbook No. 1.02. page no. 4 (2006).
Mohd Shamir B Hashim. Malaysia’s National Cyber Security Policy: The Country’s Cyber Defence Initiatives. 978-0-615-51608-0/11. page no. 2–7 (2011).
Gabriel Weimann. Cyberterrorism: The Sum of All Fears?. Studies in Conflict & Terrorism, 28:129–149. Taylor & Francis Inc., page no. 138. (2005).
National Crime Records Bureau. Crimes in India (Compendium). http://ncrb.nic.in/ciiprevious/main.htm.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Mishra, S., Dhir, S., Hooda, M. (2016). A Study on Cyber Security, Its Issues and Cyber Crime Rates in India. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Advances in Intelligent Systems and Computing, vol 413. Springer, Singapore. https://doi.org/10.1007/978-981-10-0419-3_30
Download citation
DOI: https://doi.org/10.1007/978-981-10-0419-3_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0417-9
Online ISBN: 978-981-10-0419-3
eBook Packages: EngineeringEngineering (R0)