UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 2
February-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIREV06045


Registration ID:
311884

Page Number

289-298

Share This Article


Jetir RMS

Title

Classification of Cyber Attacks and its Associated Laws

Abstract

In contemporary society, computers have a well-known position. Recent developments in networking including cyberspace have greatly changed the human race, but the exponential increase in cyberspace also resulted in an unethical activity by people who want to exploit certain individuals by using the Internet. This cyber-site manipulation is called the cyber-attack in order to hack, spy data, stolen data, disable networks but money without authorisation or for the purpose of safe access. In recent years, the number and complexity of these attacks have risen. There has been a lack of understanding of these risks and many people, institutions and organisations have been made vulnerable to those threats. A thorough understanding including classification of cyber attacks is therefore essential. In ways to earn intelligence on the various forms and ways of incidents, the purpose of this analysis was to perform a thorough evaluation of these attacks in order to provide efficient measures to deter them. The government can be heavier threatened by industrial plutonium, power grids, air defence networks and cyber assaults. As a consequence, some proposed that cyber breaches should be considered as attacks. The raids, though, don't appear just like iconic shootings of the battle. This paper explores how current laws can be extended to the identifiable obstacle of cyber threats and created and revised.

Key Words

Cyber Attacks, Cyber-law, Internet, National Security, Data protection.

Cite This Article

"Classification of Cyber Attacks and its Associated Laws", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 2, page no.289-298, February-2019, Available :http://www.jetir.org/papers/JETIREV06045.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Classification of Cyber Attacks and its Associated Laws", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 2, page no. pp289-298, February-2019, Available at : http://www.jetir.org/papers/JETIREV06045.pdf

Publication Details

Published Paper ID: JETIREV06045
Registration ID: 311884
Published In: Volume 6 | Issue 2 | Year February-2019
DOI (Digital Object Identifier):
Page No: 289-298
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000504

Print This Page

Current Call For Paper

Jetir RMS